Showing 1,281 - 1,300 results of 1,345 for search 'quantitative coding', query time: 0.11s Refine Results
  1. 1281

    PROBLEM OF CRIMINAL REPRESSION, APPLIED OUTSIDE OF CRIMINAL LIABILITY by V. Stepashin

    Published 2017-03-01
    “…Moreover, the rules of court fine destination identical rules of criminal sentencing. 2) Quantitatively court fine may exceed the minimum limits of criminal punish-ment in the form of fines. …”
    Get full text
    Article
  2. 1282

    CTF development, verification, and validation for VVER core thermal-hydraulics and multi-physics modeling and simulation by Yesim Kutlu, Ivan Spasov, Svetlomir Mitkov, Pascal Rouxelin, Agustin Abarca, Nikola Kolev, Maria Avramova, Kostadin Ivanov, Kostadin Ivanov

    Published 2025-08-01
    “…Coarse-mesh multi-physics solutions for a full core have been obtained with the coupled COBAYA/CTF, COBAYA/FLICA4, and PARCS/CTF codes. These solutions have been compared against steady-state plant data and code-to-code for transients. …”
    Get full text
    Article
  3. 1283

    Upper bounds of differential branch number of $$n$$ n -bit permutations by Ying Gao, Lin Qi

    Published 2025-05-01
    “…This paper analyses the existence problem of binary codes with a specified dimension and minimum distance using combinatorial inequality. …”
    Get full text
    Article
  4. 1284

    Integrating Generative Artificial Intelligence and Problem-Based Learning into the Digitization in Construction Curriculum by Reza Maalek

    Published 2024-11-01
    “…The aim was to help students generate computer code to solve, automate, and streamline practical challenges in advanced construction engineering and management (CEM). …”
    Get full text
    Article
  5. 1285

    Study Based on Bridge Health Monitoring System on Multihazard Load Combinations of Earthquake and Truck Loads for Bridge Design in the Southeast Coastal Areas of China by Dezhang Sun, Bin Chen, Baitao Sun

    Published 2015-01-01
    “…Similar to American LRFD Bridge Design Specifications, the current Chinese bridge design code is fully calibrated against gravity load and live load. …”
    Get full text
    Article
  6. 1286

    Power-law Beta Calculations for Realistic Mammography Images from Egs_cbct Simulation by Déte van Eeden, F. C. P. du Plessis

    Published 2025-04-01
    “…Purpose: The goal is to determine if the egs_cbct simulation code can successfully simulate the mammography images by extracting the β-values from them. …”
    Get full text
    Article
  7. 1287

    Fast pressure crash related to m/n = 3/2 double tearing mode by X.Q. Lu, W. Guo, Z.W. Ma, W. Zhang

    Published 2024-01-01
    “…The CLT code is employed to quantitatively investigate how a single destabilization of the m / n = 3/2 double tearing mode (DTM) and sequential destabilizations of multi-DTMs affect the pressure crash. …”
    Get full text
    Article
  8. 1288

    Les deux roues motorisées et les accidents de circulation dans la ville de Koudougou (Burkina Faso) by Sylvain Roger BONKOUNGOU, Sylvestre BAMA

    Published 2025-06-01
    “…Pour aboutir aux résultats, une méthodologique combinant données quantitatives et qualitatives issues de la revue de littérature et enquêtes de terrain a été utilisée. …”
    Get full text
    Article
  9. 1289

    The first WHO reference panel for Infliximab anti-drug antibodies: a step towards harmonizing therapeutic drug monitoring by Meenu Wadhwa, Isabelle Cludts, Eleanor Atkinson, Peter Rigsby

    Published 2025-03-01
    “…Overall, the panel comprising A (coded 19/234) and B (coded 19/232) was suitable and established by the WHO Expert Committee on Biological Standardization in October 2022 as the WHO international reference panel for infliximab ADA assays. …”
    Get full text
    Article
  10. 1290

    Threat analysis and defense methods of deep-learning-based data theft in data sandbox mode by Hezhong PAN, Peiyi HAN, Xiayu XIANG, Shaoming DUAN, Rongfei ZHUANG, Chuanyi LIU

    Published 2021-11-01
    “…The threat model of deep-learning-based data theft in data sandbox model was analyzed in detail, and the degree of damage and distinguishing characteristics of this attack were quantitatively evaluated both in the data processing stage and the model training stage.Aiming at the attack in the data processing stage, a data leakage prevention method based on model pruning was proposed to reduce the amount of data leakage while ensuring the availability of the original model.Aiming at the attack in model training stage, an attack detection method based on model parameter analysis was proposed to intercept malicious models and prevent data leakage.These two methods do not need to modify or encrypt data, and do not need to manually analyze the training code of deep learning model, so they can be better applied to data theft defense in data sandbox mode.Experimental evaluation shows that the defense method based on model pruning can reduce 73% of data leakage, and the detection method based on model parameter analysis can effectively identify more than 95% of attacks.…”
    Get full text
    Article
  11. 1291

    A User-Friendly Machine Learning Pipeline for Automated Leaf Segmentation in by Michelle Lynn Yung, Kamila Murawska-Wlodarczyk, Alicja Babst-Kostecka, Raina Margaret Maier, Nirav Merchant, Aikseng Ooi

