Search alternatives:
like » life (Expand Search)
Showing 441 - 460 results of 2,301 for search 'like of code', query time: 0.12s Refine Results
  1. 441

    X-Ray Radiative Transfer Calculation Based on a Physics-based Model of the Subparsec-scale Gases around an Active Galactic Nucleus and Its Application to NGC 3783 by Atsushi Tanimoto, Keiichi Wada, Hirokazu Odaka, Yuki Kudoh, Nozomu Kawakatu

    Published 2025-01-01
    “…Subsequently, X-ray radiative transfer was performed using the Monte Carlo Simulation for Astrophysics and Cosmology code. Our findings indicate that when the angle of inclination ranges within 55°–65°, the transmitted component of the X-ray spectrum displays absorption lines of He-like and H-like iron, exhibiting a blueshift of approximately 500 km s ^−1 . …”
    Get full text
    Article
  2. 442

    On the starting and operational transients at the core of the RMB based on 2D multigroup diffusion: by Rubens Souza Santos

    Published 2023-07-01
    “…For that, a methodology to visualize some variables like neutron fluxes, temperatures, power, etc., was developed. …”
    Get full text
    Article
  3. 443

    Representing Arab-Indonesian identity: Language and cultural narratives on social media by Pujiati Pujiati, Adri Lundeto, Ikmal Trianto

    Published 2025-01-01
    “…The research examines how linguistic and cultural strategies, including Arabic loanwords, bilingual code-switching, religious hashtags, and visual symbols such as traditional attire, calligraphy, and cultural practices, are used to articulate identity in digital spaces. …”
    Get full text
    Article
  4. 444

    SlidingConv: Domain-Specific Description of Sliding Discrete Cosine Transform Convolution for Halide by Yamato Kanetaka, Hiroyasu Takagi, Yoshihiro Maeda, Norishige Fukushima

    Published 2024-01-01
    “…The experimental results showed that SlidingConv is faster than the hand-tuned CPU code and 1/1900 of the hand-tuned code length, running more efficiently than de facto libraries like OpenCV. …”
    Get full text
    Article
  5. 445

    Il catalano nella Corte Aragonese a Napoli riflesso in documenti bilingui della cancelleria di Ferrante. Uno studio storico-sociale by Gabriela Venetz

    Published 2013-06-01
    “…<strong>Riassunto</strong>: Nel presente lavoro viene analizzato il fenomeno del code switching in una prospettiva storico-sociale. …”
    Get full text
    Article
  6. 446

    CONSIDERATIONS REGARDING THE DIVORCE BY AGREEMENT OF THE SPOUSES, ACCORDING TO THE NOTARY PROCEDURE by ANCA-ANDREEA NISTOREANU

    Published 2011-04-01
    “…By amending the Family Code according to the provisions of the Law no. 202/2010 regarding some measures in order to speed the solving of processes (“Law of small reform”), representing the introduction to the New Civil Code adopted by the Law no. 287/2009, published in the Official Gazette no. 511 of July 24, 2009, being to become effective, is inserted for the first time the possibility to end the marital relations also before the registrar of births, marriages and deaths or notary public, in strict terms of law. …”
    Get full text
    Article
  7. 447

    Ethical budgets in (psycho-)linguistic fieldwork by Sarvasy Hannah S.

    Published 2025-03-01
    “…The notions of collaborative research, with communities rather than on them, and co-design of research with the participant community, are now common currency in funding applications, and indeed, an international code of ethics for cross-cultural research now exists: the TRUST Code. …”
    Get full text
    Article
  8. 448

    Finetuning Large Language Models for Vulnerability Detection by Aleksei Shestov, Rodion Levichev, Ravil Mussabayev, Evgeny Maslov, Pavel Zadorozhny, Anton Cheshkov, Rustam Mussabayev, Alymzhan Toleu, Gulmira Tolegen, Alexander Krassovitskiy

    Published 2025-01-01
    “…The finetuned WizardCoder model achieves improvement in ROC AUC and F1 measures on balanced and imbalanced vulnerability datasets over CodeBERT-like model, demonstrating the effectiveness of adapting pretrained LLMs for vulnerability detection in source code. …”
    Get full text
    Article
  9. 449

    BoostPolyGlot: A Structured IR Generation-Based Fuzz Testing Framework for GCC Compiler Frontend by Hui Liu, Hanbin Guo, Peng Liu, Tongding Hou

