Showing 841 - 860 results of 2,743 for search 'critical code', query time: 0.11s Refine Results
  1. 841

    Voice Hacking: Using Smartphones to Spread Ransomware to Traditional PCs by Bryson R. Payne, Leonardo I. Mazuran, Tamirat Abegaz

    Published 2018-07-01
    “…The demonstrated proof of concept, with relevant source code included in the appendix, can be extended and adapted to allow other voice-enabled, mobile, and IoT devices to perform multi-platform attacks against traditional PCs, as well as other mobile and IoT devices, and even critical infrastructure systems. …”
    Get full text
    Article
  2. 842

    Neutronic analysis of a fuel element with variations in fuel enrichment and burnable poison by R de Faria, Felipe Martins, Carlos Velasquez, Angela Fortini, Claubia Pereira

    Published 2019-07-01
    “…For these analyses, it was used a 17 x 17 PWR fuel element, simulated using the 238 groups library cross-section collapsed from ENDF/BVII.0 and TRITON module of SCALE 6.0 code system. The results confirmed the effective action of the burnable poison in the criticality control, especially at Beginning Of Cycle (BOC) and in the burnup kinetics, because at the end of the fuel cycle there was a minimal residual amount of neutron absorbers (155Gd and 157Gd), as expected. …”
    Get full text
    Article
  3. 843

    Limitations of Guardians' Legal Acts in the Management of Children's Assets by Rima Fitrilia Puspita Damayanti, Ma'ruf Akib, Ismi Fadjriah, Wahyudi Umar, Fe Fikran Alfurqon

    Published 2025-03-01
    “…Results Main Findings of the Research: The findings reveal critical gaps in the guardianship system, highlighting the need for enhanced oversight and accountability measures. …”
    Get full text
    Article
  4. 844

    Shear Strength Determination in RC Beams Using ANN Trained with Tabu Search Training Algorithm by Alireza Shahbazian, Hamidreza Rabiefar, Babak Aminnejad

    Published 2021-01-01
    “…The shear failure of reinforced concrete (RC) beams is a critical issue and has attracted the attention of researchers. …”
    Get full text
    Article
  5. 845

    Time-warping analysis for biological signals: methodology and application by Aleksei Krotov, Reza Sharif Razavian, Mohsen Sadeghi, Dagmar Sternad

    Published 2025-04-01
    “…Application of EFDA and potential new insights are illustrated in the context of human motor neuroscience. Annotated code to facilitate the use of this technique is provided.…”
    Get full text
    Article
  6. 846

    Whole-genome analysis of temporal gene expression during foregut development. by Jeb Gaudet, Srikanth Muttumu, Michael Horner, Susan E Mango

    Published 2004-11-01
    “…Previous studies demonstrated that the organ selector gene pha-4/FoxA is critical to establish the onset of transcription of Caenorhabditis elegans foregut (pharynx) genes. …”
    Get full text
    Article
  7. 847

    Fracture Property of Y-Shaped Cracks of Brittle Materials under Compression by Xiaoyan Zhang, Zheming Zhu, Hongjie Liu

    Published 2014-01-01
    “…In order to explain the test results, numerical models of Y-shaped cracks by using ABAQUS code were established, and the J-integral method was applied in calculating crack tip stress intensity factor (SIF). …”
    Get full text
    Article
  8. 848

    On How High‐Latitude Chorus Waves Tip the Balance Between Acceleration and Loss of Relativistic Electrons by Dedong Wang, Yuri Y. Shprits

    Published 2019-07-01
    “…Results show that the variability of chorus waves at high latitudes is critical for modeling of megaelectron volt (MeV) electrons. …”
    Get full text
    Article
  9. 849

    Ubiquitination Enzymes in Cancer, Cancer Immune Evasion, and Potential Therapeutic Opportunities by Aiman B. Awan, Maryiam Jama Ali Osman, Omar M. Khan

    Published 2025-01-01
    “…This comprehensive review delves into understanding the ubiquitin code, shedding light on its role in cancer cell biology and immune evasion. …”
    Get full text
    Article
  10. 850

