Showing 781 - 800 results of 2,743 for search 'critical code', query time: 0.08s Refine Results
  1. 781

    A hot-repair method for the running software with zero suspends by Guoyuan Lin, Jiazhen Cai, Yonggang Li, Haonan Li, Jiahui Zhou, Wei Chen, Zhong Chen, Shanqing Guo

    Published 2025-08-01
    “…Then, it selects the safe zone and repairs the defects when the code in the safe zone is called, which can prevent the target process from hanging for a long time. …”
    Get full text
    Article
  2. 782

    Integrated Software Environment for Pressurized Thermal Shock Analysis by Dino Araneo, Paolo Ferrara, Fabio Moretti, Andrea Rossi, Andrea Latini, Francesco D'Auria, Oscar A. Mazzantini

    Published 2011-01-01
    “…Once the system pressure and the RPV wall temperature are known, the stresses inside the RPV wall can be calculated by mean a Finite Element (FE) code. The last step of the methodology is the Fracture Mechanics (FM) analysis, using weight functions, aimed at evaluating the stress intensity factor (KI) at crack tip to be compared with the critical stress intensity factor KIc. …”
    Get full text
    Article
  3. 783

    Artificial Intelligence and Smart Manufacturing: An Analysis of Strategic and Performance Narratives by Alexandra Horobet, Cristiana Doina Tudor, Zeno Dinca, Dan Gabriel Dumitrescu, Eduard Alexandru Stoica

    Published 2024-05-01
    “…Cluster analysis uncovered a prominent linkage between ‘cybersecurity’ and strategy/performance codes, highlighting its growing influence. Additionally, concepts such as ‘artificial intelligence’, ‘cloud’ and ‘digitalization’ showed robust connections with strategy/performance code. …”
    Get full text
    Article
  4. 784

    Automatic Detection of Tiny Drainage Outlets and Ventilations on Flat Rooftops from Aerial Imagery by L. Arzoumanidis, W. Li, W. Li, J. Knechtel, Y. Kosmayadi, Y. Dehbi

    Published 2025-07-01
    “…The labeled dataset used in this study is publicly available by following this link <code>https://zenodo.org/records/14040571</code>.…”
    Get full text
    Article
  5. 785

    Vulnerability detection using BERT based LLM model with transparency obligation practice towards trustworthy AI by Jean Haurogné, Nihala Basheer, Shareeful Islam

    Published 2024-12-01
    “…Vulnerabilities in the source code are one of the main causes of potential threats in software-intensive systems. …”
    Get full text
    Article
  6. 786
  7. 787
  8. 788

    Social Media, Digital Diplomacy and Diplomatic Crisis: The Case of Yisrael Katz’s X Shares by Ali Murat Kırık, Ceren Yegen, Ahmet Çetinkaya

    Published 2025-06-01
    “…As a result of the study conducted, it was seen that Katz used the hermeneutic code, proairetic code, semantic code, symbolic code, and cultural code in most of his visually supported posts to criticize Erdoğan, included political actors in his posts, addressed the Turkish people and the opposition as the target audience and generally drew attention to themes such as “dictatorship”, “anti-Semitism”, “freedom of expression”, “future”, “modern Republic”, “Ottoman Empire”. …”
    Get full text
    Article
  9. 789

    Effect of COVID-19 with or without acute kidney injury on inpatient mortality in England: a national observational study using administrative data by Nitin V Kolhe, Maarten Taal, Richard Fluck

    Published 2025-03-01
    “…Objectives To evaluate hospital outcomes and their predictors during the pandemic for patients with and without COVID-19, stratified by the presence of acute kidney injury (AKI).Design Retrospective observation study using the Hospital Episodes Statistics database for England.Participants 2 385 337 unique hospital admissions of adult patients from March 2020 to March 2021 in England.Main outcome measures COVID-19 cases were identified by the International Classification of Diseases, Tenth Revision, Clinical Modification (ICD-10-CM) code of U07.1. Patients with suspected COVID-19 (U07.2 code) and patients with end-stage kidney disease on chronic dialysis (N18.6 and Z99.2) were excluded. …”
    Get full text
    Article
  10. 790

    Zoe Dumitrescu-Bușulenga și relațiile identitare ale imaginarului religios în opera lui Mihai Eminescu / ZOE DUMITRESCUBUȘULENGA AND THE IDENTITARY INTERFERENCES OF THE RELIGIOUS I... by Silviu Mihăilă

