Suggested Topics within your search.
Showing 1,461 - 1,480 results of 1,838 for search 'point coding', query time: 0.12s Refine Results
  1. 1461

    Alternative sanctions and measures in the criminal justice system of Slovenia by Šelih Alenka

    Published 2006-01-01
    “…The paper presents the ways of introducing both material and procedural alternative measures into the criminal justice system of Slovenia from the beginning of 1990s, particularly into the Criminal Code and the Code of Criminal Procedure in 1995 (with the further amendments). …”
    Get full text
    Article
  2. 1462

    Study on modern malware analysis system by Yi ZHAO, Jian GONG, Wang YANG

    Published 2014-10-01
    “…The analysis of malicious code’s network behavior is an important research field of network security.This function of existed systems is incomplete and not deep.The functions of malicious code are summarized and a comprehensive content is presented.Moreover the network behavior analysis function of existed analysis systems is introduced and CUCKOO which is able to satisfy the requirements of involved study is found.Finally the advantage and points of this application platform were summarized,and an expansion of the system was proposed.…”
    Get full text
    Article
  3. 1463

    Study on modern malware analysis system by Yi ZHAO, Jian GONG, Wang YANG

    Published 2014-10-01
    “…The analysis of malicious code’s network behavior is an important research field of network security.This function of existed systems is incomplete and not deep.The functions of malicious code are summarized and a comprehensive content is presented.Moreover the network behavior analysis function of existed analysis systems is introduced and CUCKOO which is able to satisfy the requirements of involved study is found.Finally the advantage and points of this application platform were summarized,and an expansion of the system was proposed.…”
    Get full text
    Article
  4. 1464

    IDEA „KODYFIKACJI” W KULTURZE PRAWNEJ EUROPEJSKIEGO OŚWIECENIA by Katarzyna Sójka-Zielińska

    Published 2016-12-01
    “…Language of code should be clear, simple, universally understood. …”
    Get full text
    Article
  5. 1465

    IMM4HT:an identification method of malicious mirror website for high-speed network traffic by Lei ZHANG, Peng ZHANG, Wei SUN, Xingdong YANG, Lichao XING

    Published 2019-07-01
    “…Aiming at the problem that some information causing harm to the network environment was transmitted through the mirror website so as to bypass the detection,an identification method of malicious mirror website for high-speed network traffic was proposed.At first,fragmented data from the traffic was extracted,and the source code of the webpage was restored.Next,a standardized processing module was utilized to improve the accuracy.Additionally,the source code of the webpage was divided into blocks,and the hash value of each block was calculated by the simhash algorithm.Therefore,the simhash value of the webpage source codes was obtained,and the similarity between the webpage source codes was calculated by the Hamming distance.The page snapshot was then taken and SIFT feature points were extracted.The perceptual hash value was obtained by clustering analysis and mapping processing.Finally,the similarity of webpages was calculated by the perceptual hash values.Experiments under real traffic show that the accuracy of the method is 93.42%,the recall rate is 90.20%,the F value is 0.92,and the processing delay is 20 μs.Through the proposed method,malicious mirror website can be effectively detected in the high-speed network traffic environment.…”
    Get full text
    Article
  6. 1466

    COMPARISON BETWEEN THE CRIME OF FRAUD AND THE CRIMES OF FORGERY by Alexandru STAN

    Published 2025-05-01
    “…This article aims to analyze and comparatively comment on the crimes of fraud and forgery in the Romanian Criminal Code from theory and from older and more recent judicial practice. …”
    Get full text
    Article
  7. 1467

    Revisiting Pcu Values of Various Vehicles in Mixed Traffic Conditions: Estimation and Comparison by Amir Ali Khan, Sachin Dass

    Published 2025-04-01
    “…The result of the comparison of obtained PCU values and values given in the IRC code points to conclusion that the IRC codes pertaining to PCU values need revision.…”
    Get full text
    Article
  8. 1468

    Structured volume-law entanglement in an interacting, monitored Majorana spin liquid by Guo-Yi Zhu, Nathanan Tantivasadakarn, Simon Trebst

    Published 2024-12-01
    “…The sphere itself is a critical boundary with quantum Lifshitz scaling separating the volume-law phase from proximate area-law phases, a color code or a toric code. An exception is a set of tricritical, self-dual points exhibiting effective (1+1)d conformal scaling at which the volume-law phase and both area-law phases meet. …”
    Get full text
    Article
  9. 1469

