Search alternatives:
like » life (Expand Search)
Showing 1,161 - 1,180 results of 2,301 for search 'like coding', query time: 0.10s Refine Results
  1. 1161

    The effect of flaw on rock mechanical properties under the Brazilian test by Yu Zhou, Guang Zhang, Shunchuan Wu, Li Zhang

    Published 2018-05-01
    “… Tensile strength is one of the most significant parameters for rock. Rock-like materials were used to prefabricate Brazilian disc specimens containing a single flaw. …”
    Get full text
    Article
  2. 1162

    A Comparative Analysis of Manual and Computer Constant Comparison Methods: Using Data from a Constructivist Inquiry of Experiences Working with Ethnic Agencies by Suzie Weng

    Published 2013-03-01
    “… A dilemma one may face in analyzing qualitative data is whether to use a manual approach with index cards or a computer data management tool like ATLAS.ti.  This paper compares the two approaches in organizing and analyzing data using the same data set.  The data were collected and first analyzed in a constructivist inquiry course according to the methods laid out by Rodwell (1998).  This process involved unitizing data onto index cards and these cards were then sorted into categories during the constant comparison process.  Later, the same data were linked to ATLAS.ti where they were unitized and categorized simultaneously.  Constant comparison took place when all the data were coded.  A comparison of the two methods allowed the author to determine the strengths and limitations for the various stages of constant comparison. …”
    Get full text
    Article
  3. 1163

    How Do WE Address the Instructors in the Expanding Circle? Perspectives from Turkish EFL Speakers by Ahmet Can Uyar, İsmail YAMAN

    Published 2024-06-01
    “…Far from the norm-referenced approach which focuses on labeling non-native-like practices as failures, this study casts light on the underlying mechanisms of the identified address preferences from a variationist point of view. …”
    Get full text
    Article
  4. 1164

    Safe spaces for feminist activists online: Chinese networked feminists’ self-censorship strategies in response to online misogyny and government censorship by Aizi Chang

    Published 2025-04-01
    “…Through an analysis of social media platforms like XiaoHongShu, this research highlights how Chinese feminists adapt their activism to resist aggressive censorship and misogynistic backlash, framing self-censorship as a proactive and creative tool rather than a passive response to repression. …”
    Get full text
    Article
  5. 1165

    3M: Multi-style image caption generation using Multi-modality features under Multi-UPDOWN model by Chengxi Li, Brent Harrison

    Published 2021-04-01
    “…We demonstrate the effectiveness of our model on generating human-like captions by examining its performance on two datasets, the PERSONALITY-CAPTIONS dataset, and the FlickrStyle10K dataset. …”
    Get full text
    Article
  6. 1166

    On the analytical model for jitter by Saralees Nadarajah, Alassane Ba

    Published 2025-07-01
    “…Jitter in Internet Protocol (IP) networks refers to the variation in packet arrival times, which can cause delays or disruptions in real-time communications like voice or video calls. Managing jitter is crucial for applications requiring consistent data flow, such as voice over internet protocol, online gaming, and video conferencing, to maintain quality and reliability. …”
    Get full text
    Article
  7. 1167

    Deep multi-biometric fuzzy commitment scheme: fusion methods and performance by Valentina Fohr, Christian Rathgeb

    Published 2025-07-01
    “…Three fusion methods are proposed: concatenation, interleaving, and random shuffling within the fuzzy commitment scheme using error correction methods based on Hadamard and Reed-Solomon codes. The evaluation of performance and security reveals that random shuffling outperforms other methods like interleaving and concatenation in terms of recognition performance. …”
    Get full text
    Article
  8. 1168

    BELARUSIANS’ SELFIDENTIFICATION IN THE CONTEXT OF CIVILIZATIONAL BORDERLAND by L. Volakhava

    Published 2015-07-01
    “…Lukashenko’s pendulum-like foreign policy highlights the national identity reference points and defines its either pro-Russian or pro-Western leaning. …”
    Get full text
    Article
  9. 1169

    Moiré Effect: Index and the Digital Image by Stella Baraklianou

    Published 2014-04-01
    “…Most widely recognisable in colour printing practices, generally viewed on screens (computer and TV) they are in most cases examples of interference within a signal or a code, unwanted visual mis-alignment. Especially in digital image capture, moiré patternings appear when a geometrically even pattern, like a fabric or close-up of fine texture, has an appearance of rippled water with blue or red hues of concentric circle formations. …”
    Get full text
    Article
  10. 1170

    Drawing Boundaries Between Data Protection and Privacy: the Centre for Reforming the Data Protection Paradigm by Haodi Deng

    Published 2025-04-01
    “…Similarly, China has firmly separated data protection and privacy through legislation like the Civil Code and the Personal Information Protection Law. …”
    Get full text
    Article
  11. 1171

    Dɛnkyɛm: Identity Development and Negotiation Among 1.5-Generation Ghanaian American Millennials by Jakia Marie

    Published 2024-10-01
    “…The findings suggest that many individuals of this generation had unrealistic expectations of what life in the United States was like, which made the initial transition difficult. …”
    Get full text
    Article
  12. 1172

    Using d2d for Writing XML by Markus Lepper, Baltasar Trancón y Widemann

    Published 2025-01-01
    “…Being standard XML, switching the backend to other formats (like TEI plus MEI) seems promising—not affecting the underlying design criteria. …”
    Get full text
    Article
  13. 1173

    Assessing the prevalence of unethical behaviour in the South African police service by Maxwell Haurovi, Alouis Chilunjika

    Published 2023-12-01
    “…SAPS encountered challenges like police corruption, bribery, illegal protection, and extortion. …”
    Get full text
    Article
  14. 1174
  15. 1175

    Tjieng Tjang Tjerries and other stories by Jolyn Phillips by Naledi Msimang

    Published 2023-07-01
    “…She stays true even to the mix of English and Afrikaans spoken in the town, and code-switches from one language to the other regularly and unapologetically so. …”
    Get full text
    Article
  16. 1176

    Performance-portable Binary Neutron Star Mergers with AthenaK by Jacob Fields, Hengrui Zhu, David Radice, James M. Stone, William Cook, Sebastiano Bernuzzi, Boris Daszuta

    Published 2025-01-01
    “…We introduce an extension to the AthenaK code for general-relativistic magnetohydrodynamics (GRMHD) in dynamical spacetimes using a 3+1 conservative Eulerian formulation. …”
    Get full text
    Article
  17. 1177
  18. 1178
  19. 1179

    A New Rarity Assessment of the “Disk of Satellites”: The Milky Way System Is the Exception Rather Than the Rule in the ΛCDM Cosmology by Chanoul Seo, Suk-Jin Yoon, Sanjaya Paudel, Sung-Ho An, Jun-Sung Moon

    Published 2024-01-01
    “…The majority of satellite galaxies around the Milky Way (MW) show disk-like distributions (the disk of satellites; DoS), which is a small-scale problem of the lambda cold dark matter cosmology. …”
    Get full text
    Article
  20. 1180

    Improved Low-Complexity, Pilot-Based Channel Estimation for Large Intelligent Surface Systems by Ali Gashtasbi, Mário Marques da Silva, Rui Dinis

    Published 2025-03-01
    “…It also looks at more advanced methods, like using low-density parity-check (LDPC) codes, antenna selection, and optimized pilot design, to make the method more accurate and effective. …”
    Get full text
    Article