Showing 961 - 980 results of 2,317 for search 'life of code', query time: 0.12s Refine Results
  1. 961
  2. 962

    A new trauma severity scoring system adapted to wearable monitoring: A pilot study. by Alice Lemarquand, Pierre Jannot, Léo Kammerlocher, Gaëlle Lissorgues, Michel Behr, Pierre-Jean Arnoux, Salah Boussen

    Published 2025-01-01
    “…Wearable technologies represent a strong development axis for various medical applications and these devices are increasingly used in daily life as illustrated by smart watches' popularisation. …”
    Get full text
    Article
  3. 963
  4. 964

    A Methodology for Optimizing the Management of Spent Fuel of Nuclear Power Plants Using Dry Storage Casks by Ian B. Gomes, Pedro L. Cruz Saldanha, Antonio Carlos M. Alvim

    Published 2019-01-01
    “…From the given example, it is possible to see that, using real-life data, the proposed methodology can become a valuable tool to help making nuclear energy a more attractive choice costwise.…”
    Get full text
    Article
  5. 965

    E-Commerce Berbasis Website pada UMKM Menggunakan Framework Codeigniter 4 (Studi Kasus: Toko Wakuteka) by Yahdi Kusnadi, Dwiki Wijaya Putra

    Published 2024-03-01
    “…Penelitian ini merancang sebuah sistem e-commerce berbasis website menggunakan framework CodeIgniter 4 untuk toko Wakuteka. Dalam perancangan ini, dilakukan analisis kebutuhan, perancangan basis data, implementasi, dan pengujian sistem. …”
    Get full text
    Article
  6. 966

    Duress as Reason for Relative Nullity of Marriage in Turkish Civil Law by Emre Köroğlu

    Published 2022-10-01
    “…Duress is a defect in the formation stage of will and is legally regulated in Art. 151 of the Turkish Civil Code (TCC) as a reason for relative nullity of marriage. …”
    Get full text
    Article
  7. 967

    A Survey on Survivable Safety-Critical Systems by Helber Silva, Marco Vieira, Augusto Neto

    Published 2025-01-01
    “…Due to their crucial functions, these systems are frequent targets of various attacks, including Denial of Service (DoS) attacks, the execution of improper commands, code injection, and data manipulation, which can compromise system safety and put lives and critical infrastructure at risk. …”
    Get full text
    Article
  8. 968

    From Mistrust to Malice: Examining the Influence of Adverse Childhood Experiences on Reactive and Appetitive Aggression in Male Forensic Psychiatric Patients with a History of Drug... by Michael Fritz, Sylvia Flad, Judith Streb, Manuela Dudeck

    Published 2025-02-01
    “…Adverse childhood experiences (ACEs) represent one of the most critical factors contributing to the manifestation of psychiatric disorders later in life. Furthermore, such experiences are often associated with deficits in interpersonal relationships, manifesting as mistrust and violent behaviors, and are indicative of a fragmented personality. …”
    Get full text
    Article
  9. 969
  10. 970

    Third-line multiple myeloma treatment of inpatients in a German cancer center: analysis of potential cost savings due to decreased renal insufficiency by F. Jakobs, P. Ahmadi, V. Osterkamp, J. Jeck, U. Holtick, C. Scheid, Florian Kron

    Published 2025-03-01
    “…The vast majority (n = 64; 86.5%) were allocated to the G-DRG code R61, summarizing patients with “lymphoma and non-acute leukemia”. …”
    Get full text
    Article
  11. 971
  12. 972

    A Novel Rapid Design Framework for Tooth Profile of Double-Circular-Arc Common-Tangent Flexspline in Harmonic Reducers by Xueao Liu, Jianghao Zhang, Hui Wang, Xuecong Wang, Jianzhong Ding

    Published 2025-06-01
    “…The method proposed can be implemented using Python language code and integrated into the Abaqus 2019 software, offering the advantage of meeting the requirements for rapid engineering development. …”
    Get full text
    Article
  13. 973

    Educational Interventions Strategy to Promote the Health of Women Experienced Stillbirth by Maryam Allahdadia, Ali Reza Irajpour

    Published 2019-01-01
    “…Introduction: Stillbirth is one of the saddest experiences in a woman s life, which can have a wide range of cognitive, psychological, spiritual and physical consequences. …”
    Get full text
    Article
  14. 974

    Digital Justice in the Contentious Administrative Jurisdiction: The Quickness Principle Based on ICTs as an Instrument for Judicial Decongestion in Colombia by Carmen Cecilia Diz Muñoz, Carlos Andrés Sánchez Peña, Daniela María Orozco Poveda, Yassith Yaneth Muskus Tobias

    Published 2022-12-01
    “…The ICTs use is a necessity due to the pandemic caused by Covid 19, which has rethought the rhythm of life of all citizens of the Nation and how administration justice. …”
    Get full text
    Article
  15. 975
  16. 976
  17. 977

    THE PURPOSES AND THE PLACE OF COMMITTING THE ACT OF INTERNATIONAL TERRORISM AS A CRIME AGAINST PEACE AND SECURITY OF MANKIND by Vladimir Suvorov

    Published 2021-09-01
    “…However, the introduction of the norm of an act of international terrorism in the Russian Criminal Code prompted many authors to argue about the under standing of the signs of this crime, primarily its purposes and place of its committing. …”
    Get full text
    Article
  18. 978
  19. 979

    The mask in the experience industry as a socio-cultural tool for designing a fashionable image / Маска в индустрии впечатлений как социокультурный инструмент конструирования модног... by Yuliiya Kondakova / Кондакова Юлия Васильевна

    Published 2023-03-01
    “…The issue of the representation of a person through disguise is extremely acute today, due to the 2020 pandemic and the associated need to wear a mask in the life of every person as an object of daily use. The purpose of the study is to substantiate the role of the mask as a fashionable symbol of modern culture, combining the functions of a means of protection, a utilitarian and ritual object, decoration, image and communication code. …”
    Get full text
    Article
  20. 980