Search alternatives:
like » life (Expand Search)
Showing 561 - 580 results of 2,301 for search 'like of code', query time: 0.13s Refine Results
  1. 561

    Characterization of Human Knee and Chin Adipose-Derived Stromal Cells by Magali Kouidhi, Phi Villageois, Carine M. Mounier, Corinne Ménigot, Yves Rival, David Piwnica, Jérôme Aubert, Bérengère Chignon-Sicard, Christian Dani

    Published 2015-01-01
    “…Mouse bone regeneration studies have also shown that it is essential to match the Hox code of transplanted cells and host tissues to achieve correct repair. …”
    Get full text
    Article
  2. 562

    A Multi-Goal Particle Swarm Optimizer for Test Case Prioritization by Muhammad Nazir, Arif Mehmood, Waqar Aslam, Yongwan Park, Gyu Sang Choi, Imran Ashraf

    Published 2023-01-01
    “…Regression testing is carried out to test the updated supply code within the constraints of time and sources. …”
    Get full text
    Article
  3. 563

    Functional representation of language play techniques in french advertising by Ekaterina Shapenko

    Published 2021-12-01
    “…The communication process in a printed advertising text looks like the following: the advertising copywriter, who writes the text at the request of the advertiser (sender), transmits information about the product (context) to the possible client (receiver) in order to get a response (channel) from them, which should manifest itself in a positive evaluation of the product and, consequently, in its purchase. …”
    Get full text
    Article
  4. 564

    Unveiling Starlink for PNT by Sharbel Kozhaya, Joe Saroufim, Zaher (Zak) M. Kassas

    Published 2025-02-01
    “…Unlike the CFO corrections, the estimation of code phase corrections is shown to be intractable, rendering pseudoranges from Starlink signals not suitable for reliable positioning. …”
    Get full text
    Article
  5. 565
  6. 566

    Radiation shielding study of tungsten impact on tellurite-bismuth based glasses by Kh.A. Bashar, M.F.N. Jaafar, Y. Mansur, S.O. Baki, M.A. Mahdi

    Published 2025-12-01
    “…Some physical properties like density and molar volume were estimated as well. …”
    Get full text
    Article
  7. 567

    Impact of Developer Queries on the Effectiveness of Conversational Large Language Models in Programming by Viktor Taneski, Sašo Karakatič, Patrik Rek, Gregor Jošt

    Published 2025-06-01
    “…The results reveal that students who queried LLMs for error fixing (EF) were statistically more likely to have runnable code, regardless of prior knowledge. …”
    Get full text
    Article
  8. 568

    Review of Integrated Response Timing in Post-Monitoring Complex Dangerous Cargo by Maruf Misaal, Lai Fatt Chuah, Mokhtar Kasypi, Anuar Abu Bakar, Mohd Azhafiz Abdullah, Shahrul Miza Mahmud, Keng Bin Loke, Wan Mariam Wan Abdullah, Mohammad Tameem Hossain Azmi, Ehamadul Haque Ani

    Published 2024-12-01
    “…It delves into the regulatory frameworks governing the transport of hazardous materials by rail, sea, air and land, emphasizing the pivotal role of institutions like the International Maritime Dangerous Goods Code and the Environmental Protection Agency. …”
    Get full text
    Article
  9. 569

    Development of the optimal scheme for the synthesis of the dipeptide TSPO ligand, N-phenylpropionyl-L-tryptophanyl-L-leucine amide (GD-102), a potential anxiolytic drug by O. A. Deeva

    Published 2024-01-01
    “…Dipeptide GD-102 also possessed antidepressant-like activity at the doses 0.01 and 0.05 mg/kg ip in BALB/c mice in the Porsolt forced swim test. …”
    Get full text
    Article
  10. 570

    Priorytety duszpasterskie w Diecezji Wrocławskiej w pierwszych latach pasterskiej posługi biskupa Adolfa Bertrama (2) by Michał Piela

    Published 2012-06-01
    “…Another theme we would like look into are the pastoral letters issued by the Ordinary of Wroclaw, Bishop A. …”
    Get full text
    Article
  11. 571

