Suggested Topics within your search.
Suggested Topics within your search.
-
161
-
162
-
163
-
164
A Novel Data Encryption Algorithm To Ensure Database Security
Published 2023-06-01Get full text
Article -
165
Genome characterization through dichotomic classes: An analysis of the whole chromosome 1 of A. thaliana
Published 2012-11-01Get full text
Article -
166
-
167
-
168
Experimental and Numerical Simulation of Wheel-Rail Adhesion and Wear Using a Scaled Roller Rig and a Real-Time Contact Code
Published 2014-01-01“…The contact code replicates a testing machine composed of a roller rig with a prototype of a single suspended wheelset pressed onto it with a variable load. …”
Get full text
Article -
169
-
170
-
171
-
172
Amendment of the Criminal Code of the Russian Empire of 1903: Encroachment on a non-existent or clearly unsuitable object as a circumstance excluding criminal liability
Published 2025-03-01“…It presents and analyzes the practice of the Governing Senate (the highest court of the Russian Empire) concerning offences involving imaginary or unsuitable objects of crime during the period when the Criminal Punishment and Correctional Statute - the predecessor to the 1903 Criminal Code - was in effect. The analysis concludes that there was an inconsistency in the judicial practices, highlighting a pressing need for law enforcers at that time to have clear and reasonable criteria on this issue. …”
Get full text
Article -
173
RELATION BETWEEN VAULT DIFFICULTY VALUES AND BIOMECHANICAL PARAMETERS IN MEN'S ARTISTIC GYMNASTICS
Published 2011-10-01Get full text
Article -
174
-
175
"Akadémiai etika és integritás" – gondolatok egy új egyetemi tantárgy margójára
Published 2021-12-01Get full text
Article -
176
-
177
ALJAŽ PEGAN GYMNASTIC RESULTS DEVELOPMENT AT WORLD CHAMPIONSHIPS
Published 2017-10-01Get full text
Article -
178
Try for Recognition: Cultural Explanation of Suicide Action in Ilam
Published 2018-09-01“…Through analyzing the symbols, codes and narratives of suicide, it is understood that suicide is thought to be a way the person is recognized.…”
Get full text
Article -
179
Software diversification method based on binary rewriting
Published 2023-04-01Get full text
Article -
180
Algebraic Linear Analysis for Number Theoretic Transform in Lattice-Based Cryptography
Published 2025-06-01“… The topic of verifying postquantum cryptographic software has never been more pressing than today between the new NIST postquantum cryptosystem standards being finalized and various countries issuing directives to switch to postquantum or at least hybrid cryptography in a decade. …”
Get full text
Article