Showing 1,121 - 1,140 results of 3,139 for search 'general code', query time: 0.09s Refine Results
  1. 1121

    Forced labor: unused reserves by V.V. Geranin, S.N. Mal'tseva

    Published 2025-06-01
    “…The methodological basis was the general dialectical method of cognition. Results. …”
    Article
  2. 1122

    The Procedure of Termination of the Criminal Case (Criminal Prosecution) on Rehabilitation Bases in the Russian Federation and Mongolia by P. V. Kozlovskii, G. Rentsendorj

    Published 2019-09-01
    “…The Authors state that the procedure for termination of the criminal case provided by the Criminal procedure code of Mongolia contains fairly extended guarantees of establishing the truth. …”
    Get full text
    Article
  3. 1123

    Open-Source Ethernet MAC IP Cores for FPGAs: Overview and Evaluation by Christian Fibich, Patrick Schmitt, Roland Höller, Peter Rössler

    Published 2023-01-01
    “…The goal of this work is to survey available open-source Ethernet MAC IP cores, evaluate existing designs in terms of performance, resource utilization, code quality, or maturity, and to present and summarize the evaluation results herein. …”
    Get full text
    Article
  4. 1124

    The role of regional environmental criminology in the digital age by D. Z. Ziyadova, M. G. Dieva, A. E. Guseynov, N. O. Guseynova

    Published 2023-07-01
    “…Crimes in the field of ecology should be singled out in an independent section of the Special Part of the Criminal Code of the Russian Federation as a priority area of criminal law policy. …”
    Get full text
    Article
  5. 1125

    NSTITUTE OF JOINT WILL OF SPOUSES IN RUSSIA AND A NUMBER OF FOREIGN COUNTRIES by MALETINA K.A., SOKOLOVA A.G.

    Published 2024-01-01
    “…In order to achieve the above-mentioned goal, the following tasks were identified, namely: analysis of Russian legislation in order to identify problems in the regulation of the institution in question; analysis of the norms of foreign legislation regulating this institution; study of the influence of the norms of foreign civil legislation on the understanding and formal consolidation of the system of joint will of spouses in domestic law; analysis of gaps related to the legal regulation of the regime joint wills of spouses in the Civil Code of the Russian Federation. The methodology of this research includes private and general scientific research methods, namely abstraction, analysis, synthesis, deduction, induction, method of legal experiment, legal modeling, comparative legal method. …”
    Get full text
    Article
  6. 1126

    Therapists’ Perspective on Virtual Reality Training in Patients after Stroke: A Qualitative Study Reporting Focus Group Results from Three Hospitals by Ludwig Schmid, Andrea Glässel, Corina Schuster-Amft

    Published 2016-01-01
    “…The study was analysed based on a phenomenological approach using qualitative content analysis. Results. After code refinements, a total number of 1289 codes emerged out of 1626 statements. …”
    Get full text
    Article
  7. 1127

    RDInfratech: An online repository of species and research for Mt. Hamiguitan Range by Lanie Laureano, Wilkin Simo, Bernadette Nanual, Ar-Jay Sacay, Dony Dongiapon

    Published 2022-12-01
    “…It features easy site navigation for the general public in viewing and searching the information about different species, researches and articles. …”
    Get full text
    Article
  8. 1128

    Moss flora of two Alpine glacial and periglacial sites on crystalline and carbonatic bedrock by Barbara Valle, Olga Ligi, Anna Invernizzi, Tiberio Fiaschi, Mauro Gobbi, Marco Caccianiga

    Published 2024-12-01
    “…These habitats include glaciers and rock glaciers, respectively, and are of increasing interest for being directly threatened by climate change and for hosting a specialized and often rare and endemic biodiversity (EU Habitats Directive, habitat code 8340, Natura 2000 network). However, the moss flora of rock glaciers was never studied, and, in general, few studies were performed specifically on mosses of ice-related landforms in the European Alps. …”
    Get full text
    Article
  9. 1129

    In-silico tool based on Boolean networks and meshless simulations for prediction of reaction and transport mechanisms in the systemic administration of chemotherapeutic drugs. by Fabián Mauricio Vélez Salazar, Iván David Patiño