    A Dynamic Coefficient Matrix Method for the Free Vibration of Thin Rectangular Isotropic Plates by Supun Jayasinghe, Seyed M. Hashemi

    Published 2018-01-01
    “…Exploiting a special code written on MATLAB®, the flexural natural frequencies of the plate are found by sweeping the frequency domain in search of specific frequencies that yield a zero determinant. …”
    Get full text
    Article
  12. 572

    Enhancing Real-Time Detection Transformer (RT-DETR) for Handgun Detection on Nvidia Jetson by Luis Bustamante, Juan C. Gutiérrez

    Published 2025-05-01
    “…For the comparative study, we used a benchmark proposing three datasets with challenging conditions. Code and trained models are available at https://github.com/labt1/GunDetection-RTDETR. …”
    Get full text
    Article
  13. 573

    THE PROCEDURE OF REIMBURSEMENT OF THE COSTS INCURRED IN A TRIAL, IN A SUBSEQUENT TRIAL by Georgiana COMAN

    Published 2022-06-01
    “…The petition will have to comply with all the conditions set out in the Code of Civil Procedure, including those relating to the payment of fees. …”
    Get full text
    Article
  14. 574

    Plagiarism types and detection methods: a systematic survey of algorithms in text analysis by Altynbek Amirzhanov, Cemil Turan, Alfira Makhmutova

    Published 2025-03-01
    “…This survey critically evaluates existing literature, contrasting traditional methods like string-matching with advanced machine learning, natural language processing, and deep learning approaches. …”
    Get full text
    Article
  15. 575

    Proof-Carrying Hardware: Concept and Prototype Tool Flow for Online Verification by Stephanie Drzevitzky, Uwe Kastens, Marco Platzner

    Published 2010-01-01
    “…Dynamically reconfigurable hardware combines hardware performance with software-like flexibility and finds increasing use in networked systems. …”
    Get full text
    Article
  16. 576

    Voice Hacking: Using Smartphones to Spread Ransomware to Traditional PCs by Bryson R. Payne, Leonardo I. Mazuran, Tamirat Abegaz

    Published 2018-07-01
    “…The demonstrated proof of concept, with relevant source code included in the appendix, can be extended and adapted to allow other voice-enabled, mobile, and IoT devices to perform multi-platform attacks against traditional PCs, as well as other mobile and IoT devices, and even critical infrastructure systems. …”
    Get full text
    Article
  17. 577

    Optimizing Retrofit Strategies for RC Frames through Combined Techniques by Mohamed SAADI, Djarir YAHIAOUI

    Published 2024-06-01
    “…The seismic performance is evaluated according to the RPA 2003 seismic code for Algeria, following the latest guidelines. …”
    Get full text
    Article
  18. 578

    Differentiable black-box and gray-box modeling of nonlinear audio effects by Marco Comunità, Christian J. Steinmetz, Joshua D. Reiss

    Published 2025-07-01
    “…The majority of differentiable audio effects modeling approaches fall into the black-box or gray-box paradigms; and most models have been proposed and applied to nonlinear effects like guitar amplifiers, overdrive, distortion, fuzz and compressor. …”
    Get full text
    Article
  19. 579

    The Haunted World of El Superbeasto (Rob Zombie, 2009): An Animated Exploitation of Exploitation Cinema by Pierre Floquet

    Published 2016-07-01
    “…It could be argued that, like any exploitation movie, Rob Zombie’s 2009 animation film, while dealing with transgressive issues, relies on scandalous material in order to “exploit” specific niche audiences. …”
    Get full text
    Article
  20. 580

    Production cross–section and reaction yield calculations for 123-126I isotopes on 123Sb(α,xn) reactions by Hasan ÖZDOĞAN, Mert ŞEKERCİ, Abdullah KAPLAN

    Published 2021-04-01
    “…Most of the radioisotopes that used in medical field, like examination and treatment studies, were produced by employing nuclear reactions. …”
    Get full text
    Article