Showing 741 - 760 results of 2,743 for search 'critical code', query time: 0.08s Refine Results
  1. 741

    Adoption based on socio-affectiveness not subject to age limits by Sonia Seba

    Published 2025-02-01
    “…The sanction of the Civil and Commercial Code of Argentina, in 2014, marks an advance in socio-affectiveness in family relationships, as well as in the resolution of cases with tailored sentences, informal judicial activity, interdisciplinary and specialty. …”
    Get full text
    Article
  2. 742

    Modelling of Severe Accident and In-Vessel Melt Retention Possibilities in BWR Type Reactor by Mindaugas Valinčius, Tadas Kaliatka, Algirdas Kaliatka, Eugenijus Ušpuras

    Published 2018-01-01
    “…The ex-vessel cooling was modelled in order to evaluate the applicability of RELAP/SCDAPSIM code for predicting the heat fluxes and reactor pressure vessel wall temperatures. …”
    Get full text
    Article
  3. 743

    LiveWSN: A memory-efficient, energy-efficient, reprogrammable, and fault-tolerant platform for wireless sensor network by Xing Liu, Kun Mean Hou, Christophe de Vaulx, Khalid El Gholami, Shengwu Xiong

    Published 2016-09-01
    “…Memory optimization, energy conservation, over-the-air reprogramming, and fault tolerance are the critical challenges for the proliferation of the wireless sensor network. …”
    Get full text
    Article
  4. 744

    On the study of one way to detect anomalous program execution by Yury V. Kosolapov, Tatjyana A. Pavlova

    Published 2024-06-01
    “…Developing more accurate and adaptive methods for detecting malicious code is a critical challenge in the context of constantly evolving cybersecurity threats. …”
    Get full text
    Article
  5. 745

    Challenges in Generating Accurate Text in Images: A Benchmark for Text-to-Image Models on Specialized Content by Zenab Bosheah, Vilmos Bilicki

    Published 2025-02-01
    “…Our evaluation methodology encompasses a comprehensive assessment across many critical domains: mathematical equations, chemical diagrams, programming code, flowcharts, multi-line text, and paragraphs, with each domain tested through specifically designed challenge sets. …”
    Get full text
    Article
  6. 746

    Efficiency of Modular Bridge Configurations: A Study on the Structural Stability and Capacity of Single- and Double-Story Modular Bridges by Mohamed Embaby, M. Hesham El Naggar

    Published 2025-05-01
    “…Finally, live load factors predicted through the models were compared with the requirements of the Canadian Highway Bridge Design Code (CHBDC), confirming that the DD configuration in a two-lane setup meets code expectations and demonstrates effective structural performance.…”
    Get full text
    Article
  7. 747

    Patients Who Fainted Whilst Giving a Blood Sample in the Blood Collectıon Unit and a Stress Mediator: Cortisol by Şenol Arslan, Mevlana Ömeroğlu

    Published 2022-12-01
    “…We aimed to determine the presence of underlying adrenal insufficiency by measuring cortisol levels in patients brought to the emergency room by the hospital code blue team that firstly performed their critical care, who fainted whilst giving blood samples in the blood collection unit. …”
    Get full text
    Article
  8. 748

    Dose enhancement effects of different-sized nanoparticles on tumors and surrounding tissues using Geant4 track structure simulation by Tuğrul Taylan

    Published 2025-08-01
    “…The Geant4-DNA code was utilized for simulations conducted in this study. …”
    Get full text
    Article
  9. 749

    Research on Natural Language Misleading Content Detection Method Based on Attention Mechanism by Boning Liu

    Published 2025-01-01
    “…The rapid evolution of digital communication and the corresponding surge in deceptive or misleading content have underscored the critical need for reliable and domain-adaptive detection technologies. …”
    Get full text
    Article
  10. 750

    Collaboration: The key to managing discipline in South African schools by Amy Sarah Padayachee, Ntombizandile Gcelu

    Published 2022-11-01
    “…Furthermore, participants asserted that a whole-school approach to the implementation of the code of conduct was successful in managing discipline. …”
    Get full text
    Article
  11. 751

    Implementation of Religious Teacher Leadership in Cultivating Islamic Ethics in Madrasah by Najamuddin Petta Solong, Sabil Mokodenseho, Siti Rohmah

    Published 2024-04-01
    “…Data analysis follows four stages: condensation, coding, categorization, and theorization. The findings reveal that religious teachers can design, organize, guide, and supervise the inculcation of religious teachings, particularly in Islamic jurisprudence, thus emphasizing the manifestation of Islamic ethics, such as dress code, religious traditions, and Islamic interactions. …”
    Get full text
    Article
  12. 752

