Showing 901 - 920 results of 2,743 for search 'critical code', query time: 0.10s Refine Results
  1. 901

    FastADnet: Fast Anomaly Detection via Core-Feature Centered Cluster Reconstruction Network by Daeyeob Na, Youngjoon Yoo

    Published 2025-01-01
    “…Industrial anomaly detection plays a critical role in computer vision, driving advancements across various sectors. …”
    Get full text
    Article
  2. 902

    Translation from Event-B into Eiffel by Sofia Reznikova, Victor Rivera, Joo Young Lee, Manuel Mazzara

    Published 2018-12-01
    “…The mapping not only generates an actual Eiffel code of the Event-B model, but also translates model properties as contracts. …”
    Get full text
    Article
  3. 903

    Anti-Helicobacter Pylori Activity of Phytochemicals from <i>Artocarpus</i> spp.: In Silico Analysis by Susmita Yadav, Anima Pandey

    Published 2024-11-01
    “…A docking analysis of 35 phytochemicals from the Artocarpus plant against PBP (PDB code: 1QMF) revealed artocarpin as a promising candidate (docking score: −148.24 Kcal/mol). …”
    Get full text
    Article
  4. 904

    Efficient Realization of BCD Multipliers Using FPGAs by Shuli Gao, Dhamin Al-Khalili, J. M. Pierre Langlois, Noureddine Chabini

    Published 2017-01-01
    “…The proposed approach was implemented on Xilinx Virtex-5 and Virtex-6 FPGAs with emphasis on the critical path delay reduction. Pipelined BCD multipliers were implemented for 4 × 4, 8 × 8, and 16 × 16-digit multipliers. …”
    Get full text
    Article
  5. 905

    Sonic Boom Impact Assessment of European SST Concept for Milan to New York Supersonic Flight by Giovanni Fasulo, Antimo Glorioso, Francesco Petrosino, Mattia Barbarino, Luigi Federico

    Published 2025-05-01
    “…Aerodynamic numerical simulations were carried out using an open-source code to capture near-field pressure signatures at three critical mission points. …”
    Get full text
    Article
  6. 906

    A multimodal understanding of the role of sound and music in gendered toy marketing. by Luca Marinelli, Petra Lucht, Charalampos Saitis

    Published 2024-01-01
    “…We provided a public repository with all code and data necessary to reproduce the results of this study on github.com/marinelliluca/music-role-gender-marketing.…”
    Get full text
    Article
  7. 907

    Directed evolution of aminoacyl-tRNA synthetases through in vivo hypermutation by Yuichi Furuhata, Gordon Rix, James A. Van Deventer, Chang C. Liu

    Published 2025-05-01
    “…Abstract Genetic code expansion (GCE) is a critical approach to the site-specific incorporation of non-canonical amino acids (ncAAs) into proteins. …”
    Get full text
    Article
  8. 908

    The construction of victims of defamation in court’s written verdicts by Mahardhika Zifana, Iwa Lukmana, Dadang Sudana

    Published 2022-05-01
    “…Following the issue of defamation in the Criminal Code, the establishment of the Law Number 11 of 2008 on Electronic Information Transactions has resulted in a more complex situation because it also covers the act of defamation. …”
    Get full text
    Article
  9. 909

    Translanguaging in the Communicative Practice of Buyers and Sellers in Traditional Market by Munirah Munirah, Aziz Thaba, Akram Budiman Yusuf

    Published 2021-09-01
    “…This study is not intended to challenge or reject code-switching analyses previously reported by other scholars. …”
    Get full text
    Article
  10. 910

    Lineage-specific microbial protein prediction enables large-scale exploration of protein ecology within the human gut by Matthias A. Schmitz, Nicholas J. Dimonaco, Thomas Clavel, Thomas C. A. Hitch

    Published 2025-04-01
    “…Abstract Microbes use a range of genetic codes and gene structures, yet these are often ignored during metagenomic analysis. …”
    Get full text
    Article
  11. 911
  12. 912

    Automatic diagnosis of single fault in interconnect testing of SRAM‐based FPGA by T. Nirmalraj, S. Radhakrishnan, S.K. Pandiyan

    Published 2021-09-01
    “…The presented technique uses the Walsh Code method to significantly reduce the number of test configurations when compared with previous methods. …”
    Get full text
    Article
  13. 913

    Exploring Network Security Educator Knowledge by Jennifer B. Chauvot, Deniz Gurkan, Cathy Horn

    Published 2023-10-01
    “…It is critical for nations to have trained professionals in network security who can safeguard hardware, information systems, and electronic data. …”
    Get full text
    Article
  14. 914

    Uncertainty Quantification and Assimilation Method Based on Evaluated Nuclear Data Sampling Method by HUANG Yihan, ZU Tiejun, LIU Zhengming, CAO Liangzhi, WU Hongchun

    Published 2025-06-01
    “…The evaluated nuclear data sampling code, NECP-SOUL, was utilized to produce random nuclear data samples of ENDF-6 format, and then the nuclear data processing code, NECP-Atlas, was used to generate the application libraries based on each ENDF-6 sample. …”
    Article
  15. 915

    Drug dependence is not addiction—and it matters by Maia Szalavitz, Khary K. Rigg, Sarah E. Wakeman

    Published 2021-01-01
    “…Accurately identifying persons with addiction is critically important for effectively targeting treatment and harm reduction interventions. …”
    Get full text
    Article
  16. 916

    Cytochrome P450 2C9-mediated interactions: molecular docking studies of natural anti-arthritic compounds by Boon Hooi Tan, Nafees Ahemad, Yan Pan, Uma Devi Palanisamy, Chin Eng Ong

    Published 2025-05-01
    “…Methods: The investigated compounds were docked individually to the defined binding site in CYP2C9 based on the published crystal structure (PDB code: 1R9O). Results: All investigated ligands bound deep in the active site pocket in close proximity to the heme. …”
    Get full text
    Article
  17. 917
  18. 918

    Defect Detection and Correction in OpenMP: A Static Analysis and Machine Learning-Based Solution by Norah A. Al-Johany, Fathy E. Eassa, Sanaa A. Sharaf, Eynas H. Balkhair, Sara M. Assiri

    Published 2025-01-01
    “…A rule-based correction engine is employed to repair detected defects through minimally invasive code transformations, such as inserting critical sections, correcting directive placement, and adjusting data-sharing clauses. …”
    Get full text
    Article
  19. 919

    A novel simulation paradigm for medical ICU cardiopulmonary arrest training: the in situ mirror simulation by Meenu Johnkutty, Harry Kuperstein, Fatima Koroma, Jessi Chen, James Mattson, Sahar Ahmad

    Published 2025-12-01
    “…Simulations took place in a vacant MICU patient room with resuscitation equipment, including a code cart, saline-substituted medications, and a mannequin capable of endotracheal intubation. …”
    Get full text
    Article
  20. 920