Search alternatives:
like » life (Expand Search)
Showing 741 - 760 results of 2,301 for search 'like of code', query time: 0.13s Refine Results
  1. 741

    Decoding words during sentence production with ECoG reveals syntactic role encoding and structure-dependent temporal dynamics by Adam M. Morgan, Orrin Devinsky, Werner K. Doyle, Patricia Dugan, Daniel Friedman, Adeen Flinker

    Published 2025-06-01
    “…In non-canonical sentences (passives), we further observed a spatial code for syntactic roles, with subjects selectively encoded in inferior frontal gyrus (IFG) and objects selectively encoded in middle frontal gyrus (MFG). …”
    Get full text
    Article
  2. 742

    Experimental and Numerical Investigation on the Flexural Behavior of Composite-Reinforced Top-Hat Shape Beam by Nima Zahedan, Hamed Ahmadi, Gholam Hossein Liaghat

    Published 2021-04-01
    “…Hollow section beams with top-hat cross-section are mostly employed in structures like B-pillar, rocker sill, and roof rail which are engaged in side impact collisions. …”
    Get full text
    Article
  3. 743

    THE MOTIVATING FUNCTION OF MYTH: A COGNITIVE ONOMASIOLOGICAL ANALYSIS by Elena Sеlivanova, Valentyna Kalko, Nikolay Kalko

    Published 2023-11-01
    “…A myth is irrational, axiomatic, unfounded cognitive structure, which has powerful ability of transfer by next people generations, informative stability, absence of depth of sense, tendency of disappearance and production of new myths and others like that. Mythological motivation is appropriated to the signs of cultural codes of animals and plants; also, idioms and proverbs can have propositional, associative-metaphorical and value statuses. …”
    Get full text
    Article
  4. 744

    The Hybrid Modern Network Model: A Multi-Technique Framework for Comprehensive Network Analysis by Theodoros Kyriazos, Mary Poga

    Published 2025-06-01
    “…Future research will optimize the HMNM and explore its applications across various domains. The R programming code used for the network simulations and visualizations is conceptual and demonstrates the HMNM framework. …”
    Get full text
    Article
  5. 745

    Perceived impact of generative AI on assessments: Comparing educator and student perspectives in Australia, Cyprus, and the United States by René F. Kizilcec, Elaine Huber, Elena C. Papanastasiou, Andrew Cram, Christos A. Makridis, Adele Smolansky, Sandris Zeivots, Corina Raduescu

    Published 2024-12-01
    “…The growing use of generative AI tools built on large language models (LLMs) calls the sustainability of traditional assessment practices into question. Tools like OpenAI's ChatGPT can generate eloquent essays on any topic and in any language, write code in various programming languages, and ace most standardized tests, all within seconds. …”
    Get full text
    Article
  6. 746

    Optimizing ML models for cybercrime detection: balancing performance, energy consumption, and carbon footprint through multi-objective optimization by Romil Rawat

    Published 2025-04-01
    “…The methodology involves using NSGA-II for feature selection and evaluating energy consumption (Econ) and carbon footprint (CFP) with tools like CodeCarbon and EmissionsTracker. The performance of models such as LSTM (Long short-term memory) and SVM (Support Vector Machine) is assessed in terms of F-measure, with computational environments (Google Colab vs. personal laptop) compared for sustainability. …”
    Get full text
    Article
  7. 747

    ByteBait USB: a robust simulation toolkit for badUSB phishing campaign by Wenhao Li, Selvakumar Manickam, Yung-Wey Chong, Yongqing He, Ho Yean Li, Binyong Li

    Published 2025-07-01
    “…This paper addresses BadUSB devices in phishing campaigns, which exploit inherent trust in USB devices to execute malicious actions like keystroke injection. These attacks are particularly dangerous as their malicious code resides in firmware, evading traditional antivirus solutions. …”
    Get full text
    Article
  8. 748

    Mitigating Quantization Errors Due to Activation Spikes in Gated Linear Unit-Based Large Language Models by Jaewoo Yang, Hayun Kim, Junyung Ji, Younghoon Kim

    Published 2025-04-01
    “…However, we identify a critical challenge in activation quantization for GLU (Gated Linear Unit) variants, which are commonly used in the feed-forward networks of modern LLMs like the LLaMA family. Specifically, severe local quantization errors arise due to excessively large activation magnitudes, which we refer to as activation spikes, leading to significant degradation in model performance. …”
    Get full text
    Article
  9. 749

