Suggested Topics within your search.
Suggested Topics within your search.
-
2061
Hybrid Obfuscation Using Signals and Encryption
Published 2018-01-01“…In this paper, the potency that makes the obfuscation strong has been increased and the resilience that makes the obfuscation poor has been decreased. …”
Get full text
Article -
2062
Distributed Storage System for Electric Power Data Based on HBase
Published 2018-12-01Get full text
Article -
2063
Software watermarking scheme with cloud computing constraints
Published 2016-09-01“…A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the source code unavailable.Watermarks map to transform rules were embedded concurrently into these obfuscated codes.The recovery module was a recognizer to prove the watermarks when the original program was recovering.Experimental results,using Java decompliers,indicate that the code become ob-fuscated,is difficult to reverse engineering,thereby mabe the watermarks robust.…”
Get full text
Article -
2064
First steps on plasma beam prebuncher for free electron lasers through more suitable relativistic reference-frame-based particle-in-cell tools
Published 2025-06-01“…However, the computational and time resources needed for PICs make them impractical when high resolution and long time/distance simulations are required. …”
Get full text
Article -
2065
Designing and Interpreting a Mathematical Programming Language
Published 2019-12-01“…The interpreter consists of several basic components such as parser, semantic controller and code evaluator, each of which makes a different kind of code interpretation. …”
Get full text
Article -
2066
Exemption from Criminal Liability in Connection with Other Measures of Criminal Law
Published 2016-09-01“…The article outlines the problems which can arise after passing the draft of the federal law “On Amendments to the Criminal Code of the Russian Federation and the Criminal Procedure Code of the Russian Federation on the improvement of the grounds and procedure of exemption from criminal responsibility”. …”
Get full text
Article -
2067
PENGGUNAAN ALIH KODE DALAM PERCAKAPAN PADA JARINGAN WHATSAPP OLEH MAHASISWA KNB YANG BERKULIAH DI UNIVERSITAS SEBELAS MARET
Published 2017-05-01“…The result of analizing research that refers to Spreadly theory or etnography theory showed that intrasentential was the dominan switching code that appear on KNB students conversation about 43% (2) the factors that caused KNB students switching the code of on their conversation were speaker, addresse speaker, topic, situation, humor, ability, technology, familiarity, and relation whereas (3) the functions of switching codes on the KNB students conversations were to familiar between the speaker and address speaker, to respect the local culture they stayed, to make easy the communication, words of technology, to rich language ability, to remind something to address speaker, to respond the questions, to begin, middle and to end the conversations, to emphasize the speaker meaning, invitation, to change formal situation to informal, perception, to express the speaker feeling, to quote the other person conversation, humor, to address specification, to ask a help, to explain the speaker meaning, and to change a topic. …”
Get full text
Article -
2068
MENAKAR DALUWARSA: Kajian Perbandingan Daluwarsa Pemalsuan Surat Dalam Pembaharuan Hukum Pidana
Published 2024-01-01“…Comparison of the expiration of mail forgery in the Criminal Code and the New Criminal Code from the aspect of offense formulation and expiration limitation is very different, but there is a similarity in placing the object that can be subject to the crime of mail forgery, namely a person who makes a fake letter and uses a fake letter. …”
Get full text
Article -
2069
Comparative study of quantum error correction strategies for the heavy-hexagonal lattice
Published 2025-02-01“…In some platforms, however, the connectivities are kept even lower in order to minimise gate errors at the hardware level, which limits the error correcting codes that can be directly implemented on them. In this work, we make a comparative study of possible strategies to overcome this limitation for the heavy-hexagonal lattice, the architecture of current IBM superconducting quantum computers. …”
Get full text
Article -
2070
Bayesian Analysis of Complex Mutations in HBV, HCV, and HIV Studies
Published 2019-09-01Get full text
Article -
2071
The Necessity and Feasibility of the Pledge of Intangible Assets in the Contemporary Legal System of Iran
Published 2022-05-01“…In article 774 of the civil code following the well-known opinion in fiqh, the void of the pledge of intangible assets has been specified. …”
Get full text
Article -
2072
Analyze of the Female Students Who Stay Ministry of Education’s School Pension in Terms of the ‘‘Feasibility of Yoga Activity on the Scope of Extracurricular Training’’
