-
741
Adoption based on socio-affectiveness not subject to age limits
Published 2025-02-01“…The sanction of the Civil and Commercial Code of Argentina, in 2014, marks an advance in socio-affectiveness in family relationships, as well as in the resolution of cases with tailored sentences, informal judicial activity, interdisciplinary and specialty. …”
Get full text
Article -
742
Modelling of Severe Accident and In-Vessel Melt Retention Possibilities in BWR Type Reactor
Published 2018-01-01“…The ex-vessel cooling was modelled in order to evaluate the applicability of RELAP/SCDAPSIM code for predicting the heat fluxes and reactor pressure vessel wall temperatures. …”
Get full text
Article -
743
LiveWSN: A memory-efficient, energy-efficient, reprogrammable, and fault-tolerant platform for wireless sensor network
Published 2016-09-01“…Memory optimization, energy conservation, over-the-air reprogramming, and fault tolerance are the critical challenges for the proliferation of the wireless sensor network. …”
Get full text
Article -
744
On the study of one way to detect anomalous program execution
Published 2024-06-01“…Developing more accurate and adaptive methods for detecting malicious code is a critical challenge in the context of constantly evolving cybersecurity threats. …”
Get full text
Article -
745
Challenges in Generating Accurate Text in Images: A Benchmark for Text-to-Image Models on Specialized Content
Published 2025-02-01“…Our evaluation methodology encompasses a comprehensive assessment across many critical domains: mathematical equations, chemical diagrams, programming code, flowcharts, multi-line text, and paragraphs, with each domain tested through specifically designed challenge sets. …”
Get full text
Article -
746
Efficiency of Modular Bridge Configurations: A Study on the Structural Stability and Capacity of Single- and Double-Story Modular Bridges
Published 2025-05-01“…Finally, live load factors predicted through the models were compared with the requirements of the Canadian Highway Bridge Design Code (CHBDC), confirming that the DD configuration in a two-lane setup meets code expectations and demonstrates effective structural performance.…”
Get full text
Article -
747
Patients Who Fainted Whilst Giving a Blood Sample in the Blood Collectıon Unit and a Stress Mediator: Cortisol
Published 2022-12-01“…We aimed to determine the presence of underlying adrenal insufficiency by measuring cortisol levels in patients brought to the emergency room by the hospital code blue team that firstly performed their critical care, who fainted whilst giving blood samples in the blood collection unit. …”
Get full text
Article -
748
Dose enhancement effects of different-sized nanoparticles on tumors and surrounding tissues using Geant4 track structure simulation
Published 2025-08-01“…The Geant4-DNA code was utilized for simulations conducted in this study. …”
Get full text
Article -
749
Research on Natural Language Misleading Content Detection Method Based on Attention Mechanism
Published 2025-01-01“…The rapid evolution of digital communication and the corresponding surge in deceptive or misleading content have underscored the critical need for reliable and domain-adaptive detection technologies. …”
Get full text
Article -
750
Collaboration: The key to managing discipline in South African schools
Published 2022-11-01“…Furthermore, participants asserted that a whole-school approach to the implementation of the code of conduct was successful in managing discipline. …”
Get full text
Article -
751
Implementation of Religious Teacher Leadership in Cultivating Islamic Ethics in Madrasah
Published 2024-04-01“…Data analysis follows four stages: condensation, coding, categorization, and theorization. The findings reveal that religious teachers can design, organize, guide, and supervise the inculcation of religious teachings, particularly in Islamic jurisprudence, thus emphasizing the manifestation of Islamic ethics, such as dress code, religious traditions, and Islamic interactions. …”
Get full text
Article -
752
Design, implementation and formal verification of BGP proxy for mimic router
Published 2023-03-01“…To ensure the safety and correctness of the critical ‘mimic bracket’ components such as protocol proxies of mimic routers, a BGP (border gateway protocol) proxy was designed and implemented, and formal methods were applied to verify the safety and correctness of the BGP proxy.The BGP packets communicated between the peer routers and the master actor were monitored by the BGP proxy.The BGP sessions with the slave actors on behalf of peer routers were established, ensuring the consistency of the BGP protocol states for all actors.The formal specification of the BGP proxy was written based on separation logic.The VeriFast theorem prover was used to prove that the program had no memory safety problems such as null pointer reference.Furthermore, the formal verification of high-level attributes of each module in BGP proxy was also conducted to strictly ensure that the implementation met the specification.The implementation to proof code ratio of BGP proxy is about 1.8:1, and the implementation to proof labor hour ratio is about 1:3.The formally verified BGP proxy consume 0.16 seconds to process 100 000 BGP routes, which is about 7 times as long as the unverified one.Works done provide a reference for applying formal methods to verify the safety and correctness of critical components in mimic defense equipment and systems.…”
Get full text
Article -
753
RUSSIA AND EUROPE ON THE WAYS OF POST-INDUSTRIAL TRANSITION
Published 2022-02-01“…However, sustainable development today is driven not only by innovations that pave the way for the future, but also by traditions that maintain stability. The Russian cultural code and mentality are a successful algorithm for peoples living in critical areas for survival.…”
Get full text
Article -
754
A continuum damage model to simulate failure in composite plates under uniaxial compression
Published 2007-01-01“…This model is implemented in a Finite Element (FE) code and numerical simulations of buckling are executed for unidirectional and cross-ply laminates; results are in good agreement with experiments both in terms of determination of the critical loads and prediction of failure during post-buckling.…”
Get full text
Article -
755
Love in the Time of Computation
Published 2024-06-01“…Developing ideas of love and fantasy, the article argues that, in an era when the unconscious is structured not like language but like code, massed image databases lack a single present time, with consequences for photographic aesthetics. …”
Get full text
Article -
756
Categorization of crime victims: comparing theory and legislation
Published 2016-01-01“…This article aims to analyze the categorization of victims by several victimological schools and to compare that to the categorization in the Criminal Procedure Code of Macedonia (CPC). The first part of this article analyzes different theoretical categories of victims, taking into consideration approaches of representatives of positivist, conservative, radical and critical victimology. …”
Get full text
Article -
757
Self and Peer Correction to Improve College Students’ Writing Skills
Published 2018-07-01“…Self and peer correction were implemented to promote error awareness along with the use of an error code and error log in a fifth semester class. The results show that both strategies benefited students’ writing skills and self-awareness which in turn produced, among other outcomes, the development of critical self-assessment of their writing and responsibility for their own learning. …”
Get full text
Article -
758
PRILOG RASPRAVI O KAZNI DOŽIVOTNOG ZATVORA I MEĐUNARODNIM PRAVNIM STANDARDIMA
Published 2021-05-01“… The latest amendments to the Criminal Code of the Republic of Serbia have quite a lot of controversy among the professional public. …”
Get full text
Article -
759
Poręczenie majątkowe w ramach warunkowego tymczasowego aresztowania po nowelizacji z 7 lipca 2022 r.
Published 2025-01-01“…The article discusses the changes entered into force by the amendment of 7th July 2022 to the Code of Criminal Procedure, regarding bail which may be used as part of conditional detention. …”
Get full text
Article -
760
Modeling of the transition from transgranular to intergranular fracture at elevated temperatures in EI698 nickel alloy
Published 2025-07-01“…The source code of the created and used finite element is an open source project and available to download from https://github.com/Andrey-Fog/ANSYS-USERELEMENT-PHFLD. …”
Get full text
Article