Search alternatives:
like » life (Expand Search)
Showing 481 - 500 results of 2,301 for search 'like of code', query time: 0.11s Refine Results
  1. 481

    A Brief Overview of the Pawns Programming Language by Lee Naish

    Published 2024-11-01
    “…All destructive update of variables is made obvious in Pawns code, via annotations on statements and in type signatures. …”
    Get full text
    Article
  2. 482

    Virtual Channel Purification by Zhenhuan Liu, Xingjian Zhang, Yue-Yang Fei, Zhenyu Cai

    Published 2025-05-01
    “…Another variant of VEC can mimic the error-suppression power of the surface code by inputting only a bit-flip and a phase-flip code. …”
    Get full text
    Article
  3. 483

    Reverse Cyclic Loading Effect on RCC Wall-Floor Slab-Deep Beam Connection by K. Balasubramanian, K. P. Jaya

    Published 2022-01-01
    “…This article presents the experimental investigations carried out to study the behavior of three different reinforcement detailing in RCC wall-floor slab-deep beam connections, such as (1) 90° bend up bars connection as per Indian Standard Code (Conventional connection), (2) U-hooks connecting the core region as per Euro code 2, and (3) proposed U-hooks with additional reinforcement in the core region transverse to the beam orientation. …”
    Get full text
    Article
  4. 484

    Missense variants in FRS3 affect body mass index in populations of diverse ancestries by Andrea B. Jonsdottir, Gardar Sveinbjornsson, Rosa B. Thorolfsdottir, Max Tamlander, Vinicius Tragante, Thorhildur Olafsdottir, Solvi Rognvaldsson, Asgeir Sigurdsson, Hannes P. Eggertsson, Hildur M. Aegisdottir, David O. Arnar, Karina Banasik, Doruk Beyter, Ragnar G. Bjarnason, Gyda Bjornsdottir, Søren Brunak, Mie Topholm Bruun, Joseph Dowsett, Eythor Einarsson, Gudmundur Einarsson, Christian Erikstrup, Run Fridriksdottir, Jonas Ghouse, Solveig Gretarsdottir, Gisli H. Halldorsson, Torben Hansen, Anna Helgadottir, Peter C. Holm, Erna V. Ivarsdottir, Kasper Karmark Iversen, Bitten Aagaard Jensen, Ingileif Jonsdottir, Stacey Knight, Kirk U. Knowlton, Snaedis Kristmundsdottir, Adalheidur E. Larusdottir, Olafur Th. Magnusson, Gisli Masson, Pall Melsted, Christina Mikkelsen, Kristjan H. S. Moore, Asmundur Oddsson, Pall I. Olason, Frosti Palsson, Ole Birger Pedersen, Michael Schwinn, Emil L. Sigurdsson, Aron Skaftason, Lilja Stefansdottir, Hreinn Stefansson, Thora Steingrimsdottir, Arni Sturluson, Unnur Styrkarsdottir, Erik Sørensen, Unnur D. Teitsdottir, Thorgeir E. Thorgeirsson, Gudmundur A. Thorisson, Unnur Thorsteinsdottir, Magnus O. Ulfarsson, Henrik Ullum, Arnor Vikingsson, G. Bragi Walters, DBDS Genomic Consortium, Lincoln D. Nadauld, Henning Bundgaard, Sisse Rye Ostrowski, Agnar Helgason, Bjarni V. Halldorsson, Gudmundur L. Norddahl, Samuli Ripatti, Daniel F. Gudbjartsson, Gudmar Thorleifsson, Valgerdur Steinthorsdottir, Hilma Holm, Patrick Sulem, Kari Stefansson

    Published 2025-03-01
    Get full text
    Article
  5. 485

    Numerical Study of Ultra-High Voltage Transmission Tower Wind Loads Characteristics Against Tornado by Shun ZHANG, Zhenguo WANG, Wendong JIANG, Feng XU, Zhongdong DUAN

    Published 2023-08-01
    “…The measured radar data of Spencer tornado as the velocity inlet are adopted to generate the tornado-like wind field, and the impacts of the surface roughness are considered. …”
    Get full text
    Article
  6. 486

    PermQRDroid: Android malware detection with novel attention layered mini-ResNet architecture over effective permission information image by Kazım Kılıç, İbrahim Alper Doğru, Sinan Toklu

    Published 2024-10-01
    “…Methods In this study, an attention-layered mini-ResNet model is proposed, which can detect QR code-like images created using the 100 most effective defined permission information of Android applications. …”
    Get full text
    Article
  7. 487
  8. 488

    Study of Spectral and thermal properties of Selenium Diatomic Halides by Semi-empirical Treatment by Baghdad Science Journal

    Published 2008-06-01
    “…The relevant molecular parameters like interatomic distance, bond angle, dihedral angle and net charge were also calculated.…”
    Get full text
    Article
  9. 489

    Grounded Description by Barney G. Glaser

    Published 2016-12-01
    “…Grounded description is trying to describe the population studied, like a QDA study requires, by describing all the interchangeable indicators that grounded the concept. …”
    Get full text
    Article
  10. 490

    FORENSIC ASSESSMENT OF HOMEMADE AIRSOFT GRENADES by Vitalii V. Kondrat'ev, Vladimir N. Budnikov

