-
781
A hot-repair method for the running software with zero suspends
Published 2025-08-01“…Then, it selects the safe zone and repairs the defects when the code in the safe zone is called, which can prevent the target process from hanging for a long time. …”
Get full text
Article -
782
Integrated Software Environment for Pressurized Thermal Shock Analysis
Published 2011-01-01“…Once the system pressure and the RPV wall temperature are known, the stresses inside the RPV wall can be calculated by mean a Finite Element (FE) code. The last step of the methodology is the Fracture Mechanics (FM) analysis, using weight functions, aimed at evaluating the stress intensity factor (KI) at crack tip to be compared with the critical stress intensity factor KIc. …”
Get full text
Article -
783
Artificial Intelligence and Smart Manufacturing: An Analysis of Strategic and Performance Narratives
Published 2024-05-01“…Cluster analysis uncovered a prominent linkage between ‘cybersecurity’ and strategy/performance codes, highlighting its growing influence. Additionally, concepts such as ‘artificial intelligence’, ‘cloud’ and ‘digitalization’ showed robust connections with strategy/performance code. …”
Get full text
Article -
784
Automatic Detection of Tiny Drainage Outlets and Ventilations on Flat Rooftops from Aerial Imagery
Published 2025-07-01“…The labeled dataset used in this study is publicly available by following this link <code>https://zenodo.org/records/14040571</code>.…”
Get full text
Article -
785
Vulnerability detection using BERT based LLM model with transparency obligation practice towards trustworthy AI
Published 2024-12-01“…Vulnerabilities in the source code are one of the main causes of potential threats in software-intensive systems. …”
Get full text
Article -
786
-
787
-
788
Social Media, Digital Diplomacy and Diplomatic Crisis: The Case of Yisrael Katz’s X Shares
Published 2025-06-01“…As a result of the study conducted, it was seen that Katz used the hermeneutic code, proairetic code, semantic code, symbolic code, and cultural code in most of his visually supported posts to criticize Erdoğan, included political actors in his posts, addressed the Turkish people and the opposition as the target audience and generally drew attention to themes such as “dictatorship”, “anti-Semitism”, “freedom of expression”, “future”, “modern Republic”, “Ottoman Empire”. …”
Get full text
Article -
789
Effect of COVID-19 with or without acute kidney injury on inpatient mortality in England: a national observational study using administrative data
Published 2025-03-01“…Objectives To evaluate hospital outcomes and their predictors during the pandemic for patients with and without COVID-19, stratified by the presence of acute kidney injury (AKI).Design Retrospective observation study using the Hospital Episodes Statistics database for England.Participants 2 385 337 unique hospital admissions of adult patients from March 2020 to March 2021 in England.Main outcome measures COVID-19 cases were identified by the International Classification of Diseases, Tenth Revision, Clinical Modification (ICD-10-CM) code of U07.1. Patients with suspected COVID-19 (U07.2 code) and patients with end-stage kidney disease on chronic dialysis (N18.6 and Z99.2) were excluded. …”
Get full text
Article -
790
Zoe Dumitrescu-Bușulenga și relațiile identitare ale imaginarului religios în opera lui Mihai Eminescu / ZOE DUMITRESCUBUȘULENGA AND THE IDENTITARY INTERFERENCES OF THE RELIGIOUS I...
Published 2017-10-01“…In the same time, Zoe Dumitrescu-Bușulenga circumscribes the religious imaginary of Mihai Eminescu’s literary work according to the triple nuance of the creative language that Northrop Frye develops in The Great Code. The Bible and The Literature. These three critical interpretations are: an exclusively Romantic poet (Eminescu belongs to the Romantic paradigm, he defines himself being a Romantic writer in Eu nu cred nici în Iehova), an atheist poet (Eminescu has been read in an atheist reading grid by the proletcult/ communist doctrine) and, last but not least, a religious poet. …”
Get full text
Article -
791
Buckling Analysis of Functionally Graded Cylindrical Shells Under Mechanical and Thermal Loads by Dynamic Relaxation Method
Published 2020-11-01“…An axial compressive load and thermal gradient were applied to the shell incrementally so that in each load step the incremental form of governing equations were solved by the DR method combined with the finite difference (FD) discretization method to obtain the critical buckling load. After convergence of the code in the first increment, the latter load step was added to the former so that the program could be repeated again. …”
Get full text
Article -
792
Investigating the effect of sediment loading on the growth of a shale-cored anticline using finite element modelling: an example from the South Caspian Basin
Published 2024-12-01“…The overburden and syn-kinematic sediments are modelled as poro-elastoplastic materials using a modified Cam-Clay critical state model and the mobile shale is modelled as visco-plastic Herschell-Bulkley material, representative of conditions at critical state. …”
Get full text
Article -
793
Hierarchical Information-guided robotic grasp detection
Published 2025-05-01“…Extensive experiments demonstrate that GraspFormer achieves performance comparable to state-of-the-art methods. The code is available at https://github.com/shine793/Hierarchical-Information-guided-Robotic-Grasp-Detection .…”
Get full text
Article -
794
Finite element analysis and experimental validation of polymer–metal contacts in block-on-ring configuration
Published 2023-12-01“…The wear profile was mapped to identify the critical zone where the stress concentration is the key point in this definition. …”
Get full text
Article -
795
-
796
Acute Upper Gastrointestinal Bleeding: A Hands-On Simulation Case for Internal Medicine Residents Improves Knowledge and Confidence
Published 2025-08-01“…Key learning outcomes included assessing vitals, performing a physical exam, initiating resuscitation, ordering appropriate medication, consulting GI, and creating a differential. Critical equipment included a code cart and moulage blood. …”
Get full text
Article -
797
A Comprehensive Analysis of Cybersecurity Infrastructure in Academic Environments
Published 2024-10-01“…Domain security analysis revealed critical vulnerabilities, including an outdated version of PHP and possible remote code execution (CVSS 9.8-10) in “virtual.ups.edu.ec”. …”
Get full text
Article -
798
Assessment of human errors in the intensive cardiac care unit nursing profession using the SPAR-H
Published 2015-07-01“…Results: Duties include initial resuscitation, saying the code and start cardio-pulmonary resuscitation, shock, intubation and urgent measures for dysrhythmias are critical task with error probability of 0.372, 0.245, 0.233, 0.196 and 0.122/0 respectively. …”
Get full text
Article -
799
BELARUSIANS’ SELFIDENTIFICATION IN THE CONTEXT OF CIVILIZATIONAL BORDERLAND
Published 2015-07-01“…Despite the fact that the elements of European identity are present in Belarusians’ identity code, notably as the symbol of better living standards, its role is far from relevant. …”
Get full text
Article -
800
Cascaded Dual-Inpainting Network for Scene Text
Published 2025-07-01“…Scene text inpainting is a significant research challenge in visual text processing, with critical applications spanning incomplete traffic sign comprehension, degraded container-code recognition, occluded vehicle license plate processing, and other incomplete scene text processing systems. …”
Get full text
Article