Showing 1,701 - 1,720 results of 4,609 for search '"code"', query time: 0.07s Refine Results
  1. 1701

    Digital Rebirth of Dongba Pattern: An Improved Active Contour Model for Pattern Contour Extraction by Yuan Li, Tao Wu, Rongbing Fu, En Lu

    Published 2025-01-01
    “…Finally, based on the proposed pattern contour extraction method, the design innovation practice of Dongba cultural posters is completed from two aspects: pattern selection and transformation, artistic processing and poster design. The code is available at: <uri>https://github.com/jsluen/IACM</uri>.…”
    Get full text
    Article
  2. 1702

    Tax evasion: initiation of pre-trial investigation, primary actions, main directions of the pre-trial investigation body’s work by O. V. Hryhorashchenko

    Published 2023-07-01
    “…The elements of a criminal offence under Article 212 of the Criminal Code of Ukraine have been detailed. It has been emphasised that for an objective, qualitative, comprehensive, full study of the case file, the investigator may invite persons with special knowledge in the field of tax relations, including specialists of the State Audit Service of Ukraine and the Main Department of the State Tax Service. …”
    Get full text
    Article
  3. 1703

    Probabilistic Evaluation of Seismic Performance of Steel Buildings with Torsional Irregularities in Plan and Soft Story under Mainshock-Aftershock Sequence by Hamed Kouhestanian, Mohammad Hossein Razmkhah, Jalil Shafaei, Hossein Pahlavan, Mohammad Shamekhi Amiri

    Published 2023-01-01
    “…The seismic fragility curves were calculated for four damage levels by selecting the relative displacement capacity at seismic performance levels of slight, moderate, extensive, and complete damage from the US HAZUS code. The analysis was done using structural reliability relationships and incremental dynamic analysis with the OpenSees software platform. …”
    Get full text
    Article
  4. 1704

    GPS-SBAS-Based Orbit Determination for Low Earth Orbiting Satellites by Mingyu Kim, Jeongrae Kim

    Published 2023-01-01
    “…The onboard navigator requires high positioning reliability, and code pseudoranges, rather than phase pseudoranges, are used for the primary measurements. …”
    Get full text
    Article
  5. 1705

    Dispersive Sweatt Model for Broadband Lens Design with Metasurfaces by Weiyu Chen, Ko-Han Shih, C. Kyle Renshaw

    Published 2025-01-01
    “…Importantly, the DSM is based on ray optics and enables the design of MS-containing systems using conventional optical design software such as Zemax and Code V. We use the DSM to demonstrate the design of a hybrid refractive/MS achromatic doublet for the midwave infrared (MWIR) band. …”
    Get full text
    Article
  6. 1706

    THE NUREMBERG TRIAL AND CONTRIBUTIONS TO THE DEVELOPMENT OF INTERNATIONAL HUMANITARIAN LAW: AN APPRAISAL by ANDREW BUYENGUM JACKSON, GAMBO NELSON

    Published 2025-02-01
    “…The book codifies international humanitarian law and is a reference for the codes of the military tribunal at Nuremberg for the trial of the Nazi leaders for war crimes against humanity after the Second World War. …”
    Get full text
    Article
  7. 1707

    Perfectionism as an expected job seekers’ social quality in online recruitment by Yu. A. Filyasova

    Published 2022-07-01
    “…In a wider meaning, perfectionism is considered as a social and personal characteristic of an employee, both efficient and initiative, wearing a dress code specified by internal corporate rules, open-minded, internally motivated and capable of fulfilling duties within the established deadline, ready to suggest effective approaches to organizing business processes and to work overtime, completing extensive assignments, to work more than is mentioned in work duties; perfectionism characterizes a loyal employee willing to participate at full capacity in developing the organization, to efficiently interact with internal and external communicants and to actively contribute to organization performance and competitiveness.…”
    Get full text
    Article
  8. 1708

    An Efficient Approach for Web Indexing of Big Data through Hyperlinks in Web Crawling by R. Suganya Devi, D. Manjula, R. K. Siddharth

    Published 2015-01-01
    “…The links are then accessed via the source code and its metadata such as title, keywords, and description are extracted. …”
    Get full text
    Article
  9. 1709

    Gulf Coast Lupine, Lupinus westianus var. westianus by Debbie Miller, Mack Thetford, Chris Verlinde, Gabriel Campbell, Ashlynn Smith

    Published 2018-10-01
    “… Gulf coast lupine (Lupinus westianus var. westianus) is listed as threatened by the Plants in the Preservation of Native Flora of Florida Act, Chapter 5B-40, Florida Administrative Code, 1998, amended (Wunderlin et al. 2017). The species is endemic to coastal counties in the western Panhandle of Florida. …”
    Get full text
    Article
  10. 1710
  11. 1711

