Search alternatives:
like » life (Expand Search)
Showing 501 - 520 results of 2,301 for search 'like of code', query time: 0.12s Refine Results
  1. 501

    Nonparaxial propagation of an intense relativistic electron beam through dense media by Carl Ekdahl

    Published 2025-04-01
    “…An envelope equation is used to explore the propagation of a focused electron beam through dense conductive media like partially ionized high-pressure gas, metal vapor plumes from beam-target interactions, or low-density solid-phase targets. …”
    Get full text
    Article
  2. 502

    Optimization of consumed steel, opening height and location in RC beams by genetic algorithms by A. Ghannadiasl, A. Gharibi Asl

    Published 2019-03-01
    “…In the construction of modern buildings, many pipes and ducts are necessary to accommodate essential services like water supply, sewage, etc. These pipes and ducts are usually placed underneath the concrete beams. …”
    Get full text
    Article
  3. 503

    Automatic Recognition and Replacement of Cyclic Redundancy Checks for Program Optimization by Mariam Arutunian, Sevak Sargsyan, Matevos Mehrabyan, Lilit Bareghamyan, Hayk Aslanyan

    Published 2024-01-01
    “…CRC can be implemented in various ways. Some methods, like bitwise implementations, are slow and less efficient. …”
    Get full text
    Article
  4. 504

    Predictors of Islamic Financial Inclusion in the Northwest Nigeria: A Preliminary Cross-Sectional Investigation by Shehu Usman Rano Aliyu, Abubakar Hamid Danlami, Farida Mohammed Shehu

    Published 2024-07-01
    “…Financial inclusion is seen widely as a tool for attaining macroeconomic objectives of economic growth, poverty reduction, economic prosperity, and the like. The phenomenon of Islamic financial inclusion is a decade old in Nigeria. …”
    Get full text
    Article
  5. 505

    Counterterrorism Planning in the Shipping Industry Leveraging Competitive Intelligence by Anastasios-Nikolaos KANELLOPOULOS, Anthony IOANNIDIS

    Published 2025-01-01
    “…Key threats such as piracy in Somalia and the Gulf of Guinea, ship-borne terrorism, and attacks on ports are examined, highlighting the limitations of existing measures like the International Ship and Port Facility Security (ISPS) Code. …”
    Get full text
    Article
  6. 506

    Bridging the Security Gap in SDLC: Challenges and Solutions for Local IT Firms in Bangladesh by Ibrahim Fatima, Ashfaque Youhana Ebnul, Roknuzzaman Md., Islam Merajul, Sumi Sadia Jaman, Nahar Nujhat, Hasan Mahady

    Published 2025-01-01
    “…Current approaches rely heavily on traditional methods like code reviews and penetration testing, with newer techniques largely absent. …”
    Get full text
    Article
  7. 507

    English learners with dyslexia benefit from English dyslexia intervention: an observational study of routine intervention practices by Anna E. Middleton, Marcela Davila, Sheryl L. Frierson

    Published 2024-12-01
    “…Current evidence indicates that for both EP and EL students, code-based competencies and meaning-based skills are important for learning to read. …”
    Get full text
    Article
  8. 508

    An Analytical Solution for Variable Viscosity Flow in Fractured Media: Development and Comparative Analysis With Numerical Simulations by Anis Younes, Mohammad Mahdi Rajabi, Fatemeh Rezaiezadeh Roukerd, Marwan Fahs

    Published 2024-03-01
    “…This assumption, however, can be inaccurate as fluid viscosity varies due to factors like composition, temperature, and dissolved substances. …”
    Get full text
    Article
  9. 509

    Deep CNN-based detection of cardiac rhythm disorders using PPG signals from wearable devices. by Miray Gunay Bulut, Sencer Unal, Mohamed Hammad, Paweł Pławiak

