Search alternatives:
like » life (Expand Search)
Showing 1,001 - 1,020 results of 2,301 for search 'like of code', query time: 0.10s Refine Results
  1. 1001

    Central Neuraxial Blockade-Assisted External Cephalic Version in Reducing Caesarean Section Rate: Systematic Review and Meta-Analysis by Ibrahim Bolaji, Lillian Alabi-Isama

    Published 2009-01-01
    “…They were 1.5 times more likely than women not receiving anaesthesia to have a successful ECV. …”
    Get full text
    Article
  2. 1002

    Neutron dose evaluation in conventional and FLASH proton therapy by Felipe M .L. Souza, Ruy S. R. Neto, Arthur M. Rocha, S. C. Cardoso

    Published 2023-03-01
    “…Children treated with radiotherapy using photon beams are more likely to develop secondary neoplasms. Proton therapy can reduce the probability of neoplasm formation by up to 50%. …”
    Get full text
    Article
  3. 1003

    Introducing right turn on red for cyclists—a before-after study on behavioural adaption in Germany by Bettina Schröter, Sebastian Hantschel, Miriam Niestegge, Hagen Schüller, Regine Gerike

    Published 2024-09-01
    “…The share of cyclists turning right on red, which was already high at 80% before the introduction of RTOR, increased to 93% with RTOR, and cyclists were more likely to comply with traffic rules and less likely to cycle on the pavement. …”
    Get full text
    Article
  4. 1004
  5. 1005

    Repeat-induced point mutations driving Parastagonospora nodorum genomic diversity are balanced by selection against non-synonymous mutations by Darcy A. B. Jones, Kasia Rybak, Mohitul Hossain, Stefania Bertazzoni, Angela Williams, Kar-Chun Tan, Huyen T. T. Phan, James K. Hane

    Published 2024-12-01
    “…The strong potential for RIP-like mutations was balanced by negative selection against non-synonymous SNPs, that was observed within protein-coding regions. …”
    Get full text
    Article
  6. 1006

    ANALYZING FOUR IDENTITY STATUS ON SAIKAKU’S SHORT STORY “TWO OLD CHERRY TREES STILL IN BLOOM” TO ENHANCE CRITICAL READINGIN by Edy Suseno

    Published 2021-06-01
    “…Each status has two codes like uncertainty and unknown in identity diffusion, admiration and sympathy in identity foreclosure, struggle and chasing in identity moratorium, and settle and completion in identity achievement. …”
    Get full text
    Article
  7. 1007

    Transcriptomic analysis of intracellular RNA granules and small extracellular vesicles: Unmasking their overlap in a cell model of Huntington's disease by Deepti Kailash Nabariya, Lisa Maria Knüpfer, Patrick Hartwich, Manuela S. Killian, Florian Centler, Sybille Krauß

    Published 2025-06-01
    “…These aberrant RNA-protein ineractions also seed the formation of cytoplasmic liquid-like granules, such as stress granules. Emerging evidence demonstrates that granules formed via liquid-liquid phase separation can mature into gel-like inclusions that persist within the cell and may act as precursor to aggregates that occur in patients' tissue. …”
    Get full text
    Article
  8. 1008

    Algorithmic Management of Workers through Food Delivery Platforms in India by Mohammad Sajjad Hussain

    Published 2025-03-01
    “… This study explores the role of algorithmic management in India’s food delivery industry, specifically focusing on platforms like Swiggy and Zomato, which act more like employers than mere intermediaries. …”
    Get full text
    Article
  9. 1009

    Becoming Spectral: Toward a Media History of Ghosting by Torbjörn Rolandsson, Sadie Couture

    Published 2024-11-01
    “…Ghosting is considered acceptable in feminine-coded spheres like courtship. But it is viewed as inappropriate—sometimes even as signaling a broader social crisis—when it bleeds into other contexts, like when an employee ghosts their employer.…”
    Get full text
    Article
  10. 1010

    From Conflict to Peace: Fuqaha Political Exegesis on Israel's War Crimes in Palestine by Abdul Basid

    Published 2024-09-01
    “…Data collection involves analyzing war crimes documents, two-state resolution texts, and public forum comments. Thematic coding identifies patterns in the data. Findings show Indonesian netizens' strong opinions on social media, calling for accountability for figures like Netanyahu and urging ICC action. …”
    Get full text
    Article
  11. 1011

