-
481
A Brief Overview of the Pawns Programming Language
Published 2024-11-01“…All destructive update of variables is made obvious in Pawns code, via annotations on statements and in type signatures. …”
Get full text
Article -
482
Virtual Channel Purification
Published 2025-05-01“…Another variant of VEC can mimic the error-suppression power of the surface code by inputting only a bit-flip and a phase-flip code. …”
Get full text
Article -
483
Reverse Cyclic Loading Effect on RCC Wall-Floor Slab-Deep Beam Connection
Published 2022-01-01“…This article presents the experimental investigations carried out to study the behavior of three different reinforcement detailing in RCC wall-floor slab-deep beam connections, such as (1) 90° bend up bars connection as per Indian Standard Code (Conventional connection), (2) U-hooks connecting the core region as per Euro code 2, and (3) proposed U-hooks with additional reinforcement in the core region transverse to the beam orientation. …”
Get full text
Article -
484
Missense variants in FRS3 affect body mass index in populations of diverse ancestries
Published 2025-03-01Get full text
Article -
485
Numerical Study of Ultra-High Voltage Transmission Tower Wind Loads Characteristics Against Tornado
Published 2023-08-01“…The measured radar data of Spencer tornado as the velocity inlet are adopted to generate the tornado-like wind field, and the impacts of the surface roughness are considered. …”
Get full text
Article -
486
PermQRDroid: Android malware detection with novel attention layered mini-ResNet architecture over effective permission information image
Published 2024-10-01“…Methods In this study, an attention-layered mini-ResNet model is proposed, which can detect QR code-like images created using the 100 most effective defined permission information of Android applications. …”
Get full text
Article -
487
-
488
Study of Spectral and thermal properties of Selenium Diatomic Halides by Semi-empirical Treatment
Published 2008-06-01“…The relevant molecular parameters like interatomic distance, bond angle, dihedral angle and net charge were also calculated.…”
Get full text
Article -
489
Grounded Description
Published 2016-12-01“…Grounded description is trying to describe the population studied, like a QDA study requires, by describing all the interchangeable indicators that grounded the concept. …”
Get full text
Article -
490
FORENSIC ASSESSMENT OF HOMEMADE AIRSOFT GRENADES
Published 2018-03-01“…Results indicate that these devices that consist of a cardboard (paper) or rubber-like casing filled with dried peas, with a «Korsar-4» firecracker in the middle, have the formal characteristics of an explosive device but cannot be regarded as such (as per Article 222 of the Criminal Code of the Russian Federation), since they are in effect typical imitation pyrotechnic devices similar to dummy hand grenades RGS-4 and display no significant damaging properties.…”
Get full text
Article -
491
Waveform Design using Second Order Cone Programming in Radar Systems
Published 2019-12-01“…Finally, the obtained optimization problem is tackled using CVX toolbox. To obtain the code vectors from the extracted optimal code matrix, we use rank-onedecomposition. …”
Get full text
Article -
492
Transformer fault diagnose intelligent system based on DGA methods
Published 2025-03-01“…While traditional DGA methods such as the IEC Code, Rogers Ratio, and Duval triangle exist, their diagnostic accuracies are often lacking. …”
Get full text
Article -
493
Polyethylene terephthalate track etched membrane for recovery of helium from helium-nitrogen system
Published 2023-06-01“…The range of various ion beams was also calculated using the SRIM code. The effect of incident energy of irradiation beam (Si: 70 and 90 MeV and Cl: 84, 100 and 115 MeV) and etching parameters like concentration of NaOH, temperature, UV radiation, and ultrasonication on the control and irradiated polymer films (~25 μm thickness) were studied. …”
Get full text
Article -
494
7. GROUND IMPROVEMENT AND FOUNDATION DESIGN OF INDUSTRIAL FACILITIES ON LOESS SOIL
Published 2024-11-01“…The geological conditions at the site present significant challenges due to the presence of local loess soil, which has been classified as "collapsible – Type II" in accordance with the Bulgarian Shallow Foundations Code, extending to a depth of 12 meters. To adhere to the code requirements and meet the stringent operational limitations imposed on the silos, including restrictions on foundation settlement and tilt, two potential approaches are considered. …”
Get full text
Article -
495
The Status of the Right of Refusal of the Wife in Cases of Unspecified Dowry in Comparative Jurisprudence and Iranian Law
Published 2024-12-01“…This conclusion is justified based on Fiqhi principles such as the prohibition of harm (Lā dharar) and the alleviation of hardship (Nafy-e Usr o Haraj), as well as legal principles like the promotion of family stability and the broad interpretation of Article 1085 of the Civil Code.…”
Get full text
Article -
496
Consistent movement of viewers' facial keypoints while watching emotionally evocative videos.
Published 2024-01-01“…Unlike existing facial expression-based methodologies that measure CRM of secondary indicators like inferred emotions, keypoint, and ICA-based features, the Average t-statistic is closely associated with the direct measurement of consistent facial muscle movement using the Facial Action Coding System (FACS). …”
Get full text
Article -
497
Non-Orthogonal Multiple Access Technology for 5G Systems
Published 2015-05-01“…To meet the 5G requirements on spectral efficiency and number of connections,non-orthogonal multiple access(NMA)technology is becoming an important candidate technology.It was shed light on how NMA can be used to further improve spectral efficiency over OMA,in order to achieve the multiple user channel capacity.Detailed analysis were given on the design principle,signal processing and resultant performance gain of three typical NMA schemes including power-domain,constellation-domain and code-domain NMA.Furthermore,network operating aspects for NMA like deployment scenarios,system design impact as well as network backward compatibility were presented.…”
Get full text
Article -
498
Evaluating the Capability of the Flux-Limiter Schemes in Capturing Strong Shocks and Discontinuities
Published 2013-01-01“…The governing equations consist of one-dimensional and quasi-one-dimensional Euler equations solved using an in-house numerical code. In order to validate the solution, the obtained results are compared with other results found in the literature.…”
Get full text
Article -
499
METHOD OF CONTENT-DEPENDENT WATERMARKING IMAGES BASED ON SECURITY VISUAL SECRET SHARING SCHEME
Published 2019-06-01“…A method of content-dependent watermarking images without embedding digital watermark based on visual secret sharing scheme, which allows to encrypt the digital watermark as a noise like secret and public shadow images using binary content-dependent wavelet-pattern with visually significance features and code table and to reconstruct the digital watermark by means of performing a logical operation (AND, OR or XOR) on a secret and a public shadow images. …”
Get full text
Article -
500
The model of client-server interaction with non-resident servers
Published 2019-06-01“…The proposed model is applied to the extensible programming of Microsoft Office applications, which allows to solve such issues like organization of cross-module interaction, elimination of code and data duplication in each module and export of common functionality for all modules.…”
Get full text
Article