-
881
Gender Semantics and Historical Feminisms: An Interdisciplinary Approach through Natural Language Processing
Published 2025-07-01“…This article contributes to historical feminist debates by presenting an original framework synthesizing qualitative and computational methods, open datasets, and code, thus expanding the possibilities of traditional historiography. …”
Get full text
Article -
882
Measuring adversity in the ABCD® Study: systematic review and recommendations for best practices
Published 2025-03-01“…We provide code using R to calculate these scores and their constituent domains for use in future ABCD adversity-related research. …”
Get full text
Article -
883
Effects of Near-Fault Pulse-Like Ground Motion on Seismic Response of Dry Sand Site
Published 2025-01-01“…This study elucidates the influence of NFPLGMs on dry sand sites, providing critical insights for performance-based seismic design and code improvement.…”
Get full text
Article -
884
P-CORONA: A New Tool for Calculating the Intensity and Polarization of Coronal Lines in 3D Models of the Solar Corona
Published 2025-01-01“…The critical need to study the magnetic field in the solar corona is highlighted by recent observational facilities, such as the Daniel K. …”
Get full text
Article -
885
-
886
WU Hongchun1, ZHENG Youqi1, CAO Liangzhi1, DU Xianan1, WANG Xuesong2, ZU Tiejun1, LIU Zhouyu1, HE Qingming1, CHEN Ronghua1, GE Li1, YANG Rui2, GAO Xinzhao2, WANG Shixi2...
Published 2025-04-01“…With the support of national projects, a fully independent code system, named LoongSystem, was developed. To validate the LoongSystem, the physical experiments and operational measurement data based on China Experimental Fast Reactor (CEFR) were utilized to verify the proposed theoretical model and the developed code system. …”
Get full text
Article -
887
Verification of fast ion and rotation effects on turbulence through comparison of GENE and CGYRO with L-mode plasmas in KSTAR
Published 2025-01-01“…The study underscores the critical importance of phase angle analysis in gyrokinetic code verification, particularly when assessing fast ion effects on turbulence. …”
Get full text
Article -
888
Electronic personnel document management: from legal experiment to practice
Published 2022-06-01“…The authors propose the results of a critical analysis of the interim results of the legal experiment on the introduction of EPDM. …”
Get full text
Article -
889
Detecting command injection attacks in web applications based on novel deep learning methods
Published 2024-10-01“…Traditional detection methods struggle with the increasing complexity and obfuscation of these attacks, resulting in poor identification of malicious code, complicated feature extraction processes, and low detection efficiency. …”
Get full text
Article -
890
SatGuard: Satellite Networks Penetration Testing and Vulnerability Risk Assessment Methods
Published 2025-05-01“…By leveraging their contextual reasoning and code-generation abilities, SatGuard enables semi-automated vulnerability analysis and exploitation. …”
Get full text
Article -
891
Experimental study on wind load characteristics of sloped roof photovoltaic array
Published 2025-08-01“…Wind load is a critical factor that threatens the structural safety of rooftop PV systems. …”
Get full text
Article -
892
Development novice teachers’ higher-order thinking skills through online problem-based learning platform: A mixed methods experimental research
Published 2024-10-01“…Content analysis was used to code and categorize themes and pattern of HOTS perception. …”
Get full text
Article -
893
Is Indonesia’s Company Law Ready to Turn the Page on Outdated Liquidation Procedures?
Published 2024-10-01“…It highlights the liquidator's role in the dissolution process, grounded in Article 1233 of the Indonesian Civil Code, which outlines that legal relationships arise from consent or law. …”
Get full text
Article -
894
Fast radio bursts as a probe of gravity on cosmological scales
Published 2025-06-01“…All codes used in this work are made publically available.…”
Get full text
Article -
895
Evaluating Grayware Characteristics and Risks
Published 2011-01-01“…Our analysis further points out that species in categories Spyware and Adware continue to dominate the grayware landscape and impose extremely critical threats to the Internet ecosystem.…”
Get full text
Article -
896
Advanced machine learning for regional potato yield prediction: analysis of essential drivers
Published 2025-03-01“…Abstract Localized yield prediction is critical for farmers and policymakers, supporting sustainability, food security, and climate change adaptation. …”
Get full text
Article -
897
From Uncertainty to Confidence: Peer-Led Research and the Formation of Medical Academic Identity
Published 2025-06-01“…<b>Background:</b> Undergraduate research is vital for developing critical thinking and academic identity in medical students, yet traditional models often fail to overcome institutional and personal barriers. …”
Get full text
Article -
898
Bipartite reweight-annealing algorithm of quantum Monte Carlo to extract large-scale data of entanglement entropy and its derivative
Published 2025-07-01“…We then demonstrate the feasibility of using EE and its derivative to find phase transition points, critical exponents, and various phases.…”
Get full text
Article -
899
SSB: Smart Contract Security Detection Tool Suitable for Industrial Control Scenarios
Published 2025-07-01“…This suggests that semantic-based approaches, which integrate domain-specific invariants and runtime monitoring, can address the unique challenges of ICS, such as real-time constraints and semantic consistency between code and physical control logic. The framework’s ability to model industrial invariants—covering security, functionality, consistency, time-related, and resource consumption aspects—provides a robust mechanism to prevent critical errors like unauthorized access or premature equipment operation. …”
Get full text
Article -
900
Legal Framework for Protecting Children from Commercial Sexual Exploitation
Published 2025-04-01“… This study offers a critical analysis of the legal framework and policy measures aimed at protecting children from Commercial Sexual Exploitation of Children (CSEC) in South Sulawesi, Indonesia. …”
Get full text
Article