    Published 2017-10-01
    “…In the same time, Zoe Dumitrescu-Bușulenga circumscribes the religious imaginary of Mihai Eminescu’s literary work according to the triple nuance of the creative language that Northrop Frye develops in The Great Code. The Bible and The Literature. These three critical interpretations are: an exclusively Romantic poet (Eminescu belongs to the Romantic paradigm, he defines himself being a Romantic writer in Eu nu cred nici în Iehova), an atheist poet (Eminescu has been read in an atheist reading grid by the proletcult/ communist doctrine) and, last but not least, a religious poet. …”
    Get full text
    Article
  11. 791

    Buckling Analysis of Functionally Graded Cylindrical Shells Under Mechanical and Thermal Loads by Dynamic Relaxation Method by M.E. Golmakani, M. Moravej, M. Sadeghian

    Published 2020-11-01
    “…An axial compressive load and thermal gradient were applied to the shell incrementally so that in each load step the incremental form of governing equations were solved by the DR method combined with the finite difference (FD) discretization method to obtain the critical buckling load. After convergence of the code in the first increment, the latter load step was added to the former so that the program could be repeated again. …”
    Get full text
    Article
  12. 792

    Investigating the effect of sediment loading on the growth of a shale-cored anticline using finite element modelling: an example from the South Caspian Basin by Andrew Procter, Daniel T. Roberts, Lidia Lonergan, Stephen J. Dee

    Published 2024-12-01
    “…The overburden and syn-kinematic sediments are modelled as poro-elastoplastic materials using a modified Cam-Clay critical state model and the mobile shale is modelled as visco-plastic Herschell-Bulkley material, representative of conditions at critical state. …”
    Get full text
    Article
  13. 793

    Hierarchical Information-guided robotic grasp detection by Zeyao Hou, Yueran Zhao, Yutao Jin, Chao Yang, Zongyu He, Xiaoyan Chen

    Published 2025-05-01
    “…Extensive experiments demonstrate that GraspFormer achieves performance comparable to state-of-the-art methods. The code is available at https://github.com/shine793/Hierarchical-Information-guided-Robotic-Grasp-Detection .…”
    Get full text
    Article
  14. 794

    Finite element analysis and experimental validation of polymer–metal contacts in block-on-ring configuration by K. Y. Eayal Awwad, Khosro Fallahnezhad, B. F. Yousif, Ahmad Mostafa, Omar Alajarmeh, A. Shalwan, Xuesen Zeng

    Published 2023-12-01
    “…The wear profile was mapped to identify the critical zone where the stress concentration is the key point in this definition. …”
    Get full text
    Article
  15. 795
  16. 796

    Acute Upper Gastrointestinal Bleeding: A Hands-On Simulation Case for Internal Medicine Residents Improves Knowledge and Confidence by Marni H. Wilkoff, Emily S. Seltzer, Nicholas R. Piniella, Harrindra Seepersaud, Priscilla Loanzon, Susannah Kurtz, James Salonia, Daniela Jodorkovsky

    Published 2025-08-01
    “…Key learning outcomes included assessing vitals, performing a physical exam, initiating resuscitation, ordering appropriate medication, consulting GI, and creating a differential. Critical equipment included a code cart and moulage blood. …”
    Get full text
    Article
  17. 797

    A Comprehensive Analysis of Cybersecurity Infrastructure in Academic Environments by Holger Santillan, Julio Andrés Arévalo Satán, Peregrina Wong

    Published 2024-10-01
    “…Domain security analysis revealed critical vulnerabilities, including an outdated version of PHP and possible remote code execution (CVSS 9.8-10) in “virtual.ups.edu.ec”. …”
    Get full text
    Article
  18. 798

    Assessment of human errors in the intensive cardiac care unit nursing profession using the SPAR-H by I Mohammadfam, M Movafagh, A Soltanian, M Salavati, S Bashirian

    Published 2015-07-01
    “…Results: Duties include initial resuscitation, saying the code and start cardio-pulmonary resuscitation, shock, intubation and urgent measures for dysrhythmias are critical task with error probability of 0.372, 0.245, 0.233, 0.196 and 0.122/0 respectively. …”
    Get full text
    Article
  19. 799

    BELARUSIANS’ SELFIDENTIFICATION IN THE CONTEXT OF CIVILIZATIONAL BORDERLAND by L. Volakhava

    Published 2015-07-01
    “…Despite the fact that the elements of European identity are present in Belarusians’ identity code, notably as the symbol of better living standards, its role is far from relevant. …”
    Get full text
    Article
  20. 800

    Cascaded Dual-Inpainting Network for Scene Text by Chunmei Liu

    Published 2025-07-01
    “…Scene text inpainting is a significant research challenge in visual text processing, with critical applications spanning incomplete traffic sign comprehension, degraded container-code recognition, occluded vehicle license plate processing, and other incomplete scene text processing systems. …”
    Get full text
    Article