Showing 1,921 - 1,940 results of 4,609 for search '"code"', query time: 0.06s Refine Results
  1. 1921

    Effect of Steam Blanching, Dehydration Temperature & Time, on the Sensory and Nutritional Properties of a Herbal Tea Developed from Moringa oleifera Leaves by Yasara W. H. Wickramasinghe, Indira Wickramasinghe, Isuru Wijesekara

    Published 2020-01-01
    “…These samples were evaluated, employing a trained panel of 5 tea tasters and a semi trained panel of 35 members. The sample code 706 (steam blanched, 65°C—4 h) was selected as the sample with best sensory attributes. …”
    Get full text
    Article
  2. 1922

    A flexible way to study composites in ecology using structural equation modeling by Xi Yu, Florian Schuberth, Jörg Henseler

    Published 2025-02-01
    “…To demonstrate these advantages, we provide an ecological illustrative example including the R code to reproduce our results. Specifically, we present different H–O specifications and compare them statistically. …”
    Get full text
    Article
  3. 1923

    Evaluating Company’s Readiness for Adopting Product Line Engineering: a Second Evaluation Round by Luisa Rincón, Raúl Mazo, Camille Salinesi

    Published 2018-12-01
    “…Product lines have emerged in the software industry as an attractive approach to perform planned reuse of code. Nevertheless, a product line solution is not appropriate in all cases and also requires some conditions to be implemented successfully. …”
    Get full text
    Article
  4. 1924

    Utilization of ICT Skills on Library Information Resources By Students At Kabale Brainstorm High School. by Twongyeirwe, Esther

    Published 2023
    “…The study findings indicated that Computers, Scanners, Bar code readers, CD-ROM, Machines for Photocopying, Digital cameras and CCTV cameras, Networked Servers, and LDC Projector were identified by all respondents as ICT facilities available at Kabale Brainstorm High School. …”
    Get full text
    Thesis
  5. 1925

    Utilization of ICT Skills on Library Information Resources by Students at Kabale Brainstorm High School. by Twongyeirwe, Esther

    Published 2023
    “…The study findings indicated that Computers, Scanners, Bar code readers, CD-ROM, Machines for Photocopying, Digital cameras and CCTV cameras, Networked Servers, and LDC projectors were identified by all respondents as ICT facilities available at Kabale Brainstorm High School. …”
    Get full text
    Thesis
  6. 1926

    Analysis of Precooling Injection Transient of Steam Generator for High Temperature Gas Cooled Reactor by Yan Wang, Lei Shi, Yanhua Zheng

    Published 2017-01-01
    “…In this paper, a pebble-bed high temperature gas cooled reactor is modeled by thermal-hydraulic system analysis code and several postulated precooling injection transients are simulated and compared to evaluate their effects, which will provide support for the precooling design. …”
    Get full text
    Article
  7. 1927

    Predicting Postoperative Re-Tear of Arthroscopic Rotator Cuff Repair Using Artificial Intelligence on Imbalanced Data by Zhibin Zhang, Zhewei Zhang, Zhaoxiang Peng, Yihong Dong

    Published 2025-01-01
    “…The classification performance of the proposed method is tested on the dataset of whether rotator cuff is re-torn after surgery, and the results show that our method achieves state-of-the-art performance in a five-fold cross-validation setting.The code of this work is available at <uri>https://github.com/nishuihan111/WL-GCN.git</uri>.…”
    Get full text
    Article
  8. 1928

    Mediation in criminal proceedings: novelties of legislation and prospects for its improvement by T. H. Fomina

    Published 2022-03-01
    “…It has been proved that the legal basis for mediation in criminal proceedings may be the provisions of the CPC of Ukraine on criminal proceedings under agreements, as well as the provisions of the Criminal Code of Ukraine on release from criminal liability in connection with reconciling the perpetrator with the victim. …”
    Get full text
    Article
  9. 1929

    Malware recognition approach based on self‐similarity and an improved clustering algorithm by Jinfu Chen, Chi Zhang, Saihua Cai, Zufa Zhang, Lu Liu, Longxia Huang

    Published 2022-10-01
    “…However, existing solutions addressing this problem rely heavily on the source code and misrecognise vulnerabilities (i.e. incur a high false positive rate (FPR)) in some cases. …”
    Get full text
    Article
  10. 1930

    Application of Energy Saving and Environmental Protection Materials in Architectural Design by Zixiang Yan

    Published 2022-01-01
    “…The area of reinforcement required for the member control section is obtained according to the structural analysis program, the main purpose of reinforcement selection is to select safe, economical, and reasonable reinforcement on the premise of meeting the provisions of the code and the requirements of reinforcement structure. …”
    Get full text
    Article
  11. 1931
  12. 1932