    On the Interrelation of the Concepts of Corruption, Corruption-Related Crimes and Bribery in the Legislation of the Republic of Kazakhstan and the Russian Federation by E. I. Chekmezova, Z. D. Ermеkova

    Published 2024-03-01
    “…Statistical data from Russia and Kazakhstan indicate that the number of corruption-related crimes has been increasing, thus pointing at the lack of effective measure of combating this phenomenon. …”
    Get full text
    Article
  10. 1470

    Cross-Architecture Vulnerability Detection Combining Semantic and Attribute Feature by LI Kun, LI Bin, ZHU Wenjing, ZHOU Qinglei

    Published 2025-03-01
    “…Compared with the existing methods, the accuracy can be increased by 0.26 to 7.04 percentage points, and the AUC can be increased by 0.11 to 1.59 percentage points, which has excellent performance in the real environment vulnerability detection.…”
    Get full text
    Article
  11. 1471
  12. 1472

    Some Problems of Pedophilia Crimes Delimitation by Yu. S. Pestereva, I. A. Kuznetsova

    Published 2013-12-01
    “…The article deals with the analysis of the changes contributed by the lawmaker to the RF Criminal Code. Here are distinguished contradictory and collision norms, the problems of their qualification. …”
    Get full text
    Article
  13. 1473

    Service Pragmatics as a Tool for State Crisis Management Examples from German, French, Austrian and Hungarian Legal History by Balázs Sallai

    Published 2024-06-01
    “…In many cases, the codification processes were preceded by a kind of struggle, as the civil servants involved tried to apply the code, that conflicted with the government’s interests on several points. …”
    Get full text
    Article
  14. 1474

    MatGeom: A toolbox for geometry processing with MATLAB by David Legland

    Published 2025-02-01
    “…It provides a collection of functions for the manipulation of common 2D and 3D geometries such as points, lines, ellipses, polygons, or polygon meshes. …”
    Get full text
    Article
  15. 1475

    Addressing Ethics in Plastic and Aesthetic Surgery: Società Italiana di Chirurgia Plastica Ricostruttiva ed Estetica’s Social Media Policy by Fabrizio Schonauer, MD, Anna Scarabosio, MD, Matilde Tettamanzi, MD, Monica Zena, MD, Annachiara Cavaliere, MD, Roberta Tornambene, MD, Mirco Pozzi, MD, Giulio Tarantino, MD, Daniele Matta, MD, Dorina Macchi, MD, Stefania De Fazio, MD

    Published 2025-02-01
    “…SICPRE’s ethical code, formulated through collaborative efforts and multiple revisions, includes 10 fundamental points addressing professionalism, transparency, patient privacy, and ethical marketing. …”
    Get full text
    Article
  16. 1476

    GNSS Anti-Multipath Technology of UAV for Geological Hazard Monitoring by FENG Jianhui, YANG Xiuzheng, MA Wenliang, SHEN Feng

    Published 2024-10-01
    “…Compared with other structures of multiple correlators, the proposed method only needs to calculate two linear combination codes by the least square method, and the product of the cross-correlation function between the received signal and the two local combination codes is used to obtain an asymmetric S-curve without any false lock points. …”
    Get full text
    Article
  17. 1477

    "I Know It When I See It" by Marc Ouellette

    Published 2013-04-01
    “…In these regards, then, style presents a unique blend of iconicity, short-circuits, prothesis, remediation and simulation that points to and problematizes the inevitable materiality of the human body as a site of and a surface for cultural production. …”
    Get full text
    Article
  18. 1478

    Cultural factors weaken but do not reverse left-to-right spatial biases in numerosity processing: Data from Arabic and English monoliterates and Arabic-English biliterates. by Dominique Lopiccolo, Charles B Chang

    Published 2021-01-01
    “…The absence of significant biases in all Arabic-reading groups (biliterates and Arabic monoliterates) points to a potential conflict between distinct spatial-numerical mapping codes. …”
    Get full text
    Article
  19. 1479

    Service Pragmatics as a Tool for State Crisis Management Examples from German, French, Austrian and Hungarian Legal History by Balázs Sallai

    Published 2024-06-01
    “…In many cases, the codification processes were preceded by a kind of struggle, as the civil servants involved tried to apply the code, that conflicted with the government’s interests on several points. …”
    Get full text
    Article
  20. 1480

    Expert Concepts in Forensic Ecology by N. V. Mikhaleva

    Published 2021-04-01
    “…The article addresses the existing points of view on the term “the language of forensic expertise”. …”
    Get full text
    Article