    Published 2025-01-01
    “…Arrhythmias can disrupt the balanced circulation, leading to serious complications like heart attacks, strokes, and sudden death. Medical devices like electrocardiography (ECG) and Holter monitors are commonly used for diagnosing and monitoring cardiac rhythm disorders. …”
    Get full text
    Article
  10. 510

    130 YEARS OF FIG: LETTER FROM FIG PRESIDENT PROF. BRUNO GRANDI by Bruno Grandi

    Published 2011-10-01
    “…That was back in 1949. Today, the Code reaches out to cover all FIG disciplines; it governs everything, infiltrating gymnastics like a metastasis that spreads and traps the sport in its deadly net. …”
    Get full text
    Article
  11. 511

    Noise as music by A. RAKOWSKI

    Published 2014-01-01
    “…Since sounds of nature and sounds of acoustic environment are sometimes perceived in an aesthetic mode like music, the fundamental questions arise: What is music? …”
    Get full text
    Article
  12. 512

    Stanisław Barańczak i awangarda by Alina Świeściak

    Published 2016-12-01
    “…The poetry of Stanisław Barańczak, who himself was against historical avant-garde as a movement that abandoned ethical commitments, has quite a lot in common with avant-garde. Like other New Wave artists, his poetry can be read in the context of the neo-avant-garde and counterculture, e.g. in the context of Guy Debord’s The Society of the Spectacle and Herbert Marcuse’s Onedimensional Man, with the propositions that overlap in many places with those of Baranczak’s “dialectic Romanticism”. …”
    Get full text
    Article
  13. 513

    Comparison Of Islamic Law And Positive Law On Violence In The Name Of Religion In Terrorism Cases by Muhamad Zarkasih

    Published 2023-02-01
    “…Extremist acts of violence in the name of religion can be punished in accordance with article 170 of the Criminal Code which contains such acts can be punished according to Indonesian law in Article 170 of the Criminal Code. …”
    Get full text
    Article
  14. 514

    Unambiguous Multipath Mitigation Technique for BOC(n,n) and MBOC-Modulated GNSS Signals by Khaled Rouabah, Mustapha Flissi, Salim Attia, Djamel Chikouche

    Published 2012-01-01
    “…The first one is based on the use of maximum likelihood estimator (MLE) of MP signals and reference correlation functions (CFs) like that of pseudorandom noise (PRN) code without BOC subcarrier. …”
    Get full text
    Article
  15. 515

    THE EXCLUSION OF ILEGALLY ADMINISTERED EVIDENCE by Eliza Emanuela IONIŢĂ

    Published 2015-07-01
    “…In the New Criminal Procedure Code it is shown that in the sphere of evidence-showing a set of rules has been introduced that establishes the principle of loyalty in the obtainment of evidence. …”
    Get full text
    Article
  16. 516

    Digital evidence and its use for criminal proceedings by Jakub Matis

    Published 2025-07-01
    “… This paper examines the role and admissibility of digital evidence, particularly data derived from instant messaging applications like WhatsApp and Telegram, in criminal proceedings within the legal context of the Slovak Republic. …”
    Get full text
    Article
  17. 517

    Software Development Process Considerations in GNSS-Denied Navigation Project for Drones by Sebastian Rutkowski, Cezary Szczepański

    Published 2024-11-01
    “…The mentioned process was a lightweight AGILE-based process that, by assumption, minimised developers’ engagement in activities other than those related to the source code development. The process described in this paper was designed to support and reflect product quality characteristics like functional completeness and correctness, time behaviour, resource utilisation, analysability, modifiability and testability in an “implicit” way. …”
    Get full text
    Article
  18. 518
  19. 519
  20. 520

    Design of Covert Communication Waveform Based on Phase Randomization by Wenjie Zhou, Zhenyong Wang, Jun Shi, Qing Guo

    Published 2025-05-01
    “…In this paper, we propose a Noise-like Multi-Carrier Random Phase Communication System (NRPCS) to enhance covert wireless communication by significantly complicating the detection and interception of transmitted signals. …”
    Get full text
    Article