    Published 2025-06-01
    “…In addition, we integrate QR codes for automated sample identification and benchmark multiple QR code decoding libraries, evaluating their robustness under real-world imaging conditions like distortion and lighting variation. …”
    Get full text
    Article
  12. 1292

    Critical behavior of Fredenhagen-Marcu string order parameters at topological phase transitions with emergent higher-form symmetries by Wen-Tao Xu, Frank Pollmann, Michael Knap

    Published 2025-05-01
    “…In this work, we find that the FM string order parameter exhibits universal scaling behavior near critical points of charge condensation transitions, by directly evaluating the FM string order parameter in the infinite string-length limit using infinite Projected Entangled Pair States (iPEPS) for the toric code in a magnetic field. Our results thus demonstrate that the FM string order parameter represents a quantitatively well-behaved order parameter. …”
    Get full text
    Article
  13. 1293

    Model studies on groundwater efficiency as a low-grade energy source by V. R. Voloshin, K. V. Belov

    Published 2024-11-01
    “…The feasibility of using groundwater aquifers as a low-grade heat energy source has been quantitatively assessed. The most optimal operational scheme has been selected.…”
    Get full text
    Article
  14. 1294

    Modelling COVID-19 transmission in supermarkets using an agent-based model. by Fabian Ying, Neave O'Clery

    Published 2021-01-01
    “…We apply our model to synthetic store and shopping data to show how one can use our model to estimate exposure time and thereby the number of infections due to human-to-human contact in stores and how to model different store interventions. The source code is openly available under https://github.com/fabianying/covid19-supermarket-abm. …”
    Get full text
    Article
  15. 1295

    Impact and compensation of sample clock offset in I-CFDMA uplink by Dan DING, Nai-ping CHENG, Yu-rong LIAO

    Published 2015-10-01
    “…To achieve the sample clock synchronization in the interleaved code and frequency division multiple access(I-CFDMA)uplink,the I-CFDMA uplink model was established,and the disturbance of the sample clock offset(SCO)on the system model was discussed,in addition,the signal time shift,phase rotation,multi-user interference(MUI)and inter-carrier interference(ICI)caused by SCO were analyzed quantitatively.On this basis,a compensation method of multi-user SCO was proposed.For one thing,the relevant metric function was modified considering the SCO of each user; for another thing,a multi-user detection(MUD)algorithm based on harmony search was proposed.This algorithm has a higher efficiency than the commonly-used genetic algorithm(GA),as well as a performance approximate to that of optimal detection without SCO but with <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mn>1</mn> <mrow> <mn>64</mn></mrow> </mfrac> </math></inline-formula> computational burden.The computer simulation results validate the conclusions obtained.…”
    Get full text
    Article
  16. 1296

    First Calculations of Starspot Spectra Based on 3D Radiative Magnetohydrodynamics Simulations by H. N. Smitha, Alexander I. Shapiro, Veronika Witzke, Nadiia M. Kostogryz, Yvonne C. Unruh, Tanayveer S. Bhatia, Robert Cameron, Sara Seager, Sami K. Solanki

    Published 2024-01-01
    “…We simulate spots on G2V, K0V, and M0V stars with the 3D radiative magnetohydrodynamics code MURaM and calculate spectra ( R  ≈ 500 from 250 to 6000 nm) using ray-by-ray radiative transfer with the MPS-ATLAS code. …”
    Get full text
    Article
  17. 1297

    Evaluation of Particle Size and Friction Coefficients in Sintered Metal Process Development by Discrete Element Simulation by Naoki Yashiro, Natsuko Sugimura, Hitoshi Washizu

    Published 2025-05-01
    “…The effects of particle size and friction coefficients of Fe-Ni-Mo steel powder on their filling behavior by a discrete element method (DEM) simulation were investigated. Our original DEM code based on FDPS (Framework for Developing Particle Simulator) was used for these simulations. …”
    Get full text
    Article
  18. 1298

    Penyelesaian Persamaan Schrodinger Tidak Bergantung Waktu Dengan Metode Finite Difference by I Gusti Agung Widagda, I Nengah Artawan, Wayan Gede Suharta, I Gde Antha Kasmawan

    Published 2025-01-01
    “…In order to prove quantitatively that the TISE solution of the finite difference method is the same as or close to that of the analytical method, it is carried out by using linear regression and the z test. …”
    Get full text
    Article
  19. 1299

    L'évaluation des habiletés mathématiques de l'enfant : inventaire critique des outils disponibles by Anne LAFAY, Marie-Catherine Saint-Pierre, Joël MACOIR

    Published 2014-12-01
    “…-à-d. le traitement des quantités présentées dans les codes numériques analogique, arabe et oral) indispensable pour identifier la présence d’un trouble cognitif numérique et envisager le diagnostic de dyscalculie. …”
    Get full text
    Article
  20. 1300

    Dynamic changes in aroma of large-leaf yellow tea during the whole processing at an industrial scale: From fresh leaf to finished tea by Jing Wang, Yuemeng Hu, Zhenyu Guan, Ronggang Zhai, Jieyao Yu, Marina Rigling, Yanyan Zhang, Xiaochun Wan, Xiaoting Zhai

    Published 2025-05-01
    “…Large-leaf yellow tea (LYT) is a yellow tea product with a specific aroma characteristic and the flavor code has recently been revealed. To elucidate the transformation of odorants from fresh leaves to finished LYT, this study tracked dynamic changes in aroma compounds throughout an industrial-scale experiment. …”
    Get full text
    Article