Published 2017-04-01“…With this study, it is aimed to make scientific determination about providing concentration and focusing; additionally to improve academic success, to make them healthier individuals, to gain self-confidence and self awareness and to make them feel happy and to offer a suggestion that providing acquisition which gained by yoga activities to take place on the Ministry of Education of Extracurricular training curriculum. …”
Get full text
Article -
2073
NOWELIZACJA KODEKSOWEJ REGULACJI UMOWY UBEZPIECZENIA - ZAGADNIENIA DE LEGE FERENDA
Published 2017-06-01“…The above-mentioned changes are of great importance and can be called „a small amendment of the insurance contract in the Civil Code”. The author makes an argument that the recent changes of the insurance contract are far insufficient from the point o f view of a modern insurance business. …”
Get full text
Article -
2074
PROBLEMS OF THE LEGAL REGULATION OF ACCOUNTABILITY IN THE FIELD OF TAXES AND FEES
Published 2017-10-01“…Thus the author pays attention that feature of purpose of punishments, that some subjects of legal relationship responsible can be made for the same offense in the tax sphere is: the legal entity (as a rule, according to standards of the Tax Code of the Russian Federation), the offi cial or simply natural person (according to standards of the Code of the Russian Federation on Administrative Offences).And in the presence as a part of crime signs — that and natural person (according to the criminal code of Russian Federation).Summarizing the author notes that at identifi cation of the fact of an offense during cameral or exit tax audits for which administrative responsibility is provided, it is expedient to make the protocol on an administrative offense and to transfer him to the offi cial, whose competence includes consideration of this category of affairs within administrative process, along with further implementation of control and supervising production, and on the end of tax audit to draw up the relevant statement. …”
Get full text
Article -
2075
Should the Food and Drug Administration Limit Placebo-Controlled Trials?
Published 2022-07-01“…This scenario is for situations where outcomes fluctuate for complex reasons making other research methods likely to be unreliable. …”
Get full text
Article -
2076
Интерсемиотические отношения в переводе культурного иного (на примере фильма „Ностальгия” Андрея Тарковского)...
Published 2019-08-01“…This paper attempts to provide an analysis of the mechanisms used by the director to make a projection of this emotional state and to portray it in the film. …”
Get full text
Article -
2077
Seizing proceeds of crime: limits to solidarity in decreeing preservative measures
Published 2020-06-01“…In this context, it is important, both for the repression of crimes and for the fundamental rights of the accused, that the proper use and limits of preservative measures provisioned by the Code of Criminal Procedure be observed. These measures refer to the purposes defined by the Penal Code to make certain the obligation to repair damages and to decree the forfeiture of instruments, products and proceeds of crime. …”
Get full text
Article -
2078
A Qualitative Study of the Causes of Irreligiousness Boy Adolescents in Religious Families
Published 2024-12-01“…The analysis of the contextual theory by the method of Charmaz (2014) revealed three components: a) The nature of atheism contained three core codes, which were: 1) the desire to make decisions based on individual diagnosis, 2) choosing religion as one from the types of life values, 3) acting based on individual diagnoses; b) the class of reasons for atheism with axial codes; 1) individual-oriented causes (with open codes of awakening instincts, curiosity and avoiding advice, inability to manage instincts) and 2) other-oriented causes (with open codes of friends and family, the role of society and the media, and social interactions) and c) the category of how to avoid religion With the main codes: 1) matching with the congregation (with open codes of matching with friend and matching with family), 2) finding contrary evidence for religiosity (inference in favor of atheism from social events, overgeneralization in favor of atheism) and 3) Finding supporting evidence for atheism (finding fault with religious people and positive perceptions of religion). …”
Get full text
Article -
2079
ComplexityMeasures.jl: Scalable software to unify and accelerate entropy and complexity timeseries analysis.
Published 2025-01-01“…The software provides 1638 measures with 3,841 lines of source code, averaging only 2.3 lines of code per exported quantity (version 3.7). …”
Get full text
Article -
2080
ENGLISH-RULING ON WEARING RED CLOTHING: A COMPREHENSIVE STUDY OF HADITH LITERATURE
Published 2020-12-01“… Islam is a complete code of life that provides guidelines for every walk of human life. …”
Get full text
Article