    THE MATERIALIZATION OF IDENTITY: ARCHITECTURE AND CONSUMPTION IN THE LATE ROMAN VILLAS OF LUSITANIA by Noé CONEJO

    Published 2024-11-01
    “…<p>Like in the rest of Hispania, the rural world in Lusitania underwent significant changes during the late 3<sup>rd</sup> and 4<sup>th</sup>centuries. …”
    Get full text
    Article
  12. 1012

    Evidence for retrogene origins of the prion gene family. by Sepehr Ehsani, Renzhu Tao, Cosmin L Pocanschi, Hezhen Ren, Paul M Harrison, Gerold Schmitt-Ulms

    Published 2011-01-01
    “…Our data suggest that during the emergence of metazoa, a cysteine-flanked core domain was modularly inserted, or arose de novo, in a preexisting ZIP ancestor gene to generate a prion-like ectodomain in a subbranch of ZIP genes. Approximately a half-billion years later, a genomic insertion of a spliced transcript coding for such a prion-like ZIP ectodomain may have created the prion founder gene. …”
    Get full text
    Article
  13. 1013

    Perceptions of physical education students and teachers on physical education learning by Bayu Nugraha, Suharjana Suharjana, Ria Lumintuarso

    Published 2022-05-01
    “…Most students agreed they like sports or physical activities (95.6%). Few students like game-based physical education activities (18.89%). …”
    Get full text
    Article
  14. 1014

    Open-Vocabulary Action Localization With Iterative Visual Prompting by Naoki Wake, Atsushi Kanehira, Kazuhiro Sasabuchi, Jun Takamatsu, Katsushi Ikeuchi

    Published 2025-01-01
    “…Specifically, we sample video frames and create a concatenated image with frame index labels, allowing a VLM to identify the frames that most likely correspond to the start and end of the action. …”
    Get full text
    Article
  15. 1015

    Bayesian network modeling applied to food risks: Data from General Administration of Customs of China as an example by Xuanyu Ying, Anni Lu, Qiang Cai, Jun Lu

    Published 2024-12-01
    “…The risk was also related to where the food is produced, but not where it is likely to be sold. The BN model also is able to systematically elaborate uncertainty and obtain information through probabilistic inference, which might be useful for giving additional new insights potentially not captured by classical methods. …”
    Get full text
    Article
  16. 1016

    Turbulent drifts of impurity ions as an explanation for anomalous radial transport in the far-SOL of DIII-D by S.A. Zamperini, T.N. Bernard, D.L Rudakov, J.A Boedo

    Published 2024-01-01
    “…We conclude that turbulent drifts are a likely explanation for historically anomalous radial impurity transport.…”
    Get full text
    Article
  17. 1017

    Ejecta Wakes from Companion Interaction in Type Ia Supernova Remnants by Logan J. Prust, Gabriel Kumar, Lars Bildsten

    Published 2025-01-01
    “…Type Ia supernovae are triggered by accretion onto a white dwarf from a companion that is most likely Roche lobe–filling at the time of the explosion. …”
    Get full text
    Article
  18. 1018

    The Hong Kong Influenza Virus: Treats to the Portrait after 50 Years and the Future Influenza Pandemic by E. P. Kharchenko

    Published 2020-03-01
    “…From the primary structure of their genes it were defined their translational codes. To trace the H3N2 subtype evolution in the last decade we compared the H3 dominant sequences of adjacent seasons to establish their changes.Results. …”
    Get full text
    Article
  19. 1019

    Effect of the Number and Distribution of Circular Holes on the Damage and Fracture of Limestone Using PFC2D by Handong Liu, Shuai Liu, Haining Liu, Yunyou Fu, Minglei Kang, Zhe Bai, Jianglong Xu, Chao Zheng

    Published 2022-01-01
    “…This study develops seven numerical models of limestone samples with different numbers and distributions of circular hole flaws using 2-D particle flow discrete element code (PFC2D) to investigate their impact on the mechanical properties of limestone while maintaining the same flaws area. …”
    Get full text
    Article
  20. 1020

    PERFORMANCE REFINEMENT OF CONVOLUTIONAL NEURAL NETWORK ARCHITECTURES FOR SOLVING BIG DATA PROBLEMS by Saud Aljaloud

    Published 2023-02-01
    “…Therefore, two of the most well-liked neural network frameworks, Theano and TensorFlow, were compared in this study for how well they performed on a given problem. …”
    Get full text
    Article