-
441
X-Ray Radiative Transfer Calculation Based on a Physics-based Model of the Subparsec-scale Gases around an Active Galactic Nucleus and Its Application to NGC 3783
Published 2025-01-01“…Subsequently, X-ray radiative transfer was performed using the Monte Carlo Simulation for Astrophysics and Cosmology code. Our findings indicate that when the angle of inclination ranges within 55°–65°, the transmitted component of the X-ray spectrum displays absorption lines of He-like and H-like iron, exhibiting a blueshift of approximately 500 km s ^−1 . …”
Get full text
Article -
442
On the starting and operational transients at the core of the RMB based on 2D multigroup diffusion:
Published 2023-07-01“…For that, a methodology to visualize some variables like neutron fluxes, temperatures, power, etc., was developed. …”
Get full text
Article -
443
Representing Arab-Indonesian identity: Language and cultural narratives on social media
Published 2025-01-01“…The research examines how linguistic and cultural strategies, including Arabic loanwords, bilingual code-switching, religious hashtags, and visual symbols such as traditional attire, calligraphy, and cultural practices, are used to articulate identity in digital spaces. …”
Get full text
Article -
444
SlidingConv: Domain-Specific Description of Sliding Discrete Cosine Transform Convolution for Halide
Published 2024-01-01“…The experimental results showed that SlidingConv is faster than the hand-tuned CPU code and 1/1900 of the hand-tuned code length, running more efficiently than de facto libraries like OpenCV. …”
Get full text
Article -
445
Il catalano nella Corte Aragonese a Napoli riflesso in documenti bilingui della cancelleria di Ferrante. Uno studio storico-sociale
Published 2013-06-01“…<strong>Riassunto</strong>: Nel presente lavoro viene analizzato il fenomeno del code switching in una prospettiva storico-sociale. …”
Get full text
Article -
446
CONSIDERATIONS REGARDING THE DIVORCE BY AGREEMENT OF THE SPOUSES, ACCORDING TO THE NOTARY PROCEDURE
Published 2011-04-01“…By amending the Family Code according to the provisions of the Law no. 202/2010 regarding some measures in order to speed the solving of processes (“Law of small reform”), representing the introduction to the New Civil Code adopted by the Law no. 287/2009, published in the Official Gazette no. 511 of July 24, 2009, being to become effective, is inserted for the first time the possibility to end the marital relations also before the registrar of births, marriages and deaths or notary public, in strict terms of law. …”
Get full text
Article -
447
Ethical budgets in (psycho-)linguistic fieldwork
Published 2025-03-01“…The notions of collaborative research, with communities rather than on them, and co-design of research with the participant community, are now common currency in funding applications, and indeed, an international code of ethics for cross-cultural research now exists: the TRUST Code. …”
Get full text
Article -
448
Finetuning Large Language Models for Vulnerability Detection
Published 2025-01-01“…The finetuned WizardCoder model achieves improvement in ROC AUC and F1 measures on balanced and imbalanced vulnerability datasets over CodeBERT-like model, demonstrating the effectiveness of adapting pretrained LLMs for vulnerability detection in source code. …”
Get full text
Article -
449
BoostPolyGlot: A Structured IR Generation-Based Fuzz Testing Framework for GCC Compiler Frontend
Published 2025-05-01“…The compiler serves as a bridge connecting hardware architecture and application software, converting source code into executable files and optimizing code. Fuzz testing is an automated testing technology that evaluates software reliability by providing a large amount of random or mutated input data to the target system to trigger abnormal program behavior. …”
Get full text
Article -
450
Diagnosis of COVID-19 from Chest X-Ray Images Using Wavelets-Based Depthwise Convolution Network
Published 2021-06-01Get full text
Article -
451
Evaluating Usability and Accessibility of Visual Programming Tools for Novice Programmers—The Case of App Inventor, Scratch, and StarLogo
Published 2024-10-01“…Not all modern engineers will become fully fledged programmers, but sometimes the possibility to use low-code programming environments like LabView or MIT App Inventor will be sufficient. …”
Get full text
Article -
452
“Trojan horse” malware as a mean for obtaining evidence in Italy
Published 2017-06-01“…The Italian code of criminal procedure doesn’t regulate investigations realized with “Trojan horse” malwares located in an electronic device like a smartphone or a tablet. …”
Get full text
Article -
453
Optimization and Verification of One-dimensional Three-field Model for Transient Analysis of Pressurized Water Reactor
Published 2025-05-01“…Internationally, the adoption of three-field models that explicitly account for droplet behavior (as exemplified by codes like SPACE and CATHARE3) has become a prevailing trend to enhance simulation accuracy, particularly for complex thermal-hydraulic phenomena. …”
Get full text
Article -
454
Model for Prediction of Testing Time of a Computer Program for Automated Reliability Evaluation of Semiconductor Devices
Published 2022-12-01“…Software developers would like to know the predicted testing time, which ensures a given operational reliability of a computer program, even before starting work on writing program code. …”
Get full text
Article -
455
Governance for Takaful Operators (Islamic Insurance Companies)
Published 2021-02-01“…Interestingly, this article suggests that the Malaysian Rating Corporation (MARC) guidelines for Islamic financial institutions and the UK Stewardship Code should be used as references in order to develop dedicated stewardship guideline for Islamic financial institutions like takaful operators. …”
Get full text
Article -
456
Comprehensive Insights into Smart Contracts: Architecture, Sectoral Applications, Security Analysis, and Legal Frameworks
Published 2025-02-01“…Smart contracts enable self-execution of contracts whose conditions are expressed explicitly in lines of code by presenting solutions using blockchain technology. …”
Get full text
Article -
457
Development and Verification of a Transient Analysis Tool for Reactor System Using Supercritical CO2 Brayton Cycle as Power Conversion System
Published 2018-01-01“…Heat conduction model, point neutron power model (which is developed for nuclear power application), turbomachinery model for gas turbine, compressor and shaft model, and PCHE type recuperator model are all included in this transient analysis code. The initial verifications were performed for components and constitutive models like heat transfer model, friction model, and compressor model. …”
Get full text
Article -
458
Monte Carlo Few-Group Constant Generation for CANDU 6 Core Analysis
Published 2015-01-01“…The current neutronics design methodology of CANDU-PHWRs based on the two-step calculations requires determining not only homogenized two-group constants for ordinary fuel bundle lattice cells by the WIMS-AECL lattice cell code but also incremental two-group constants arising from the penetration of control devices into the fuel bundle cells by a supercell analysis code like MULTICELL or DRAGON. …”
Get full text
Article -
459
Love in the Time of Computation
Published 2024-06-01“…Developing ideas of love and fantasy, the article argues that, in an era when the unconscious is structured not like language but like code, massed image databases lack a single present time, with consequences for photographic aesthetics. …”
Get full text
Article -
460
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
Published 2014-06-01“…With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. …”
Get full text
Article