Showing 761 - 780 results of 2,743 for search 'critical code', query time: 0.08s Refine Results
  1. 761
  2. 762

    Hierarchical in-out fusion for incomplete multimodal brain tumor segmentation by Fang Liu, YanDuo Zhang, Tao Lu, Jiaming Wang, LiWei Wang

    Published 2025-07-01
    “…Our code is available https://github.com/liufangcoca-515/InOutFusion-main .…”
    Get full text
    Article
  3. 763

    Effectiveness of a competency-based coordinator of advance care planning competency enhancement program: a mixed method by Minjeong Seo, Jaehan Ryu, Jinryung Park

    Published 2025-04-01
    “…Participants acknowledged that critical thinking education improved their ability to analyze and evaluate clinical ethical dilemmas. …”
    Get full text
    Article
  4. 764

    A Zero-Trust Multi-Processor Reporter-Verifier Design of Edge Devices for Firmware Authenticity in Internet of Things and Blockchain Applications by Ananda Maiti, Alexander A. Kist

    Published 2025-03-01
    “…In this paper, we propose a new IoT device design that works against internal threats by preventing malicious codes from device manufacturers. In IoT applications that monitor critical data, it is important to ensure that the correct firmware reporting honest data is running on the devices. …”
    Get full text
    Article
  5. 765

    Fatigue crack initiation and propagation in lotus-type porous material by S. Glodež, S. Dervarič, J. Kramberger, M. Šraml

    Published 2016-01-01
    “…The number of stress cycles, Np, required for crack propagation from initial to the critical crack length is also numerically determined using finite element (FE) models, in the frame of Abaqus computation FEM code. …”
    Get full text
    Article
  6. 766

    Fatigue crack initiation and propagation in lotus-type porous material by S. Glodež, S. Dervaric, J. Kramberger, M. Šraml

    Published 2015-12-01
    “…The number of stress cycles, Np, required for crack propagation from initial to the critical crack length is also numerically determined using finite element (FE) models, in the frame of Abaqus computation FEM code. …”
    Get full text
    Article
  7. 767

    Properties of the new N $$ \mathcal{N} $$ = 1 AdS4 vacuum of maximal supergravity by Nikolay Bobev, Thomas Fischbacher, Krzysztof Pilch

    Published 2020-01-01
    “…Studying the structure of the submanifold of SO(3) × ℤ2-invariant supergravity scalars, we find that it has a simple interpretation as a submanifold of the 14-dimensional ℤ 2 3 $$ {\mathbb{Z}}_2^3 $$ -invariant scalar manifold (SU(1, 1)/U(1))7, for which we find a rather remarkable superpotential whose structure matches the single bit error correcting (7, 4) Hamming code. This 14-dimensional scalar manifold contains approximately one quarter of the known critical points. …”
    Get full text
    Article
  8. 768

    Discrepancies between physician review and algorithmic detection of the zoll rescuenet post-cardiac arrest case review by Ayal Z. Pierce, Cody Couperus, Jordan Parker, Allison LaRocco, Michael Mazzeffi, Nicholas A. Morris

    Published 2025-07-01
    “…Background: Accurate measurement of CPR quality metrics is critical for improving cardiac arrest outcomes. Impedance based automated devices have demonstrated limitations. …”
    Get full text
    Article
  9. 769

    Prawo oskarżonego do udziału w rozprawie głównej w świetle ostatnich nowelizacji: postępująca erozja by Artur Kowalczyk

    Published 2025-01-01
    “…In recent years, Polish legislation has continued the previous tendency (e.g. the criticized Article 378a of the Code of Criminal Procedure) to reduce these standards. …”
    Get full text
    Article
  10. 770

    Gendered Societies and Leadership Trajectories: A Qualitative Study of Women in the Indian Civil Services by Hemlata Vivek Gaikwad, Suruchi Pandey

    Published 2025-07-01
    “…Through in-depth interviews this research aims to uncover the success code of the selected twelve women leaders. The study identified six broad themes with subthemes which acted as enablers or deterrents for these women. …”
    Get full text
    Article
  11. 771

    A SPIN-based Approach for Detecting Vulnerabilities in C Programs by N. G. Kushik, A. . Mammar, A. . Cavalli, N. V. Yevtushenko, W. . Jimenez, E. . Montes De Oca

    Published 2011-12-01
    “…The C language is widely used for developing tools in various application areas, and a number of C software tools are used for critical systems, such as medicine, transport, etc. …”
    Get full text
    Article
  12. 772

    Deployment of Sensors to Optimize the Network Coverage Using Genetic Algorithm by Fozia Hanif Khan, Rehan Shams, M. Umair, M. Waseem

    Published 2012-12-01
    “…The algorithm has been implemented in MATLAB using its genetic algorithm tool box along with the custom code. …”
    Get full text
    Article
  13. 773

    BLOCKCHAIN PERSPECTIVES IN THE DEVELOPMENT OF GREEN ECONOMY FINANCE by M. L. Dorofeev

    Published 2020-07-01
    “…The relatively high cost, the presence of critical vulnerabilities in the software code, as well as the insufficient level of development of related technologies are significant obstacles to the development of blockchain technology. …”
    Get full text
    Article
  14. 774

    Intermittent gaslift flows in vertical pipes by Duong Ngoc Hai, Nguyen Thuc Khang, Nguyen Duy Thien

    Published 2007-09-01
    “…The resulting system of equations is numerically solved. The numerical code is verified by using experimental data and calculation data of the other authors. …”
    Get full text
    Article
  15. 775

    Detention measure in the preliminary investigation procedure by Ćorović Emir, Ćorović Ajsela

    Published 2025-01-01
    “…The authors aim to examine the measure in question in a detailed and critical manner, and at the end of the paper, they offer certain de lege ferenda proposals.…”
    Get full text
    Article
  16. 776

    Modeling of the transition from transgranular to intergranular fracture at elevated temperatures in EI698 nickel alloy by Andrey Tumanov

    Published 2025-07-01
    “…The source code of the created and used finite element is an open source project and available to download from https://github.com/Andrey-Fog/ANSYS-USERELEMENT-PHFLD. …”
    Get full text
    Article
  17. 777

    Enhancement of carbon nanotubes/kerosene nanofluids on mixed convective heat transfer in rectangular enclosures by Bilal El hadoui, Mourad Kaddiri

    Published 2024-11-01
    “…The system of the governing equations is tackled by a validated in-house code, where we compared the code accuracy with previous experimental and numerical works. …”
    Get full text
    Article
  18. 778

    Passive Design for Residential Buildings in Arid Desert Climates: Insights from the Solar Decathlon Middle East by Esra Trepci, Edwin Rodriguez-Ubinas

    Published 2025-08-01
    “…The thermal properties significantly exceed the local code requirements, with wall performance up to 80% better than that mandated. …”
    Get full text
    Article
  19. 779

    Healthcare data governance assessment based on hospital management perspectives by Shinta Oktaviana R, Putu Wuri Handayani, Achmad Nizar Hidayanto, Bambang Budi Siswanto

    Published 2025-06-01
    “…The axial code was performed to get critical problem-related health data in the hospital. …”
    Get full text
    Article
  20. 780

    Transformer-Based Vulnerability Detection in IoT Firmware Binaries Using Opcode Sequences by M. Nandish, Jalesh Kumar, H. G. Mohan, M. V. Manoj Kumar

    Published 2025-01-01
    “…Firmware security is critical for maintaining the integrity of embedded systems. …”
    Get full text
    Article