Search alternatives:
like » life (Expand Search)
Showing 541 - 560 results of 2,301 for search 'like of code', query time: 0.12s Refine Results
  1. 541

    A Unified Approach to Video Anomaly Detection: Advancements in Feature Extraction, Weak Supervision, and Strategies for Class Imbalance by Rui Z. Barbosa, Hugo S. Oliveira

    Published 2025-01-01
    “…Key findings include the impact of class imbalance on the Cross-Modal Awareness-Local Arousal (CMALA) architecture and the effectiveness of techniques like pseudo-curriculum learning in mitigating noisy classes, such as “Car Accident.…”
    Get full text
    Article
  2. 542

    3M: Multi-style image caption generation using Multi-modality features under Multi-UPDOWN model by Chengxi Li, Brent Harrison

    Published 2021-04-01
    “…We demonstrate the effectiveness of our model on generating human-like captions by examining its performance on two datasets, the PERSONALITY-CAPTIONS dataset, and the FlickrStyle10K dataset. …”
    Get full text
    Article
  3. 543

    On the analytical model for jitter by Saralees Nadarajah, Alassane Ba

    Published 2025-07-01
    “…Jitter in Internet Protocol (IP) networks refers to the variation in packet arrival times, which can cause delays or disruptions in real-time communications like voice or video calls. Managing jitter is crucial for applications requiring consistent data flow, such as voice over internet protocol, online gaming, and video conferencing, to maintain quality and reliability. …”
    Get full text
    Article
  4. 544

    Observational properties of regular black holes in asymptotic safety by Abdybek Urmanov, Hrishikesh Chakrabarty, Daniele Malafarina

    Published 2025-06-01
    “…We investigated null and time-like geodesics around the AS metric, including circular orbits, photon rings and lensing effects. …”
    Get full text
    Article
  5. 545

    BELARUSIANS’ SELFIDENTIFICATION IN THE CONTEXT OF CIVILIZATIONAL BORDERLAND by L. Volakhava

    Published 2015-07-01
    “…Lukashenko’s pendulum-like foreign policy highlights the national identity reference points and defines its either pro-Russian or pro-Western leaning. …”
    Get full text
    Article
  6. 546

    Moiré Effect: Index and the Digital Image by Stella Baraklianou

    Published 2014-04-01
    “…Most widely recognisable in colour printing practices, generally viewed on screens (computer and TV) they are in most cases examples of interference within a signal or a code, unwanted visual mis-alignment. Especially in digital image capture, moiré patternings appear when a geometrically even pattern, like a fabric or close-up of fine texture, has an appearance of rippled water with blue or red hues of concentric circle formations. …”
    Get full text
    Article
  7. 547

    Drawing Boundaries Between Data Protection and Privacy: the Centre for Reforming the Data Protection Paradigm by Haodi Deng

    Published 2025-04-01
    “…Similarly, China has firmly separated data protection and privacy through legislation like the Civil Code and the Personal Information Protection Law. …”
    Get full text
    Article
  8. 548

    Dɛnkyɛm: Identity Development and Negotiation Among 1.5-Generation Ghanaian American Millennials by Jakia Marie

    Published 2024-10-01
    “…The findings suggest that many individuals of this generation had unrealistic expectations of what life in the United States was like, which made the initial transition difficult. …”
    Get full text
    Article
  9. 549

    A Tutorial and Use Case Example of the eXtreme Gradient Boosting (XGBoost) Artificial Intelligence Algorithm for Drug Development Applications by Matthew Wiens, Alissa Verone‐Boyle, Nick Henscheid, Jagdeep T. Podichetty, Jackson Burton

    Published 2025-03-01
    “…This tutorial focuses on the concepts and implementation of the popular eXtreme gradient boosting (XGBoost) algorithm for classification and regression of simple clinical trial‐like datasets. Emphasis is placed on relating the underlying concepts to the code implementation. …”
    Get full text
    Article
  10. 550

    The effect of flaw on rock mechanical properties under the Brazilian test by Yu Zhou, Guang Zhang, Shunchuan Wu, Li Zhang

    Published 2018-05-01
    “… Tensile strength is one of the most significant parameters for rock. Rock-like materials were used to prefabricate Brazilian disc specimens containing a single flaw. …”
    Get full text
    Article
  11. 551

    Using d2d for Writing XML by Markus Lepper, Baltasar Trancón y Widemann

    Published 2025-01-01
    “…All source texts are in the public domain; a publication on an open-source code repository is in preparation.…”
    Get full text
    Article
  12. 552

    Assessing the prevalence of unethical behaviour in the South African police service by Maxwell Haurovi, Alouis Chilunjika

    Published 2023-12-01
    “…SAPS encountered challenges like police corruption, bribery, illegal protection, and extortion. …”
    Get full text
    Article
  13. 553

    نماز میں عورت کی امامت سے متعلق قدیم اور جدید افکار کا تجزیاتی مطالعہ by Hafiz Muhammad Ramzan, Muhammad Akram Rana

    Published 2019-06-01
    “…Recently, this complicated issue rose all over afresh, when woman like Dr. Amina Wadud and Rahil Raza led mixed gender in prayer. …”
    Get full text
    Article
  14. 554

    Proposal of a New Isogeny-Based Cryptographic Protocol: Formal Analysis and Comparison by mohammed EL BARAKA, Siham Ezzouak

    Published 2025-03-01
    “…The proposed protocol‎, ‎Isogeny-Based Key Exchange with Error-Correcting Codes (IKEC)‎, ‎offers enhanced security‎, ‎computational efficiency‎, ‎and practical applicability‎, ‎making it a viable alternative to existing schemes like SIDH‎. ‎…”
    Get full text
    Article
  15. 555

    Reactor criticals and spent fuel systems similarities by Matěj Šikl

    Published 2022-12-01
    “…In this paper a possibility of using commercial reactor critical states for code validations and for subcriticality assessments of storage systems is discussed and potential approach for criticality safety analysis is given.…”
    Get full text
    Article
  16. 556

    How Do WE Address the Instructors in the Expanding Circle? Perspectives from Turkish EFL Speakers by Ahmet Can Uyar, İsmail YAMAN

    Published 2024-06-01
    “…Far from the norm-referenced approach which focuses on labeling non-native-like practices as failures, this study casts light on the underlying mechanisms of the identified address preferences from a variationist point of view. …”
    Get full text
    Article
  17. 557

    Justice for the Parties to the Standard Agreement Relating to the Freedom Contract Principle by Nadia Aurynnisa Prihandini, Ery Agus Priyono

    Published 2024-03-01
    “…The findings showed that the standard contracts may not violate the principle of freedom of contract outlined in Article 1320 and Article 1338 of the Civil Code, conflicts may arise, particularly due to restrictive clauses like exoneration clauses. …”
    Get full text
    Article
  18. 558

    Tjieng Tjang Tjerries and other stories by Jolyn Phillips by Naledi Msimang

    Published 2023-07-01
    “…She stays true even to the mix of English and Afrikaans spoken in the town, and code-switches from one language to the other regularly and unapologetically so. …”
    Get full text
    Article
  19. 559

    Unveiling pressure-driven tunability of structural, electronic, mechanical and optical characteristics in CsPbBr3 based on a DFT study by Sheeza Mumtaz, M. Rizwan, M. Abaid Ullah, S.S. Ali, Z. Usman, T. Mahmood

    Published 2025-07-01
    “…Numerous beneficial optoelectronic characteristics of perovskites like lead halide have gained much attention due to their light-based and solar cell applications. …”
    Get full text
    Article
  20. 560