Suggested Topics within your search.
Suggested Topics within your search.
-
1501
Accounting for the Different Propagation Velocities for the Focusing and Time–Depth Conversion in a Layered Medium
Published 2024-12-01“…We will present a strategy for mitigating this problem. The strength points of this strategy are its simplicity and the fact that it only requires a commercial code for the GPR data processing plus some steps easily implementable through a homemade code. …”
Get full text
Article -
1502
Predicting Unsteady Flow Parameters in a Subsonic Air Diffuser Using MacCormack’s Explicit Method
Published 2019-04-01“…The grid model suggested for the diffuser has 20 points in the horizontal direction and 30 points in the vertical direction. …”
Get full text
Article -
1503
PROCESSING OF RESULTS FROM A THERMAL FEM ANALYSIS USING THE LOCK-IN METHOD AND COMPARISON WITH EXPERIMENT
Published 2019-09-01“…Lock-in method was applied to the results from the numerical thermal FEM analysis and the phase image was created. The programs code were created in MATLAB for a 4 points, multiple points and differential lockin method which were compared with the results from the experiment.…”
Get full text
Article -
1504
RELAP5 Modeling of a Siphon Break Effect on the Brazilian Multipurpose Reactor
Published 2021-02-01“…A RELAP5/Mod3 code model was developed for thermal-hydraulic simulation of the RMB to analyze the phenomenology of the Siphon Breakers device (four flap valves in the cold leg and one open tube for the atmosphere in the hot leg) during a Loss of Coolant Accident (LOCA) at different points in the primary circuit. …”
Get full text
Article -
1505
Temperature field characteristics of concrete box girders in rigid-frame bridges based on fine simulation and monitoring
Published 2025-08-01“…Some temperature difference models differ from the gradient patterns specified in the code substantially. The research results of this study can supply references for temperature field simulation, temperature effects calculation, and codes design for long-span double-box single-cell concrete box girder bridges.…”
Get full text
Article -
1506
About the certification of railway rails
Published 2013-10-01“…With reference to a series of fatigue, fracture toughness and fatigue crack growth tests carried out by the authors on specimens extracted from rails, the main lacks in the current standards, related to both the choice of the control parameters and the testing procedures, are pointed out. Regarding the crack growth testing, several procedures to compute the crack growth rates to be compared with the limits prescribed by the Code are proposed. …”
Get full text
Article -
1507
Are quality assessments in science affected by anchoring effects? - Empirical results from a survey of authors assessing previously cited papers.
Published 2025-01-01“…Anchoring occurs when initial values are used by humans as starting points in assessments. We investigated the prevalence of anchoring effects in the quality assessments of scientific papers. …”
Get full text
Article -
1508
The Legal Regulation of the Proprietary Rights in the People’s Republic of China: Comparison with Russian Law
Published 2011-03-01“…The article is devoted to the analysis of the Law of the People’s Republic of China “On proprietary rights” which is compared in the basic points with relevant Russian legislation (mainly Civil Code of Russia). …”
Get full text
Article -
1509
SECURITY ASSESSMENT OF MOODLE-BASED DISTANCE LEARNING SYSTEM COMPONENTS USING STATIC ANALYSIS TOOLS
Published 2025-07-01“…Using SonarQube (v9.9 LTS) and SonarScanner, deployed in an isolated WSL2 environment via Docker containers, a comprehensive static analysis was performed on 5,892 lines of source code. The analysis revealed 589 issues, distributed as follows: 72 reliability-related problems, 532 maintainability issues, and 2 critical points marked as security hotspots requiring manual review. …”
Get full text
Article -
1510
Degeneration of Character, Aesthetics of Origin, and Augmented Absence in Posthuman Cinema
Published 2024-07-01“…What does cinema mean as the product of a character created as codes (computer code) in a trans-image form that transcends characters created as modus in the form of an image? …”
Get full text
Article -
1511
Legislation of the byzantine emperors of the 8th — early 10th centuries on monks: traditions and innovations
Published 2024-12-01“…Therefore, the study involved collecting the most complete set of all norms of the period, and determining what part of Justinian’s extensive legislation was included in the legal codes of this time, what exactly the compilers of the codes borrowed, what new they brought. …”
Get full text
Article -
1512
CONSIDERATIONS FOR CONTROLLED COMPETITION LANDINGS IN GYMNASTICS: AGGREGATED OPINIONS OF EXPERTS
Published 2015-10-01“…The experts highlighted concerns about safety and the study concluded that on-going monitoring of the rules on competition landings within the Code of Points (Fédération Internationale de Gymnastique, 2015) would be beneficial to the sport. …”
Get full text
Article -
1513
On Genre as the Primary Unit of Language (Not Only) in Law
Published 2024-10-01“…Taking as points of departure modern pragmatic theory and the information-theoretic view of communication offered by Levinson, this paper re-defines the notion of “genre” as a primarily top-down functioning kind of pre-existing, conventionalized package deal in construing meaning. …”
Get full text
Article -
1514
基于UG二次开发的2K-H行星齿轮传动虚拟装配
Published 2006-01-01“…Two kinds of method to implement virtual assembly of 2K-H planet gear transmission-are presented according to UG connection constraint method and dimension-driving. It is pointed out that assembly modeling based on dimension -driving is realized easily by program. …”
Get full text
Article -
1515
Deep Class-Guided Hashing for Multi-Label Cross-Modal Retrieval
Published 2025-03-01“…However, existing cross-modal hashing methods either focus solely on exploring relationships between data points—which inevitably leads to intra-class dispersion—or emphasize the relationships between data points and categories while neglecting the preservation of inter-class structural relationships, resulting in suboptimal hash codes. …”
Get full text
Article -
1516
Procedure to optimize the solid angle for the colimation of the nai detector used to measure the flow rate in pipelines
Published 2021-04-01“…One of the points is a correct detector / duct geometry at the two measurement points because the quality of the contents depends on the passage across a straight section of the radioactive duct. …”
Get full text
Article -
1517
Criminal acts related to the exploitation of child pornography through abuse of computer systems and networks: International and domestic criminal legislation framework
Published 2009-01-01“…The paper points out the importance of newly adopted international norms and standards that State Parties should undertake to aim a more adequate protection of children from sexual exploitation especially a pornography exploitation. …”
Get full text
Article -
1518
Identification of Cyber Crimes in Turkey and Content Analysis For Infringements
Published 2014-03-01“…Within this framework, considerations such as their subjects, features, application conditions of laws, problems occurred and defective points are addressed. As a result of the analysis, the provisions of the law violated are stated with the reasons. …”
Get full text
Article -
1519
Abnormal event detection in surveillance videos through LSTM auto-encoding and local minima assistance
Published 2025-03-01“…For anomaly detection, we map video data to a lower-dimensional space (latent code) and compare it against the distribution of codes from normal sequences. …”
Get full text
Article -
1520
Precise Design of Solid Rocket Motor Heat Insulation Layer Thickness under Nonuniform Dynamic Burning Rate
Published 2019-01-01“…An improved geometric intersection algorithm is developed to generate the required sampling points, saving 35% computation time compared to its open source equivalent. …”
Get full text
Article