    Design, implementation and formal verification of BGP proxy for mimic router by Jin ZHANG, Qiang GE, Weihai XU, Yiming JIANG, Hailong MA, Hongtao YU

    Published 2023-03-01
    “…To ensure the safety and correctness of the critical ‘mimic bracket’ components such as protocol proxies of mimic routers, a BGP (border gateway protocol) proxy was designed and implemented, and formal methods were applied to verify the safety and correctness of the BGP proxy.The BGP packets communicated between the peer routers and the master actor were monitored by the BGP proxy.The BGP sessions with the slave actors on behalf of peer routers were established, ensuring the consistency of the BGP protocol states for all actors.The formal specification of the BGP proxy was written based on separation logic.The VeriFast theorem prover was used to prove that the program had no memory safety problems such as null pointer reference.Furthermore, the formal verification of high-level attributes of each module in BGP proxy was also conducted to strictly ensure that the implementation met the specification.The implementation to proof code ratio of BGP proxy is about 1.8:1, and the implementation to proof labor hour ratio is about 1:3.The formally verified BGP proxy consume 0.16 seconds to process 100 000 BGP routes, which is about 7 times as long as the unverified one.Works done provide a reference for applying formal methods to verify the safety and correctness of critical components in mimic defense equipment and systems.…”
    Get full text
    Article
  13. 753

    RUSSIA AND EUROPE ON THE WAYS OF POST-INDUSTRIAL TRANSITION by V. Ovsyannikov, N. Ovsyannikova

    Published 2022-02-01
    “…However, sustainable development today is driven not only by innovations that pave the way for the future, but also by traditions that maintain stability. The Russian cultural code and mentality are a successful algorithm for peoples living in critical areas for survival.…”
    Get full text
    Article
  14. 754

    A continuum damage model to simulate failure in composite plates under uniaxial compression

    Published 2007-01-01
    “…This model is implemented in a Finite Element (FE) code and numerical simulations of buckling are executed for unidirectional and cross-ply laminates; results are in good agreement with experiments both in terms of determination of the critical loads and prediction of failure during post-buckling.…”
    Get full text
    Article
  15. 755

    Love in the Time of Computation by Seán Cubitt

    Published 2024-06-01
    “…Developing ideas of love and fantasy, the article argues that, in an era when the unconscious is structured not like language but like code, massed image databases lack a single present time, with consequences for photographic aesthetics. …”
    Get full text
    Article
  16. 756

    Categorization of crime victims: comparing theory and legislation by Arifi Besa

    Published 2016-01-01
    “…This article aims to analyze the categorization of victims by several victimological schools and to compare that to the categorization in the Criminal Procedure Code of Macedonia (CPC). The first part of this article analyzes different theoretical categories of victims, taking into consideration approaches of representatives of positivist, conservative, radical and critical victimology. …”
    Get full text
    Article
  17. 757

    Self and Peer Correction to Improve College Students’ Writing Skills by Irais Ramírez Balderas, Patricia María Guillén Cuamatzi

    Published 2018-07-01
    “…Self and peer correction were implemented to promote error awareness along with the use of an error code and error log in a fifth semester class. The results show that both strategies benefited students’ writing skills and self-awareness which in turn produced, among other outcomes, the development of critical self-assessment of their writing and responsibility for their own learning. …”
    Get full text
    Article
  18. 758

    PRILOG RASPRAVI O KAZNI DOŽIVOTNOG ZATVORA I MEĐUNARODNIM PRAVNIM STANDARDIMA by Dragan Jocić

    Published 2021-05-01
    “… The latest amendments to the Criminal Code of the Republic of Serbia have quite a lot of controversy among the professional public. …”
    Get full text
    Article
  19. 759

    Poręczenie majątkowe w ramach warunkowego tymczasowego aresztowania po nowelizacji z 7 lipca 2022 r. by Dariusz Świecki

    Published 2025-01-01
    “…The article discusses the changes entered into force by the amendment of 7th July 2022 to the Code of Criminal Procedure, regarding bail which may be used as part of conditional detention. …”
    Get full text
    Article
  20. 760

    Modeling of the transition from transgranular to intergranular fracture at elevated temperatures in EI698 nickel alloy by Andrey Tumanov

    Published 2025-07-01
    “…The source code of the created and used finite element is an open source project and available to download from https://github.com/Andrey-Fog/ANSYS-USERELEMENT-PHFLD. …”
    Get full text
    Article