    Published 2018-03-01
    “…Results indicate that these devices that consist of a cardboard (paper) or rubber-like casing filled with dried peas, with a «Korsar-4» firecracker in the middle, have the formal characteristics of an explosive device but cannot be regarded as such (as per Article 222 of the Criminal Code of the Russian Federation), since they are in effect typical imitation pyrotechnic devices similar to dummy hand grenades RGS-4 and display no significant damaging properties.…”
    Get full text
    Article
  11. 491

    Waveform Design using Second Order Cone Programming in Radar Systems by M. Bagher Alaie, Seyed Ahmad Olamaei

    Published 2019-12-01
    “…Finally, the obtained optimization problem is tackled using CVX toolbox. To obtain the code vectors from the extracted optimal code matrix, we use rank-onedecomposition. …”
    Get full text
    Article
  12. 492

    Transformer fault diagnose intelligent system based on DGA methods by Saad A. Mohamed Abdelwahab, Ibrahim B. M. Taha, Rizk Fahim, Sherif S. M. Ghoneim

    Published 2025-03-01
    “…While traditional DGA methods such as the IEC Code, Rogers Ratio, and Duval triangle exist, their diagnostic accuracies are often lacking. …”
    Get full text
    Article
  13. 493

    Polyethylene terephthalate track etched membrane for recovery of helium from helium-nitrogen system by Bipin Chandra Nailwal, Nitesh Goswami, Jayprakash P. Nair, Biju Keshavkumar, Puthiyedath Surendran, Anit Kumar Gupta, Soumitra Kar, Asis Kumar Adak

    Published 2023-06-01
    “…The range of various ion beams was also calculated using the SRIM code. The effect of incident energy of irradiation beam (Si: 70 and 90 MeV and Cl: 84, 100 and 115 MeV) and etching parameters like concentration of NaOH, temperature, UV radiation, and ultrasonication on the control and irradiated polymer films (~25 μm thickness) were studied. …”
    Get full text
    Article
  14. 494

    7. GROUND IMPROVEMENT AND FOUNDATION DESIGN OF INDUSTRIAL FACILITIES ON LOESS SOIL by Nikolay Milev

    Published 2024-11-01
    “…The geological conditions at the site present significant challenges due to the presence of local loess soil, which has been classified as "collapsible – Type II" in accordance with the Bulgarian Shallow Foundations Code, extending to a depth of 12 meters. To adhere to the code requirements and meet the stringent operational limitations imposed on the silos, including restrictions on foundation settlement and tilt, two potential approaches are considered. …”
    Get full text
    Article
  15. 495

    The Status of the Right of Refusal of the Wife in Cases of Unspecified Dowry in Comparative Jurisprudence and Iranian Law by Mahdieh Najafpour, Mahdi Miri, Mahdi Najafpour

    Published 2024-12-01
    “…This conclusion is justified based on Fiqhi principles such as the prohibition of harm (Lā dharar) and the alleviation of hardship (Nafy-e Usr o Haraj), as well as legal principles like the promotion of family stability and the broad interpretation of Article 1085 of the Civil Code.…”
    Get full text
    Article
  16. 496

    Consistent movement of viewers' facial keypoints while watching emotionally evocative videos. by Shivansh Chandra Tripathi, Rahul Garg

    Published 2024-01-01
    “…Unlike existing facial expression-based methodologies that measure CRM of secondary indicators like inferred emotions, keypoint, and ICA-based features, the Average t-statistic is closely associated with the direct measurement of consistent facial muscle movement using the Facial Action Coding System (FACS). …”
    Get full text
    Article
  17. 497

    Non-Orthogonal Multiple Access Technology for 5G Systems by Qi Bi, Lin Liang, Shan Yang, Peng Chen

    Published 2015-05-01
    “…To meet the 5G requirements on spectral efficiency and number of connections,non-orthogonal multiple access(NMA)technology is becoming an important candidate technology.It was shed light on how NMA can be used to further improve spectral efficiency over OMA,in order to achieve the multiple user channel capacity.Detailed analysis were given on the design principle,signal processing and resultant performance gain of three typical NMA schemes including power-domain,constellation-domain and code-domain NMA.Furthermore,network operating aspects for NMA like deployment scenarios,system design impact as well as network backward compatibility were presented.…”
    Get full text
    Article
  18. 498

    Evaluating the Capability of the Flux-Limiter Schemes in Capturing Strong Shocks and Discontinuities by Iman Harimi, Ahmad Reza Pishevar

    Published 2013-01-01
    “…The governing equations consist of one-dimensional and quasi-one-dimensional Euler equations solved using an in-house numerical code. In order to validate the solution, the obtained results are compared with other results found in the literature.…”
    Get full text
    Article
  19. 499

    METHOD OF CONTENT-DEPENDENT WATERMARKING IMAGES BASED ON SECURITY VISUAL SECRET SHARING SCHEME by A. A. Boriskevich

    Published 2019-06-01
    “…A method of content-dependent watermarking images without embedding digital watermark based on visual secret sharing scheme, which allows to encrypt the digital watermark as a noise like secret and public shadow images using binary content-dependent wavelet-pattern with visually significance features and code table and to reconstruct the digital watermark by means of performing a logical operation (AND, OR or XOR) on a secret and a public shadow images. …”
    Get full text
    Article
  20. 500

    The model of client-server interaction with non-resident servers by D. A. Koval, L. V. Serebryanaya

    Published 2019-06-01
    “…The proposed model is applied to the extensible programming of Microsoft Office applications, which allows to solve such issues like organization of cross-module interaction, elimination of code and data duplication in each module and export of common functionality for all modules.…”
    Get full text
    Article