Suggested Topics within your search.
Suggested Topics within your search.
- Economic Policy 1
- Economic policy 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Environmental Economics 1
- Environmental economics 1
- Industrial Organization 1
- Industrial organization 1
- Moral and ethical aspects 1
- Professional ethics 1
- Public relations 1
- Public relations personnel 1
-
1121
Forced labor: unused reserves
Published 2025-06-01“…The methodological basis was the general dialectical method of cognition. Results. …”
Article -
1122
The Procedure of Termination of the Criminal Case (Criminal Prosecution) on Rehabilitation Bases in the Russian Federation and Mongolia
Published 2019-09-01“…The Authors state that the procedure for termination of the criminal case provided by the Criminal procedure code of Mongolia contains fairly extended guarantees of establishing the truth. …”
Get full text
Article -
1123
Open-Source Ethernet MAC IP Cores for FPGAs: Overview and Evaluation
Published 2023-01-01“…The goal of this work is to survey available open-source Ethernet MAC IP cores, evaluate existing designs in terms of performance, resource utilization, code quality, or maturity, and to present and summarize the evaluation results herein. …”
Get full text
Article -
1124
The role of regional environmental criminology in the digital age
Published 2023-07-01“…Crimes in the field of ecology should be singled out in an independent section of the Special Part of the Criminal Code of the Russian Federation as a priority area of criminal law policy. …”
Get full text
Article -
1125
NSTITUTE OF JOINT WILL OF SPOUSES IN RUSSIA AND A NUMBER OF FOREIGN COUNTRIES
Published 2024-01-01“…In order to achieve the above-mentioned goal, the following tasks were identified, namely: analysis of Russian legislation in order to identify problems in the regulation of the institution in question; analysis of the norms of foreign legislation regulating this institution; study of the influence of the norms of foreign civil legislation on the understanding and formal consolidation of the system of joint will of spouses in domestic law; analysis of gaps related to the legal regulation of the regime joint wills of spouses in the Civil Code of the Russian Federation. The methodology of this research includes private and general scientific research methods, namely abstraction, analysis, synthesis, deduction, induction, method of legal experiment, legal modeling, comparative legal method. …”
Get full text
Article -
1126
Therapists’ Perspective on Virtual Reality Training in Patients after Stroke: A Qualitative Study Reporting Focus Group Results from Three Hospitals
Published 2016-01-01“…The study was analysed based on a phenomenological approach using qualitative content analysis. Results. After code refinements, a total number of 1289 codes emerged out of 1626 statements. …”
Get full text
Article -
1127
RDInfratech: An online repository of species and research for Mt. Hamiguitan Range
Published 2022-12-01“…It features easy site navigation for the general public in viewing and searching the information about different species, researches and articles. …”
Get full text
Article -
1128
Moss flora of two Alpine glacial and periglacial sites on crystalline and carbonatic bedrock
Published 2024-12-01“…These habitats include glaciers and rock glaciers, respectively, and are of increasing interest for being directly threatened by climate change and for hosting a specialized and often rare and endemic biodiversity (EU Habitats Directive, habitat code 8340, Natura 2000 network). However, the moss flora of rock glaciers was never studied, and, in general, few studies were performed specifically on mosses of ice-related landforms in the European Alps. …”
Get full text
Article -
1129
In-silico tool based on Boolean networks and meshless simulations for prediction of reaction and transport mechanisms in the systemic administration of chemotherapeutic drugs.
Published 2025-01-01“…The first step implies retrieving the ratios between extracellular, free intracellular, and bound intracellular concentrations from numerical simulations, employing a meshless code developed, calibrated and validated in a previous work. …”
Get full text
Article -
1130
THE ROLE OF LOCAL ETHICS COMMITTEES: CHALLENGES AND PROSPECTS FOR PUBLIC HEALTH RESEARCH IN KAZAKHSTAN
Published 2025-03-01Get full text
Article -
1131
Cognitive Flexibility and Its Dimensions in Patients with Gastrointestinal Diseases
Published 2019-06-01Get full text
Article -
1132
-
1133
PRECAUTIONARY MEASURES IN CRIMINAL PROCEEDINGS
Published 2025-05-01“…For this purpose, the legislator has regulated in the current Criminal Procedure Code the precautionary measures, which are located in the General Part, Title V, entitled „Preventive and other procedural measures”, respectively in Chapter III entitled „Precautionary measures, return of things and restoration of the previous situation”, where the legal provisions are laid down on: precautionary measures, seizure procedure, seizure report, mortgage notation, attachment, contesting precautionary measures, as well as the recovery of seized goods. …”
Get full text
Article -
1134
-
1135
The impact of digital technologies on the information potential of accounting (financial) statements. Part 2: Impact of digital platforms and models on transparency of corporate re...
Published 2022-09-01“…The use in the course of the study of general scientific methods of analysis and synthesis, as well as methods of logical comparison, reduction and selection of methodologically important facts of reality, made it possible to conclude that in legal terms, the electronic form of existence of objects, objects, processes is legitimized, and the digital form is a deep care into the virtual world through cryptography, the use of complex systems, encryption code and a limited number of participants. …”
Get full text
Article -
1136
Extracting Realistic Pedestrian, Cycling, and Driving Street Networks from OpenStreetMap
Published 2025-07-01“…The methodology is designed to be general and globally applicable at the city level. …”
Get full text
Article -
1137
Ontological approach to automatic generation of questions in intelligent learning systems
Published 2020-09-01“…This article proposes an approach for designing a general subsystem of automatic generation of questions in intelligent learning systems. …”
Get full text
Article -
1138
Universal patching method for side-channel vulnerabilities based on atomic obfuscation
Published 2022-04-01“…Executing code containing side-channel vulnerabilities exhibits different non-functional behaviors related to inputs.Attackers can obtain these behaviors by leveraging micro architecture side-channel attacks and then analyze the pattern between the behaviors and the inputs to access sensitive data.Vulnerability repairing at the software layer brings low overheads to a program’s execution.Besides, it does not require modifying hardware or system, which enables fast patching and widespread deployment.It becomes the mainstream strategy applied to the current cryptographic implementations.However, existing solutions are deeply bound to the program’s implementation and requires manual intervention.This brings challenge to implement and is not versatile enough.A general patching method was proposed for side-channel vulnerabilities that combined dynamic obfuscated execution with hardware atomic transaction.To hide the real accesses of the side-channel vulnerabilities of a program, the proposed method inserted dynamic confusing accesses into the vulnerabilities.To avoid an attacker using fine-grained side-channel attack to distinguish the real access and the confusing access, both of them were encapsulated as transactions and they were guaranteed to be uninterrupted during the running period.In addition, a prototype system called SC-Patcher was implemented based on the LLVM compiler.Various optimization strategies were supported, including secure springboard and transaction aggregation, to further improve system security and performance.Experimental results show that the proposed method makes it impossible for an attacker to restore accurate sensitive data through side-channel attack, and it also brings almost no additional performance overhead to the program.…”
Get full text
Article -
1139
The Issue of Nullifying a Judgment in Criminal Procedural Law
Published 2023-12-01“…Lastly, study will examine judgments indicative of a nullification in Turkish criminal procedural law and discuss whether the practice of distinctly subjecting a judgment to nullification is accurate or not without regard to the general legal remedial system ensured in Turkish Criminal Procedural Code.…”
Get full text
Article -
1140
Health Knowledge of Pregnant Women on Anemia and its Complication in Pregnancy
Published 2016-06-01Get full text
Article