    The crane radar: Development and deployment of an operational eco-digital twin by K. De Koning

    Published 2025-03-01
    “…By showing an example of the crane radar, a real-time digital twin of the common crane (Grus grus) migration, this paper illustrates what digital twins could look like in ecology, and which challenges modellers face towards actual deployment of their digital twin in an operational environment.The most important challenges identified here are: ex ante quality and error control of the input data; accounting for time lags between observations and data availability; harmonising the updating frequencies and temporal resolutions of models and data; developing robust model/software code to keep digital twins alive; the necessity of learning new skills for ecological modellers; and effectively communicating digital twin outputs to stakeholders. …”
    Get full text
    Article
  10. 750

    Comparing the Shielding Features of Graphene and Impregnated Activated Carbon with Selected Traditional Shielding Materials For Gamma-Rays by Hasan Gülbiçim, Doğan Erbahar, Türkan Nuredin, Dilara İckecan

    Published 2023-06-01
    “…XCom software and EGSnrc simulation code were used to obtain the theoretical values of various shielding parameters which are significantly important to be able to understand the shielding properties of AC and RGO for gamma-rays. …”
    Get full text
    Article
  11. 751
  12. 752

    Generative adversarial DacFormer network for MRI brain tumor segmentation by Muqing Zhang, Qiule Sun, Yutong Han, Mingli Zhang, Wei Wang, Jianxin Zhang

    Published 2025-05-01
    “…While effective, these architectures primarily model local dependencies, lacking the ability to capture global interactions like pure Transformer. However, using pure Transformer directly causes the network to lose local feature information. …”
    Get full text
    Article
  13. 753

    Multi-strategy enhanced marine predator algorithm: performance investigation and application in intrusion detection by Zhongmin Wang, Yujun Zhang, Jun Yu, YuanYuan Gao, Guangwei Zhao, Essam H. Houssein, Rui Zhong

    Published 2025-02-01
    “…Abstract Marine Predator Algorithm (MPA) is a recently proposed population-based metaheuristic algorithm (MA), and its effectiveness has been proven in many stochastic optimization challenges. However, like most MAs, MPA suffers from shortcomings such as imbalanced search preferences and stagnation in the late phase of optimization. …”
    Get full text
    Article
  14. 754

    OpenCL-Based FPGA Accelerator for 3D FDTD with Periodic and Absorbing Boundary Conditions by Hasitha Muthumala Waidyasooriya, Tsukasa Endo, Masanori Hariyama, Yasuo Ohtera

    Published 2017-01-01
    “…Accelerator is designed using a “C-like” programming language called OpenCL (open computing language). …”
    Get full text
    Article
  15. 755

    ChatGPT as a data analyst: an exploratory study on AI-supported quantitative data analysis in empirical research by Dimitri Prandner, Daniela Wetzelhütter, Sönke Hese

    Published 2025-01-01
    “…Accordingly, this paper explores the potential and pitfalls of using a tool like ChatGPT as an assistant in quantitative data analysis. …”
    Get full text
    Article
  16. 756

    SPUFChain: Permissioned Blockchain Lightweight Authentication Scheme for Supply Chain Management Using PUF of IoT by Mohammad Iqbal Saryuddin Assaqty, Ying Gao, Abeer D. Algarni, Siraj Khan, Mohuya Chakraborty, Hafied Nur Siddiqi, Sadique Ahmad

    Published 2025-01-01
    “…A smart contract on the blockchain is a software code that executes spontaneously as and when the conditions of the contract or agreement are satisfied. …”
    Get full text
    Article
  17. 757
  18. 758
  19. 759

    Some verbal cues to deception in near-death experiences by Shima Solati, Ali Izanloo, Azam Estaji

    Published 2025-06-01
    “…Result and Discussion Considering Farsi language rules, we analyzed stories from both groups separately and coded each cue as follows:Negative statementsFor this code, we counted verbs with negative prefixes, the words ‘no’, ‘nobody’, and ‘nothing’. …”
    Get full text
    Article
  20. 760

    Improving Digital Cancer Care for Older Black Adults: Qualitative Study by Paul Wankah, Shivani Chandra, Aisha Lofters, Nebila Mohamednur, Beverley Osei, Tutsirai Makuwaza, Ambreen Sayani

    Published 2025-02-01
    “…A redesign of digital cancer care programs, tailored to the needs of most structurally marginalized groups like older Black adults, can enhance the digital care experience for all population groups. …”
    Get full text
    Article