Suggested Topics within your search.
Suggested Topics within your search.
-
1461
Alternative sanctions and measures in the criminal justice system of Slovenia
Published 2006-01-01“…The paper presents the ways of introducing both material and procedural alternative measures into the criminal justice system of Slovenia from the beginning of 1990s, particularly into the Criminal Code and the Code of Criminal Procedure in 1995 (with the further amendments). …”
Get full text
Article -
1462
Study on modern malware analysis system
Published 2014-10-01“…The analysis of malicious code’s network behavior is an important research field of network security.This function of existed systems is incomplete and not deep.The functions of malicious code are summarized and a comprehensive content is presented.Moreover the network behavior analysis function of existed analysis systems is introduced and CUCKOO which is able to satisfy the requirements of involved study is found.Finally the advantage and points of this application platform were summarized,and an expansion of the system was proposed.…”
Get full text
Article -
1463
Study on modern malware analysis system
Published 2014-10-01“…The analysis of malicious code’s network behavior is an important research field of network security.This function of existed systems is incomplete and not deep.The functions of malicious code are summarized and a comprehensive content is presented.Moreover the network behavior analysis function of existed analysis systems is introduced and CUCKOO which is able to satisfy the requirements of involved study is found.Finally the advantage and points of this application platform were summarized,and an expansion of the system was proposed.…”
Get full text
Article -
1464
IDEA „KODYFIKACJI” W KULTURZE PRAWNEJ EUROPEJSKIEGO OŚWIECENIA
Published 2016-12-01“…Language of code should be clear, simple, universally understood. …”
Get full text
Article -
1465
IMM4HT:an identification method of malicious mirror website for high-speed network traffic
Published 2019-07-01“…Aiming at the problem that some information causing harm to the network environment was transmitted through the mirror website so as to bypass the detection,an identification method of malicious mirror website for high-speed network traffic was proposed.At first,fragmented data from the traffic was extracted,and the source code of the webpage was restored.Next,a standardized processing module was utilized to improve the accuracy.Additionally,the source code of the webpage was divided into blocks,and the hash value of each block was calculated by the simhash algorithm.Therefore,the simhash value of the webpage source codes was obtained,and the similarity between the webpage source codes was calculated by the Hamming distance.The page snapshot was then taken and SIFT feature points were extracted.The perceptual hash value was obtained by clustering analysis and mapping processing.Finally,the similarity of webpages was calculated by the perceptual hash values.Experiments under real traffic show that the accuracy of the method is 93.42%,the recall rate is 90.20%,the F value is 0.92,and the processing delay is 20 μs.Through the proposed method,malicious mirror website can be effectively detected in the high-speed network traffic environment.…”
Get full text
Article -
1466
COMPARISON BETWEEN THE CRIME OF FRAUD AND THE CRIMES OF FORGERY
Published 2025-05-01“…This article aims to analyze and comparatively comment on the crimes of fraud and forgery in the Romanian Criminal Code from theory and from older and more recent judicial practice. …”
Get full text
Article -
1467
Revisiting Pcu Values of Various Vehicles in Mixed Traffic Conditions: Estimation and Comparison
Published 2025-04-01“…The result of the comparison of obtained PCU values and values given in the IRC code points to conclusion that the IRC codes pertaining to PCU values need revision.…”
Get full text
Article -
1468
Structured volume-law entanglement in an interacting, monitored Majorana spin liquid
Published 2024-12-01“…The sphere itself is a critical boundary with quantum Lifshitz scaling separating the volume-law phase from proximate area-law phases, a color code or a toric code. An exception is a set of tricritical, self-dual points exhibiting effective (1+1)d conformal scaling at which the volume-law phase and both area-law phases meet. …”
Get full text
Article -
1469
On the Interrelation of the Concepts of Corruption, Corruption-Related Crimes and Bribery in the Legislation of the Republic of Kazakhstan and the Russian Federation
Published 2024-03-01“…Statistical data from Russia and Kazakhstan indicate that the number of corruption-related crimes has been increasing, thus pointing at the lack of effective measure of combating this phenomenon. …”
Get full text
Article -
1470
Cross-Architecture Vulnerability Detection Combining Semantic and Attribute Feature
Published 2025-03-01“…Compared with the existing methods, the accuracy can be increased by 0.26 to 7.04 percentage points, and the AUC can be increased by 0.11 to 1.59 percentage points, which has excellent performance in the real environment vulnerability detection.…”
Get full text
Article -
1471
Heterogeneity of diagnosis and documentation of post-COVID conditions in primary care: A machine learning analysis.
Published 2025-01-01“…There were 6,116 patients with a diagnostic code for PCC (U09.9), and 5,020 with diagnostic codes for both PCC and COVID-19. …”
Get full text
Article -
1472
Some Problems of Pedophilia Crimes Delimitation
Published 2013-12-01“…The article deals with the analysis of the changes contributed by the lawmaker to the RF Criminal Code. Here are distinguished contradictory and collision norms, the problems of their qualification. …”
Get full text
Article -
1473
Service Pragmatics as a Tool for State Crisis Management Examples from German, French, Austrian and Hungarian Legal History
Published 2024-06-01“…In many cases, the codification processes were preceded by a kind of struggle, as the civil servants involved tried to apply the code, that conflicted with the government’s interests on several points. …”
Get full text
Article -
1474
MatGeom: A toolbox for geometry processing with MATLAB
Published 2025-02-01“…It provides a collection of functions for the manipulation of common 2D and 3D geometries such as points, lines, ellipses, polygons, or polygon meshes. …”
Get full text
Article -
1475
Addressing Ethics in Plastic and Aesthetic Surgery: Società Italiana di Chirurgia Plastica Ricostruttiva ed Estetica’s Social Media Policy
Published 2025-02-01“…SICPRE’s ethical code, formulated through collaborative efforts and multiple revisions, includes 10 fundamental points addressing professionalism, transparency, patient privacy, and ethical marketing. …”
Get full text
Article -
1476
GNSS Anti-Multipath Technology of UAV for Geological Hazard Monitoring
Published 2024-10-01“…Compared with other structures of multiple correlators, the proposed method only needs to calculate two linear combination codes by the least square method, and the product of the cross-correlation function between the received signal and the two local combination codes is used to obtain an asymmetric S-curve without any false lock points. …”
Get full text
Article -
1477
"I Know It When I See It"
Published 2013-04-01“…In these regards, then, style presents a unique blend of iconicity, short-circuits, prothesis, remediation and simulation that points to and problematizes the inevitable materiality of the human body as a site of and a surface for cultural production. …”
Get full text
Article -
1478
Cultural factors weaken but do not reverse left-to-right spatial biases in numerosity processing: Data from Arabic and English monoliterates and Arabic-English biliterates.
Published 2021-01-01“…The absence of significant biases in all Arabic-reading groups (biliterates and Arabic monoliterates) points to a potential conflict between distinct spatial-numerical mapping codes. …”
Get full text
Article -
1479
Service Pragmatics as a Tool for State Crisis Management Examples from German, French, Austrian and Hungarian Legal History
Published 2024-06-01“…In many cases, the codification processes were preceded by a kind of struggle, as the civil servants involved tried to apply the code, that conflicted with the government’s interests on several points. …”
Get full text
Article -
1480
Expert Concepts in Forensic Ecology
Published 2021-04-01“…The article addresses the existing points of view on the term “the language of forensic expertise”. …”
Get full text
Article