Search alternatives:
like » life (Expand Search)
Showing 681 - 700 results of 2,301 for search 'like of code', query time: 0.10s Refine Results
  1. 681

    Internet-Based Mass Communication in Multi-Level Marketing Companies Operating in Poland by Nowotarska-Romaniak Beata, Szczepanik Sonia

    Published 2024-12-01
    “…Social media presence is less significant, with Facebook being the most utilized platform, particularly by older firms; Polish-language profiles are rare on more time-intensive platforms like YouTube. Facebook holds the highest average user count, especially for firms operating for over 21 years. …”
    Get full text
    Article
  2. 682

    AnomLite: Efficient binary and multiclass video anomaly detection by Anna K. Zvereva, Mariam Kaprielova, Andrey Grabovoy

    Published 2025-03-01
    “…These attributes make AnomLite suitable for real-time applications in resource-constrained environments like urban centers and public transport hubs. The code could be found here: https://github.com/AnnaZverev/UCF_Crime.git…”
    Get full text
    Article
  3. 683

    Building a large, realistic and labeled HTTP URI dataset for anomaly-based intrusion detection systems: Biblio-US17 by Jesús Díaz-Verdejo, Rafael Estepa, Antonio Estepa, Javier Muñoz-Calle, Germán Madinabeitia

    Published 2025-06-01
    “…It contains 47 million records, each including the method, uniform resource identifier (URI) and associated response code and size of every request received by the web server. …”
    Get full text
    Article
  4. 684

    Measurement of Atmospheric Neutrino Cross-Sections on Oxygen, Water and Argon using Nuwro Event Generator by Iflah Rasool Shaik, Qudsia Gani, Mir Hameeda

    Published 2024-04-01
    “…These are excellent carriers of information from the past of Universe through sources like bursting stars and black holes which we do not have a direct access to. …”
    Get full text
    Article
  5. 685

    A Multiscale CNN-Based Intrinsic Permeability Prediction in Deformable Porous Media by Yousef Heider, Fadi Aldakheel, Wolfgang Ehlers

    Published 2025-02-01
    “…Examples demonstrate the CNN’s ability to accurately predict the permeability tensor in connection with the deformation state through the porosity parameter. A source code has been made available as open access.…”
    Get full text
    Article
  6. 686

    Supervised machine learning for microbiomics: Bridging the gap between current and best practices by Natasha Katherine Dudek, Mariami Chakhvadze, Saba Kobakhidze, Omar Kantidze, Yuriy Gankin

    Published 2024-12-01
    “…Limited demographic data further raises concerns about generalizability and fairness, with 24% of studies omitting participants' country of residence, and attributes like race/ethnicity, education, and income rarely reported (11%, 2%, and 0%, respectively). …”
    Get full text
    Article
  7. 687

    Digital Migration Infrastructure in return-writing: visualizing the migration landscape of India by Preetha Mukherjee, Nirmala Menon

    Published 2024-09-01
    “…Digital infrastructures are equally important to the physical ones as digital technologies facilitate these migration processes through agents like hardware, software, and mediating actors. Amongst the multiple forms of migration, the concept of return-writing and nostalgia-struck-returnees encompass individuals whose life trajectories run parallel to the homeland. …”
    Get full text
    Article
  8. 688

    Use of social media platforms by manufacturers to market breast-milk substitutes in South Africa by Tanya Doherty, Catherine Pereira-Kotze, Elizabeth C Swart

    Published 2020-12-01
    “…The use of internet, digital and mobile platforms has increased, including in low-income and middle-income countries, like SA and these platforms are avenues for BMS marketing. …”
    Get full text
    Article
  9. 689

    Legitimacy of Resumption of jurisdiction in conclusion litigation with factitious defendant’s oath, under jurisprudence of Islamic religions and the Written Law of Iran by Mohammad Ali Raghebi, Mohammadtagi Moradi

    Published 2023-09-01
    “…From the perspective jurisprudence of Islamic religions and the Written Law of Iran, defendant’s oath is decisive for litigation, just like confession and adequate evidence. However, in many cases, after the oath is taken and a final verdict is issued, the opposing side requests a resumption of the trial, alleging that the oath was false. …”
    Get full text
    Article
  10. 690

    RTide: Automating the Tidal Response Method by Thomas Monahan, Tianning Tang, Stephen Roberts, Thomas A. A. Adcock

