Showing 821 - 840 results of 2,743 for search 'critical code', query time: 0.12s Refine Results
  1. 821
  2. 822
  3. 823

    Legal Analysis of the Concept and Provisions of "Unenforceable" Status in Iranian Commercial Law by Ahad Golizadeh Manghutay

    Published 2025-03-01
    “…Through this approach, the research aims to critically evaluate the possibility of integrating or substituting the "Unenforceable" status within the Iranian commercial law framework, offering a potential resolution to the ambiguities identified.‌ ∴ Results & Discussion ∴ ‌The analysis of the Iranian Commercial Code reveals a deliberate avoidance of the term "Unenforceable", opting instead for the concept of "Valid but Voidable" to describe transactions that, while lacking certain required conditions, are not entirely invalid. …”
    Get full text
    Article
  4. 824
  5. 825

    FlexiNet: An Adaptive Feature Synthesis Network for Real-Time Ego Vehicle Speed Estimation by Abdalrahaman Ibrahim, Kyandoghere Kyamakya, Wolfgang Pointner

    Published 2025-01-01
    “…The source code for FlexiNet is publicly available at here <uri>https://github.com/Geekgineer/FlexiNet</uri>…”
    Get full text
    Article
  6. 826

    Ensuring the Vibration Reliability of Rotors Connected by Spline Joints by Verbovyi A., Neamtu C., Sieryk, M., Vashyst B., Pavlenko V., Simonovskiy V., Pavlenko, I.

    Published 2019-12-01
    “…In addition, the developed mathematical model of free and forced vibrations of rotor systems have been implemented in the program code operational files “Critical Frequencies of the Rotor” and “Forced Oscillations of the Rotor” of the computer algebra system MathCAD that allows improving the dynamic balancing procedure for evaluating primary imbalances. …”
    Get full text
    Article
  7. 827

    Uncovering Threats in Container Systems: A Study on Misconfigured Container Components in the Wild by Dongmin Choi, Hyunmin Seo, Kwanwoo Kim, Myoungsung You, Seungwon Shin, Jinwoo Kim

    Published 2024-01-01
    “…We identify five distinct vulnerabilities that either leak sensitive information or allow remote code execution, demonstrating the real-world feasibility and potential impact of exploiting these misconfigured container components.…”
    Get full text
    Article
  8. 828

    Cyclic Behavior of Seismically Non-Conforming Interior Reinforced Concrete Beam–Column Joints by Peyman Sabbahfar, José Melo, Aníbal Costa, Humberto Varum, Hugo Rodrigues

    Published 2025-01-01
    “…Furthermore, a numerical validation of the laboratory testing results was established with the DIANA FEA code for both monotonic and cyclic loading scenarios, and the force–displacement plots were compared with the associated laboratory results for validation purposes. …”
    Get full text
    Article
  9. 829

    Educational Interventions Strategy to Promote the Health of Women Experienced Stillbirth by Maryam Allahdadia, Ali Reza Irajpour

    Published 2019-01-01
    “…The relevant data were collected and by individual interview recording method. The extraction codes were categorized and three main categories extracted in this regard. …”
    Get full text
    Article
  10. 830
  11. 831

    Review of Integrated Response Timing in Post-Monitoring Complex Dangerous Cargo by Maruf Misaal, Lai Fatt Chuah, Mokhtar Kasypi, Anuar Abu Bakar, Mohd Azhafiz Abdullah, Shahrul Miza Mahmud, Keng Bin Loke, Wan Mariam Wan Abdullah, Mohammad Tameem Hossain Azmi, Ehamadul Haque Ani

    Published 2024-12-01
    “…This comprehensive overview examines the various types of dangerous cargo, their environmental implications and notable case studies, highlighting the critical importance of international cooperation and stringent regulations. …”
    Get full text
    Article
  12. 832

    Design Procedures for Footbridges Subjected to Walking Loads: Comparison and Remarks by Alberto Maria Avossa, Cristoforo Demartino, Francesco Ricciardelli

    Published 2017-06-01
    “…The comparison showed a wide scatter of the results, revealing some inconsistencies of the procedures, and underlining a clear need for their critical revision.…”
    Get full text
    Article
  13. 833

    Behaviour of Slabs Under Impact Loading: A Review by Raid A. Daud, Sultan Daud, Mustafa H. Al-Allaf, Fahad Alrshoudi

    Published 2025-04-01
    “…The investigation encompasses an analysis of the salient factors influencing slab behaviour, elucidation of failure mechanisms, examination of methodologies for simulating impact loading, and a critical appraisal of pertinent design code recommendations. …”
    Get full text
    Article
  14. 834

    ANALYSIS OF INFLUENCES ON PERFORMANCE AND RISKS IN THE ROMANIAN PRINTING INDUSTRY by CINCIULESCU DUMITRU

    Published 2024-12-01
    “…In the face of these transformations, risk management becomes a critical component for ensuring the sustainability and competitiveness of firms in this sector. …”
    Get full text
    Article
  15. 835

    Review of the Book Advanced Civil Law-Analytical the Conditions Included in the Contract by Ali Abbas Hayati

    Published 2021-01-01
    “…The condition here is a sub-agreement in addition to the main contract, and such a condition is by nature a legal act. In the Iranian Civil Code, the provisions regarding the condition are stated in Articles 232 to 246. …”
    Get full text
    Article
  16. 836

    Algorithms, allyship, and advice: A qualitative analysis of fertility tracker marketing by Kate Sheridan Clay, Sue Ziebland, John Powell

    Published 2025-08-01
    “…Using both Foucauldian critical theory and feminist theory, we identified a code set and major themes connecting marketing content to broader rhetoric around (in)fertility, gender equality, and power dynamics in health care. …”
    Get full text
    Article
  17. 837

    Predicting the longevity of resources shared in scientific publications by Daniel E. Acuna, Jian Jian, Tong Zeng, Lizhen Liang, Han Zhuang

    Published 2025-05-01
    “…Abstract Research has shown that most resources shared in articles (e.g., URLs to code or data) are not kept up to date and mostly disappear from the web after some years (Zeng et al., 2019). …”
    Get full text
    Article
  18. 838

    SAMF-YOLO: A self-supervised, high-precision approach for defect detection in complex industrial environments. by Jun Huang, Shamsul Arrieya Ariffin, Qiang Zhu, Wanting Xu, Qun Yang

    Published 2025-01-01
    “…As object detection models grow in complexity, balancing computational efficiency and feature expressiveness becomes a critical challenge. To address this, we propose SAMF-YOLO, a novel model integrating three key components: SONet, BFAM, and FASFF-Head. …”
    Get full text
    Article
  19. 839

    Physics identity of Asian identified US college students by Linda Zhang, Madison Swirtz, Kerstin Nordstrom

    Published 2025-01-01
    “…We present results from the ideational resource code and emergent codes generated from the data, such as Transnational Context and Asianization. …”
    Get full text
    Article
  20. 840

    Cybercrime Regulation through Laws and Strategies: a Glimpse into the Indian Experience by Annappa Nagarathna

    Published 2020-03-01
    “…Though various legal provisions under the conventional criminal laws including form the Indian Penal Code, could be used to regulate the cybercrimes, yet the changing nature of these crimes necessitated adoption of a new law framework. …”
    Get full text
    Article