Results 41 to 50 of about 1,012,999 (323)

Harmonized European Standards for Proof of Competence of Cranes

open access: yesE3S Web of Conferences, 2018
With EN 13001-1 ff. a harmonized set of standards for safety of cranes was and is established. Due to harmonization the use of the standards leads to the assumption of conformity with the safety requirements of the machinery directive.
VÖth Stefan   +2 more
doaj   +1 more source

Overview of standard and technology development of underground explosion-proof electrical equipment

open access: yesGong-kuang zidonghua, 2015
The paper summarized coal mine underground explosion-proof electrical technique and its development, emphatically introduced the actualities and development trend of coal mine underground explosion-proof electrical standards, analyzed and studied the ...
GAO Peng   +3 more
doaj   +1 more source

BURDEN OF PROOF: PROCEDURAL UNDERSTANDING OF STANDARD OF PROOF

open access: yesAdministrative and Criminal Justice, 2017
Topicality of a subject-matter “Burden of proof: Procedural understanding of standard of proof” is based on ambiguous understanding of the standard of proof in legal practice, that is, of the moment when a fact is considered to be proven or unproven.
Jurkeviča, Tatjana, Šmits, Kaspars
openaire   +2 more sources

Time after time – circadian clocks through the lens of oscillator theory

open access: yesFEBS Letters, EarlyView.
Oscillator theory bridges physics and circadian biology. Damped oscillators require external drivers, while limit cycles emerge from delayed feedback and nonlinearities. Coupling enables tissue‐level coherence, and entrainment aligns internal clocks with environmental cues.
Marta del Olmo   +2 more
wiley   +1 more source

Application of the Balance of Probabilities Standard of Proof in Judicial Practice

open access: yesLaw Review of Kyiv University of Law, 2020
The paper describes key standards of proof used in common law countries: balance of probabilities and beyond reasonable doubt,applied in judicial practice in the UK, and the criminal standard beyond reasonable doubt, civil standard preponderance of ...
I. But
semanticscholar   +1 more source

Software-Programmed Optical Networking with Integrated NFV Service Provisioning [PDF]

open access: yes, 2017
We showcase demonstrations of “program & compile” styled optical networking as well as open platforms & standards based NFV service provisioning using a proof-of-concept implementation of the Software-Programmed Networking Operating System (SPN ...
Basu, Shrutarshi   +8 more
core   +1 more source

Characterizing the salivary RNA landscape to identify potential diagnostic, prognostic, and follow‐up biomarkers for breast cancer

open access: yesMolecular Oncology, EarlyView.
This study explores salivary RNA for breast cancer (BC) diagnosis, prognosis, and follow‐up. High‐throughput RNA sequencing identified distinct salivary RNA signatures, including novel transcripts, that differentiate BC from healthy controls, characterize histological and molecular subtypes, and indicate lymph node involvement.
Nicholas Rajan   +9 more
wiley   +1 more source

Burdens and Standards of Proof in Possession of Unexplained Property Prosecutions

open access: yesMizan Law Review, 2015
While possession of unexplained property (illicit enrichment) is expressly criminalized under Article 419 of the 2004 Criminal Code of Ethiopia, there are practical problems in its prosecution, inter alia, regarding burden and standards of proof.
WY Wodage
doaj   +1 more source

Questioning the Standard of Proof [PDF]

open access: yesJournal of International Criminal Justice, 2015
The article begins with a discussion of the judicial debate on the confirmation procedure before the International Criminal Court, which arose in the pretrial proceedings in the Gbagbo case. The author argues that in finding that a confirmation of the charges decision should be based on ‘the strongest possible case based on a largely completed ...
openaire   +2 more sources

Certifying RSA public keys with an efficient NIZK [PDF]

open access: yes, 2018
In many applications, it is important to verify that an RSA public key ( N,e ) specifies a permutation, in order to prevent attacks due to adversarially-generated public keys.
Balditimsi, Foteini   +3 more
core  

Home - About - Disclaimer - Privacy