Suggested Topics within your search.
Suggested Topics within your search.
-
2221
Containment and Division
Published 2018-12-01“…No speaker can ever possess, or even know, the entire code that makes up the system. Instead, speakers have access to the parts that they use the most. …”
Get full text
Article -
2222
An Extensible Schema For Building Large Weakly-labeled Semantic Corpora
Published 2016-05-01“…In this paper, we review our experience using Wikidata in constructing a large annotated corpus under distant supervision, moreover we make the materials, the code used to generate our annotations, freely available to all interested parties. …”
Get full text
Article -
2223
STAFF APPRAISAL USING A BINARY REGRESSION
Published 2017-10-01“…The absence of expertise in using math methods by personnel departments makes recruitment process modeling inefficient, so the results obtained via binary-regression is of great importance.The purpose of the research is to show the relationship between the data in CVs and the fact of passing the probation period by employees. …”
Get full text
Article -
2224
The Validity of Boarding House Rental Agreements from Civil Law Perspectives
Published 2024-11-01“…Tenants of boarding houses generally make rental agreements informally; in fact, the situation tends to be weak, so legal protection is needed. …”
Get full text
Article -
2225
DETERMINING PRIORITY METHODS FOR COMBATING SOCIAL INEQUALITY IN SCHOOLS: CREATING A SAFE ENVIRONMENT FOR SCHOOLCHILDREN
Published 2025-03-01“…It should be emphasized that the obtained quantitative data make it possible to assess the relative priority of each method taking into account the agreed expert assessments. …”
Get full text
Article -
2226
How does the tobacco industry attempt to influence marketing regulations? A systematic review.
Published 2014-01-01“…<h4>Background</h4>The Framework Convention on Tobacco Control makes a number of recommendations aimed at restricting the marketing of tobacco products. …”
Get full text
Article -
2227
Threat ripple model: A model to characterize business-oriented attacks based on business dependencies
Published 2025-01-01“…., platforms, using malicious code. For example, it is believed that exploiting vulnerabilities to access the system, and then invading the target platform that support the specified business through lateral movement can achieve the purpose of attacking the business. …”
Get full text
Article -
2228
THE LEGAL CAPACITY OF THE PARTIES, AS A VALIDITY CONDITION FOR THE MANDATE CONTRACT
Published 2023-12-01“…First of all, the mandate contract must meet the general requirements for the validity of contracts, stipulated by art. 1179 para. (1) Civil Code. Regarding the form of the power of attorney, art. 1301 Civil Code specifies the fact that it will be effective only if it is given in compliance with the forms required by law ad validitatem for the conclusion of the contract that the representative is to make on behalf of the represented. …”
Get full text
Article -
2229
FORCED HAPPINESS AS A MODERN SOCIO AND CULTURAL IMPERATIVE
Published 2015-12-01“…In this article is an attempt to "read" cultural code of the phenomenon of happiness in actual social circumstances. …”
Get full text
Article -
2230
A Critical Analysis of the Arbitration Clause in Land Utilization Allocation Contracts of the Industrial Estates Company, with Emphasis on the Approach of the Judiciary
Published 2025-04-01“…The findings of this research emphasize the necessity of complying with Article 139 of the Constitution and Article 457 of the Civil Procedure Code in such contracts, ensuring the independence and impartiality of arbitrators, recognizing the subordination of the arbitration clause to the contract (especially in cases of contract dissolution), and the need to adjust arbitration clauses to make them fair and reflective of the parties’ intentions.…”
Get full text
Article -
2231
A Modular, Model, Library Framework (DebrisLib) for Non-Newtonian Geophysical Flows
Published 2025-06-01“…DebrisLib includes a variety of non-Newtonian closures that predict a range of geophysical flow conditions and modular code designed to operate with any Newtonian parent-code architecture. …”
Get full text
Article -
2232
Participants in criminal proceedings: problematic issues of classification
Published 2024-12-01“…To achieve the set goal, the following main scientific tasks were solved: to analyze the norms of the Code of Criminal Procedure of Ukraine regarding the determination of the status and classification of participants in criminal proceedings; to analyze scientific publications after the adoption of the Code of Criminal Procedure of Ukraine in 2012, devoted to participants in criminal proceedings; using a systemic approach to determine the connections between participants in criminal proceedings with their distribution by stages of criminal proceedings and functions performed. …”
Get full text
Article -
2233
ANALYSIS METHOD OF STRENGTH RELIABILITY SAFETY COEFFICIENT FOR HIGH SPEED TRAIN ALUMINUM CARBODY
Published 2019-01-01“…The safety coefficient given in the design codes of railway vehicle structure has certain experience. …”
Get full text
Article -
2234
Coastal Shipping Radar Monitoring System with Satellites as Transmitters of Opportunity
Published 2022-02-01“…The use of satellite systems as transmitters of opportunity for a radar station makes it possible to monitor coastal sea areas, where the ground sources of illumination signals are absent. …”
Get full text
Article -
2235
THE MOTIVATING FUNCTION OF MYTH: A COGNITIVE ONOMASIOLOGICAL ANALYSIS
Published 2023-11-01“…Mythological motivation is appropriated to the signs of cultural codes of animals and plants; also, idioms and proverbs can have propositional, associative-metaphorical and value statuses. …”
Get full text
Article -
2236
Influence of Masonry Infill on Seismic Design Factors of Reinforced-Concrete Buildings
Published 2022-01-01“…A three-dimensional 4-story RC building is designed, and in order to make a realistic model, different infill walls configurations were taken into account with the openings in the infill. …”
Get full text
Article -
2237
Dose enhancement effects of different-sized nanoparticles on tumors and surrounding tissues using Geant4 track structure simulation
Published 2025-08-01“…The Geant4-DNA code was utilized for simulations conducted in this study. …”
Get full text
Article -
2238
Postharvest arginine spraying delayed ripening during storage of papaya
Published 2025-06-01Get full text
Article -
2239
Enhancing the students’ perception of machine learning methods-based drug formulation using R_programming educational protocols
Published 2025-08-01“…The R programming language can be easily used, through the correct and simplified codes and packages, in conducting unsupervised ML methods, such as principal component analysis (PCA) and hierarchical clustering analysis (HCA), after calculating relevant descriptors of drugs and molecules. …”
Get full text
Article -
2240
POETICS OF GASTRONOMIC IMAGES IN JHUMPA LAHIRI’S “THE NAMESAKE”
Published 2022-12-01“…The purpose of the article is to analyze the specificity of gastronomic images and the Indian gastronomic code in Jhumpa Lahiri’s “The Namesake” as a personification of Asian identity in the context of transcultural paradigm. …”
Get full text
Article