Showing 2,181 - 2,200 results of 2,827 for search 'making and coding', query time: 0.12s Refine Results
  1. 2181

    De maîtresse à domestique. La circonstance aggravante de « vol dans une auberge » au prisme du genre (1799-1815) by Prune Decoux

    Published 2025-05-01
    “…While the law of 16 December 1799 provided for an aggravation of the punishment if the theft was committed by the 'master or mistress of the inn', the penal code of 1810 took up this circumstance, masculinising it by removing the term 'mistress'. …”
    Get full text
    Article
  2. 2182
  3. 2183

    Parole: Legal and penological analysis by Ignjatović Đorđe

    Published 2016-01-01
    “…At the same time special Code on prevention of sexual victimization of juveniles - contrary to the Criminal Code- abolishes a possibility of earlier release of all offenders of sexual crimes against juveniles. …”
    Get full text
    Article
  4. 2184

    Predicting software reuse using machine learning techniques-A case study on open-source Java software systems. by Matthew Yit Hang Yeow, Chun Yong Chong, Mei Kuan Lim, Yuen Yee Yen

    Published 2025-01-01
    “…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …”
    Get full text
    Article
  5. 2185

    JDroid: Android malware detection using hybrid opcode feature vector by Recep Sinan Arslan

    Published 2025-07-01
    “…The rapid proliferation of devices using the Android operating system makes these devices the primary target for malware developers. …”
    Get full text
    Article
  6. 2186

    Comparative legal analysis of the expertise in court under the criminal law of Ukraine and CIS countries by A. N. Protsenko

    Published 2021-12-01
    “…Proposals were submitted to the domestic Criminal Procedure Code to increase the efficiency of the expertise in court. …”
    Get full text
    Article
  7. 2187

    Adaptive delta modulation method for arbitrary adaptation coefficients in the sensor network of the mobile ECG monitoring by О. В. Тимченко, В. І. Лозинський

    Published 2018-08-01
    “…The proposed ADM method makes it possible to select the adaptation coefficients taking into account the forms of the processed signal.…”
    Get full text
    Article
  8. 2188

    Is This the End of Anthropology as We Know It? Some Implication of FAIR Principles on Tales in Ethnological and Anthropological Qualitative Research by Olga Orlić

    Published 2024-11-01
    “…The prerogative to make all data open inevitably leads to autocensorship among interlocutors, i.e., resulting in a kind of FAIRy tale being collected. …”
    Get full text
    Article
  9. 2189

    Ностальгия по повседневности: киноцитата эпохи "застоя" by Olga Trukhanova

    Published 2019-12-01
    “…From adaptations to the Brezhnev’s period in Ivan Vasil’evich Changes Profession to the rituality in The Irony of Fate, the comedy genre contributes to the creation of a specific cultural code and to the mythologizing of the ordinary things. …”
    Get full text
    Article
  10. 2190

    Playing With Data: A Board Game-Inspired Technique to Engage Local Stakeholders in Participatory Qualitative Analysis by Charlotte Albrechtsen

    Published 2025-03-01
    “…This tutorial provides step-by-step guidance on a game-inspired approach that makes participatory qualitative analysis more accessible and time efficient. …”
    Get full text
    Article
  11. 2191

    Developing a Causal Model of Human and Organizational Culture Factors Affecting the Knowledge Management Maturity Using Meta-Synthesis Approach by Younis Jabarzadeh, Fereshteh Sepehri

    Published 2016-03-01
    “…The results include 64 codes which are classified in 9 dimensions and two categories. …”
    Get full text
    Article
  12. 2192

    Evolution Process and Supply Chain Adaptation of Smart Contracts in Blockchain by Yue Wu, Junxiang Li, Jiru Zhou, Shichang Luo, Liwei Song

    Published 2022-01-01
    “…We read the source code and official documents of Bitcoin, Ethereum, and Hyperledger to explore the operation principle and implementation mode of smart contract. …”
    Get full text
    Article
  13. 2193

    Counting and building operators in theories with hidden symmetries and application to HEFT by Rodrigo Alonso, Shakeel Ur Rahaman

    Published 2025-08-01
    “…The present work is concerned with hidden symmetry in general and Higgs EFT in particular and (i) connects the counting formula presented in [1] in the CCWZ formulation with the linear frame and makes this connection explicit in HEFT (ii) outlines the differences in perturbation theory in each frame (iii) presents a new counting formula with measure in the full SU(3) × SU(2) × U(1) group for HEFT and (iv) provides a Mathematica code that produces the number of operators at the user-specified order in HEFT.…”
    Get full text
    Article
  14. 2194

    Improvisation et réécriture narrative : jouer au mode libre de GTA Online by Iñigo Atucha

    Published 2021-01-01
    “…These action patterns make GTA Online, as an open multiplayer world, a hybrid and eclectic living theater.…”
    Get full text
    Article
  15. 2195

    « Politesse, mon cul ? » : transmission et transgression des rituels de politesse dans les albums jeunesse et le théâtre jeune public by Victoria Chantseva, Marie Sorel

    Published 2019-09-01
    “…It has become commonplace to associate children's literature with the transmission of codes and values. Politeness, a ritualized and codified practice one must acquired at an early age, is traditionally a favorite subject in this line of work. …”
    Get full text
    Article
  16. 2196

    Ethical principles becoming statutory requirements by Hennie Oosthuizen, Teuns Verschoor

    Published 2008-10-01
    “…Medical practitioners in the past mainly relied on ethical guidelines of the Health Professions Council of South Africa, international codes, declarations and common ethical principles as guidance to practice. …”
    Get full text
    Article
  17. 2197

    Security Protection of Electrical Intelligent Sensors and Sensor Networks by Chunyan AN, Yang LU, Di ZHAI, Xueqiong ZHU

    Published 2023-11-01
    “…The widespread user-side deployment makes them more susceptible to physical attacks such as side channel attacks. …”
    Get full text
    Article
  18. 2198

    Experiment Centric Teaching for Reconfigurable Processors by Loïc Lagadec, Damien Picard, Youenn Corre, Pierre-Yves Lucas

    Published 2011-01-01
    “…The originality comes from that the students make use of the Biniou framework. Biniou is a research tool which approach covers tasks ranging from describing the RFU, synthesizing it as VHDL code, and implementing applications over it. …”
    Get full text
    Article
  19. 2199

    On the Terms and Concepts Reflecting the Phenomena of Internet Communication on the Cases of Violation of Minors’ Sexual Integrity by T. N. Sekerazh

    Published 2022-04-01
    “…At the same time the Criminal Code of the Russian Federation operates with the concepts of “sexual acts” and “lewd acts”.The author makes an attempt to bring clarity and unambiguity to the understanding of the terms used both in scientific studies, and in forensic psychological and comprehensive psychological and linguistic examinations. …”
    Get full text
    Article
  20. 2200

    Scattering of ultrasonic wave on a model of the artery by J. Wójcik, T. Powałowski, R. Tymkiewicz, A. Lamers, Z. Trawiński

    Published 2014-04-01
    “…Later on, the numerical codes were determined in order to calculate the fields of ultrasonic waves, as well as backscattered fields for various boundary conditions. …”
    Get full text
    Article