    Published 2025-01-01
    “…The first step implies retrieving the ratios between extracellular, free intracellular, and bound intracellular concentrations from numerical simulations, employing a meshless code developed, calibrated and validated in a previous work. …”
    Get full text
    Article
  10. 1130
  11. 1131
  12. 1132
  13. 1133

    PRECAUTIONARY MEASURES IN CRIMINAL PROCEEDINGS by Monica Cristina COSTEA

    Published 2025-05-01
    “…For this purpose, the legislator has regulated in the current Criminal Procedure Code the precautionary measures, which are located in the General Part, Title V, entitled „Preventive and other procedural measures”, respectively in Chapter III entitled „Precautionary measures, return of things and restoration of the previous situation”, where the legal provisions are laid down on: precautionary measures, seizure procedure, seizure report, mortgage notation, attachment, contesting precautionary measures, as well as the recovery of seized goods. …”
    Get full text
    Article
  14. 1134
  15. 1135

    The impact of digital technologies on the information potential of accounting (financial) statements. Part 2: Impact of digital platforms and models on transparency of corporate re... by M. T. Turmanov, T. M. Rogulenko

    Published 2022-09-01
    “…The use in the course of the study of general scientific methods of analysis and synthesis, as well as methods of logical comparison, reduction and selection of methodologically important facts of reality, made it possible to conclude that in legal terms, the electronic form of existence of objects, objects, processes is legitimized, and the digital form is a deep care into the virtual world through cryptography, the use of complex systems, encryption code and a limited number of participants. …”
    Get full text
    Article
  16. 1136

    Extracting Realistic Pedestrian, Cycling, and Driving Street Networks from OpenStreetMap by J. P. Duque, M. A. Brovelli

    Published 2025-07-01
    “…The methodology is designed to be general and globally applicable at the city level. …”
    Get full text
    Article
  17. 1137

    Ontological approach to automatic generation of questions in intelligent learning systems by Li Wenzu

    Published 2020-09-01
    “…This article proposes an approach for designing a general subsystem of automatic generation of questions in intelligent learning systems. …”
    Get full text
    Article
  18. 1138

    Universal patching method for side-channel vulnerabilities based on atomic obfuscation by Deqing ZOU, Pan ZHANG, Wei LIU, Weijie CHEN, Yifan LU

    Published 2022-04-01
    “…Executing code containing side-channel vulnerabilities exhibits different non-functional behaviors related to inputs.Attackers can obtain these behaviors by leveraging micro architecture side-channel attacks and then analyze the pattern between the behaviors and the inputs to access sensitive data.Vulnerability repairing at the software layer brings low overheads to a program’s execution.Besides, it does not require modifying hardware or system, which enables fast patching and widespread deployment.It becomes the mainstream strategy applied to the current cryptographic implementations.However, existing solutions are deeply bound to the program’s implementation and requires manual intervention.This brings challenge to implement and is not versatile enough.A general patching method was proposed for side-channel vulnerabilities that combined dynamic obfuscated execution with hardware atomic transaction.To hide the real accesses of the side-channel vulnerabilities of a program, the proposed method inserted dynamic confusing accesses into the vulnerabilities.To avoid an attacker using fine-grained side-channel attack to distinguish the real access and the confusing access, both of them were encapsulated as transactions and they were guaranteed to be uninterrupted during the running period.In addition, a prototype system called SC-Patcher was implemented based on the LLVM compiler.Various optimization strategies were supported, including secure springboard and transaction aggregation, to further improve system security and performance.Experimental results show that the proposed method makes it impossible for an attacker to restore accurate sensitive data through side-channel attack, and it also brings almost no additional performance overhead to the program.…”
    Get full text
    Article
  19. 1139

    The Issue of Nullifying a Judgment in Criminal Procedural Law by Gökhan Ölmez

    Published 2023-12-01
    “…Lastly, study will examine judgments indicative of a nullification in Turkish criminal procedural law and discuss whether the practice of distinctly subjecting a judgment to nullification is accurate or not without regard to the general legal remedial system ensured in Turkish Criminal Procedural Code.…”
    Get full text
    Article
  20. 1140