    Saunders Medical Office Management / by Andress, Alice Anne

    Published 2009
    Table of Contents: “…The health care professional -- Personnel management -- The front office -- Written communication -- Medical record -- Billing, coding, and collections -- Fraud, abuse, and compliance -- Documentation and risk assessment -- Ethical and legal issues -- Health care technology -- Safety and health -- Responsibilities of the manager -- Outpatient services, ambulatory surgery centers, and hospitals -- The financial side -- Medical marketing.…”
    Table of contents only
    View in OPAC
    Book
  12. 1712

    Understanding Work Rhythms in Software Development and Their Effects on Technical Performance by Jiayun Zhang, Qingyuan Gong, Yang Chen, Yu Xiao, Xin Wang, Aaron Yi Ding

    Published 2024-01-01
    “…The temporal patterns of code submissions, denoted as work rhythms, provide valuable insight into the work habits and productivity in software development. …”
    Get full text
    Article
  13. 1713

    Evaluating the readability, quality, and reliability of online information on sjogren's syndrome by Erkan Ozduran, Volkan Hanci

    Published 2023-01-01
    “…The Journal of American Medical Association (JAMA) score was used to assess the websites' reliability, the DISCERN score, the Health on the Net Foundation code of conduct (HONcode) was used to assess quality, and Alexa was used to analyze their popularity. …”
    Get full text
    Article
  14. 1714

    LazyAct: Lazy actor with dynamic state skip based on constrained MDP. by Hongjie Zhang, Zhenyu Chen, Hourui Deng, Chaosheng Feng

    Published 2025-01-01
    “…The inferences reduction significantly decreases the time and FLOPs required by the LazyAct algorithm to complete tasks. Code is available here https://www.dropbox.com/scl/fo/wyoqo6q9gyt86zobfgbvx/h?…”
    Get full text
    Article
  15. 1715

    Foreign experience of legal regulation for separate offenses administrative liability and the possibility of its application in Ukraine by M. Yu. Kriepakova

    Published 2021-09-01
    “…Based on the study, the ways of implementation of foreign experience in Ukraine are outlined, proposals for amendments to the Law of Ukraine "On state regulation of production and circulation of ethyl alcohol, cognac and fruit, alcoholic beverages, tobacco products, liquids used in electronic cigarettes and fuel" and the Code of Ukraine on Administrative Offenses, aimed at regulating the involvement of a minor in the use of tobacco products, electronic cigarettes, liquids used in electronic cigarettes, devices for consumption of tobacco products without their combustion, the implementation of which improves administrative legislation are formulated. …”
    Get full text
    Article
  16. 1716

    Financial and legal principles of social protection of military personnel by O. P. Hetmanets

    Published 2023-09-01
    “…It has been determined that in order to improve the financial and legal foundations of social protection of servicemen, it is advisable to ensure two conditions: firstly, the introduction of a budget classification code of types of special social payments to servicemen in the expenditures of the State Budget of Ukraine, and secondly, compliance with the targeting of benefits, guarantees, compensations and other social payments, which are defined by the current legislation for military personnel and their family members. …”
    Get full text
    Article
  17. 1717

    Polycaprolactone Scaffolds Fabricated via Bioextrusion for Tissue Engineering Applications by Marco Domingos, Dinuccio Dinucci, Stefania Cometa, Michele Alderighi, Paulo Jorge Bártolo, Federica Chiellini

    Published 2009-01-01
    “…This paper presents a novel extrusion-based system to produce 3D scaffolds with controlled internal/external geometry for TE applications.The BioExtruder is a low-cost system that uses a proper fabrication code based on the ISO programming language enabling the fabrication of multimaterial scaffolds. …”
    Get full text
    Article
  18. 1718

    Vulnerability Testing and Analysis on Websites and Web-Based Applications in the XYZ Faculty Environment Using Acunetix Vulnerability by Mifthahul Rahmi, Yuhandri Yunus, Sumijan Sumijan

    Published 2024-12-01
    “…The optimization process involved source code review and enhancement to improve website features. …”
    Get full text
    Article
  19. 1719

    Steady Wind Load on External Surface and Its Effect on Wind-Induced Response for a 200 m High Natural-Draught Cooling Tower by Yunfeng Zou, Fanrong Xue, Xuhui He, Chenzhi Cai, Shouke Li

    Published 2021-01-01
    “…Taking the wind load specified in the code as an example, the influence of the distribution of external pressure on the wind-induced response was further analyzed. …”
    Get full text
    Article
  20. 1720

    Improved CLIP-ILP Model for Detecting Illegal Passenger Transport in Freight Trucks by Xuan Wu, Wenlin Pan

    Published 2025-01-01
    “…This research not only highlights the potential of deep learning technologies in enhancing traffic safety but also provides a novel and efficient approach for law enforcement agencies to monitor and address this growing issue effectively. You can access the code for our proposed method at <uri>https://github.com/wu-xuan-git/CLIP-ILP</uri>.…”
    Get full text
    Article