    Published 2025-05-01
    “…The compiler serves as a bridge connecting hardware architecture and application software, converting source code into executable files and optimizing code. Fuzz testing is an automated testing technology that evaluates software reliability by providing a large amount of random or mutated input data to the target system to trigger abnormal program behavior. …”
    Get full text
    Article
  10. 450
  11. 451

    Evaluating Usability and Accessibility of Visual Programming Tools for Novice Programmers—The Case of App Inventor, Scratch, and StarLogo by Kamil Żyła, Kinga Chwaleba, Dominik Choma

    Published 2024-10-01
    “…Not all modern engineers will become fully fledged programmers, but sometimes the possibility to use low-code programming environments like LabView or MIT App Inventor will be sufficient. …”
    Get full text
    Article
  12. 452

    “Trojan horse” malware as a mean for obtaining evidence in Italy by Francesco Caprioli

    Published 2017-06-01
    “…The Italian code of criminal procedure doesn’t regulate investigations realized with “Trojan horse” malwares located in an electronic device like a smartphone or a tablet. …”
    Get full text
    Article
  13. 453

    Optimization and Verification of One-dimensional Three-field Model for Transient Analysis of Pressurized Water Reactor by YUAN Leqi1, LI Zanwang1, 2, FAN Jie1, 3, GOU Junli1, SHAN Jianqiang1

    Published 2025-05-01
    “…Internationally, the adoption of three-field models that explicitly account for droplet behavior (as exemplified by codes like SPACE and CATHARE3) has become a prevailing trend to enhance simulation accuracy, particularly for complex thermal-hydraulic phenomena. …”
    Get full text
    Article
  14. 454

    Model for Prediction of Testing Time of a Computer Program for Automated Reliability Evaluation of Semiconductor Devices by V. O. Kaziuchyts, S. M. Borovikov, E. N. Shneiderov

    Published 2022-12-01
    “…Software developers would like to know the predicted testing time, which ensures a given operational reliability of a computer program, even before starting work on writing program code. …”
    Get full text
    Article
  15. 455

    Governance for Takaful Operators (Islamic Insurance Companies) by Amirul Afif Muhamat

    Published 2021-02-01
    “…Interestingly, this article suggests that the Malaysian Rating Corporation (MARC) guidelines for Islamic financial institutions and the UK Stewardship Code should be used as references in order to develop dedicated stewardship guideline for Islamic financial institutions like takaful operators. …”
    Get full text
    Article
  16. 456

    Comprehensive Insights into Smart Contracts: Architecture, Sectoral Applications, Security Analysis, and Legal Frameworks by Farah Mazlan, Nur Faizah Omar, Nik Nor Muhammad Saifudin Nik Mohd Kamal, Ahmad Anwar Zainuddin

    Published 2025-02-01
    “…Smart contracts enable self-execution of contracts whose conditions are expressed explicitly in lines of code by presenting solutions using blockchain technology. …”
    Get full text
    Article
  17. 457

    Development and Verification of a Transient Analysis Tool for Reactor System Using Supercritical CO2 Brayton Cycle as Power Conversion System by Pan Wu, Chuntian Gao, Jianqiang Shan

    Published 2018-01-01
    “…Heat conduction model, point neutron power model (which is developed for nuclear power application), turbomachinery model for gas turbine, compressor and shaft model, and PCHE type recuperator model are all included in this transient analysis code. The initial verifications were performed for components and constitutive models like heat transfer model, friction model, and compressor model. …”
    Get full text
    Article
  18. 458

    Monte Carlo Few-Group Constant Generation for CANDU 6 Core Analysis by Seung Yeol Yoo, Hyung Jin Shim, Chang Hyo Kim

    Published 2015-01-01
    “…The current neutronics design methodology of CANDU-PHWRs based on the two-step calculations requires determining not only homogenized two-group constants for ordinary fuel bundle lattice cells by the WIMS-AECL lattice cell code but also incremental two-group constants arising from the penetration of control devices into the fuel bundle cells by a supercell analysis code like MULTICELL or DRAGON. …”
    Get full text
    Article
  19. 459

    Love in the Time of Computation by Seán Cubitt

    Published 2024-06-01
    “…Developing ideas of love and fantasy, the article argues that, in an era when the unconscious is structured not like language but like code, massed image databases lack a single present time, with consequences for photographic aesthetics. …”
    Get full text
    Article
  20. 460

    Building a Reliable Steganography System Using Random Key in a spatial Domain of Image by Baghdad Science Journal

    Published 2014-06-01
    “…With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. …”
    Get full text
    Article