    Published 2025-06-01
    “…These applications, and more, can be replicated with just three lines of code using the open‐source Python package, RTide.…”
    Get full text
    Article
  11. 691

    Breathing life into learning about air quality: developing and implementing environmental health outreach with high school students by Katie Hoskins, Nguyen Dang, Fahad Molla

    Published 2025-08-01
    “…Air pollutants contribute to a high incidence of emergency room visits and hospitalizations for conditions like asthma. Because air pollutants correlate with built environments, these outcomes are concentrated geographically, which is a major driver of social determinants of health. …”
    Get full text
    Article
  12. 692

    Delegation-Based Agile Secure Software Development Approach for Small and Medium-Sized Businesses by Anze Mihelic, Simon Vrhovec, Blaz Markelj, Tomaz Hovelja

    Published 2024-01-01
    “…The results indicate that this approach enhanced security awareness, improved code quality, and encouraged tailored security implementations. …”
    Get full text
    Article
  13. 693

    Detection of Incipient Faults in Power Transformers using Fuzzy Logic and Decision Tree Models Based on Dissolved Gas Analysis by Felix Olowolafe, Kehinde Olukunmi Alawode

    Published 2024-03-01
    “…Overcoming limitations in conventional methods such as Duval Triangle, Key Gas Analysis, Rogers Ratio, IEC Ratio, and Doernenburg Ratio, our Fuzzy Logic and Decision Tree models address issues like inaccurate diagnosis, inconsistent diagnosis, lack of decisions or out-of-code results, and time-intensive manual calculations for large DGA datasets. …”
    Get full text
    Article
  14. 694

    Fast and Accurate Identification of Kiwifruit Diseases Using a Lightweight Convolutional Neural Network Architecture by Kangchen Liu, Li Li, Xiujun Zhang

    Published 2025-01-01
    “…Kiwifruit (Actinidia chinensis Planch.) is highly valued for its nutritional benefits and unique flavor. However, diseases like bacterial canker and soft rot threaten its production, causing significant economic losses. …”
    Get full text
    Article
  15. 695

    Beyond Information Distortion: Imaging Variable-Length Time Series Data for Classification by Hyeonsu Lee, Dongmin Shin

    Published 2025-01-01
    “…We believe this method provides a significant advancement for handling variable-length time series data in real-world applications. The code is publicly available.…”
    Get full text
    Article
  16. 696

    Privacy Centric Offline Chatbot using Large Language Models by K. Anjali, K. Vipunsai, K. Ruchitha, M. Bhavani, Ch. China Subba Reddy

    Published 2025-07-01
    “… From ELIZA in the 1960s mimicking a psychotherapist to ChatGPT helping us to write code, chatbots have come a long way and are dominating the digital era. …”
    Get full text
    Article
  17. 697

    Le traducteur et les italiques. Omniscience et redressement dans Madame Bovary by Sophie Sarrazin

    Published 2012-11-01
    “…As an emphatic device, the italics contribute to the sentence structure, just like grandiloquence does, from a rhetorical or a syntactical point of view.The large number of passages in italics in Flaubert’s novel has been discussed for a long time. …”
    Get full text
    Article
  18. 698

    Is dermatoglyphics an object of scientific research or not? by A. Kh. Ashirmetov, I. R. Mavlyanov, A. A. Sadikov

    Published 2020-08-01
    “…Signs of papillary patterns are also determined by polygenic factors that are inherited from parents. Like any hereditary traits, they can mutate. Mutations and hereditary diseases accompanied by damaging of the genetic code, as a rule, manifest in the phenotype and in the characteristics of dermatoglyphs. …”
    Get full text
    Article
  19. 699

    On an RNA-Membrane Protogenome by Michael Yarus

    Published 2025-04-01
    “…Accordingly, ancient RNA-membranes could act as a protogenome, supporting encoded RNA expression, inheritance, and evolution before the DNA genome: for example, supporting organized biochemistry, coded translation, and a Standard Genetic Code.…”
    Get full text
    Article
  20. 700

    Development of a Novel Automated Workflow in Fiji ImageJ for Batch Analysis of Confocal Imaging Data to Quantify Protein Colocalization Using Manders Coefficient by Vikram Aditya, Vishakha Tambe, Wei Yue

    Published 2025-04-01
    “…Despite its utility, challenges in handling large datasets, particularly in preprocessing Z-stacks and calculating colocalization metrics like the Manders coefficient, limit efficiency and reproducibility. …”
    Get full text
    Article