    Vagrancy (Offense) from Past to Present by Asena Kamer Usluadam

    Published 2024-12-01
    “…Currently, the 1982 Constitution, the European Convention on Human Rights, the Turkish Civil Code, and various texts contain regulations on vagrancy. …”
    Get full text
    Article
  11. 851
  12. 852

    A dual-domain perception gate-controlled adaptive fusion algorithm for road crack detection by Ziyang Zhang, Yong’an Feng

    Published 2025-07-01
    “…Abstract Road crack detection presents critical challenges, including diverse defect patterns and complex anomaly characteristics. …”
    Get full text
    Article
  13. 853

    KAJIAN HUKUM TINDAK PIDANA PEMBUNUHAN YANG DILAKUKAN TERHADAP SESAMA ANGGOTA KEPOLISIAN (Studi Kasus Penembakan terhadap Anggota Detasemen Khusus 88 Anti Teror oleh Dua Rekan Kerja... by Sugeng Riyadi

    Published 2023-01-01
    “…Based on the results of the research, it was concluded that with regard to criminal responsibility, the two perpetrators received the same punishment if both were proven to have committed the crime of murder as stipulated in Article 338 of the Criminal Code in conjunction with Article 55 of the Criminal Code, both the main perpetrator and the perpetrator participating. …”
    Get full text
    Article
  14. 854

    HRMS-SCD:A High-Resolution Multi-Scene Satellite Imagery Dataset for Comprehensive Land-Cover Semantic Change Detection by P. Guo, P. Guo, S. Yang, H. Zhang, X. Huang, X. Ning, Y. Han, R. Zhang, M. Hao

    Published 2025-07-01
    “…More information about the project can be found at <code>https://github.com/17x-osborn/HRMS-SCD</code>.…”
    Get full text
    Article
  15. 855

    Impact of inconsistent ethnicity recordings on estimates of inequality in child health and education data: a data linkage study of Child and Adolescent Mental Health Services in So... by Tamsin Ford, Johnny Downs, Robert Stewart, Amelia Jewell, Jayati Das-Munshi, Alice Wickersham

    Published 2024-03-01
    “…Objectives Ethnicity data are critical for identifying inequalities, but previous studies suggest that ethnicity is not consistently recorded between different administrative datasets. …”
    Get full text
    Article
  16. 856
  17. 857

    Efficient Multi-Scale Transformer With Convolutional Attention for High-Definition Image Dehazing by Zhirui Wang

    Published 2025-01-01
    “…Our approach demonstrates the potential of transformer-based models for efficient high-definition image dehazing. Additionally, our code is publicly available at <uri>https://github.com/Wang1666570/Efficient-Multi-Scale-Transformer</uri>…”
    Get full text
    Article
  18. 858

    CrowdStrike Causes Global Microsoft Outage by Reef E. Alsowaigh

    Published 2025-06-01
    “…In today’s world, reliance on technology is rapidly growing across critical sectors such as business, banking, healthcare, and education. …”
    Get full text
    Article
  19. 859

    European LNG Import Network Analysis and Investigation of Supply Security by Konstantinos I. Savvakis, Tatiana P. Moschovou

    Published 2025-01-01
    “…The network model was developed using a programming code in MATLAB R2022B software. The results of the analysis can be summarized as follows: (a) a shift in the center of gravity of LNG trade from the Mediterranean to the Atlantic shores was identified; (b) a gradual consolidation of Europe’s import network was noted; (c) an increasing dependence of Europe on a limited number of countries was observed; and (d) the most critical nodes for network resilience were identified through modeling. …”
    Get full text
    Article
  20. 860

    Responses of two-way reinforced concrete slab with square-sized opening under gravity loadings by Md. Foisal Haque

    Published 2025-07-01
    “…So, this square-sized central opening rate of the two-way slab is critical to consider usual practice span lengths for industrial buildings in Bangladesh.…”
    Get full text
    Article