    MalHAPGNN: An Enhanced Call Graph-Based Malware Detection Framework Using Hierarchical Attention Pooling Graph Neural Network by Wenjie Guo, Wenbiao Du, Xiuqi Yang, Jingfeng Xue, Yong Wang, Weijie Han, Jingjing Hu

    Published 2025-01-01
    “…This framework delivers a comprehensive profile of malicious code across semantic, syntactic, and structural dimensions. …”
    Get full text
    Article
  13. 1933

    The Effect of Backfill Gas Pressure on the Thermal Response of a Dry Cask for Spent Nuclear Fuel by Michela Angelucci, Salvatore A. Cancemi, Rosa Lo Frano, Sandro Paci

    Published 2025-01-01
    “…In particular, the analysis, carried out with the MELCOR code, investigates the thermal response of the ventilated, concrete-based HI-STORM 100S cask, currently employed for spent fuel elements of Light Water Reactors (LWRs), when imposing different initial pressures for the helium backfill gas. …”
    Get full text
    Article
  14. 1934

    The Counter-Order of Simulacra: Alan Duff’s gut novel, Once Were Warriors by Christian Gutleben

    Published 2007-05-01
    “…Par sa "violence épistémique" (Spivak, 1988) et par la création d’un nouveau code linguistique, Duff réhabilite la fonction éthique de l’art et se coupe radicalement de l’esthétique ludique et autoréflexive du postmodernisme…”
    Get full text
    Article
  15. 1935

    Rarefied Nozzle Flow Computation Using the Viscosity-Based Direct Simulation Monte Carlo Method by Deepa Raj Mopuru, Nishanth Dongari, Srihari Payyavula

    Published 2024-12-01
    “…Key boundary conditions, including upstream and downstream pressure conditions and thermal wall treatments with diffuse reflection, are incorporated into the code. The μDSMC results are validated against traditional DSMC outcomes, showing strong agreement. …”
    Get full text
    Article
  16. 1936

    The influence of mineralogical composition and alkali reactivity for utilization of some Egyptian crushed granites as a concrete aggregate by Maged El-fakharany, Ahmed Omar, Mahmoud Abdellatif

    Published 2023-07-01
    “…It was obtained that all studied granite aggregates within acceptable limits of concrete aggregate by following Egyptian code (ECP-203) although their variation on its mineralogical composition. …”
    Get full text
    Article
  17. 1937

    Chronic Kidney Disease in the Eastern Region of the State of Mexico: Implication of the Social Determinants of Health by Luis Enrique Hernández Gamundi, Donovan Casas Patiño, Alejandra Rodríguez Torres, Angélica Heredia Sánchez

    Published 2023-06-01
    “…<br /><strong>Methods:</strong> a qualitative study was carried out in the eastern part of the State of Mexico in which 27 patients with chronic kidney disease participated who answered a semi-structured interview, using the Iramuteq v0.7alpha2 software to code the speeches. <br /><strong>Results:</strong> the voice of the disease is relegated to be devastating in its attention and way of living; income due to constant travel, medical care costs and unemployment conjugates a deadly trap that conditions the economic fragmentation of the patient; public policies are unattainable -referring to the transplant program-; culture shows a religious symbolism of protection to the health coupled with social stigmatization for suffering chronic kidney disease CKD; the health system transits in lack of service guarantees -dialysis, hemodialysis, lack of supplies-; gender shows equality in care but overload of women in patient care. …”
    Get full text
    Article
  18. 1938

    Interrogation of a minor victim during the investigation of criminal offenses related to domestic violence by V. P. Gontarenko

    Published 2022-09-01
    “…Interrogation of a minor must be carried out by an investigator according to the rules provided by the Code of Criminal Procedure of Ukraine. However, before the interrogation, the investigator must: select a suitable specialist psychologist; give them the opportunity to get acquainted with the materials of the criminal proceedings, taking into account the meeting with the minor; based on the circumstances to be proven, agree with the specialist on the content and form of the questions necessary for clarification. …”
    Get full text
    Article
  19. 1939

    Gene Editing in Pluripotent Stem Cells and Their Derived Organoids by Hang Zhou, Yun Wang, Li-Ping Liu, Yu-Mei Li, Yun-Wen Zheng

    Published 2021-01-01
    “…Are the tools for rewriting the code of life a boon to humanity or a Pandora’s box? …”
    Get full text
    Article
  20. 1940

    An efficient bio-inspired algorithm based on humpback whale migration for constrained engineering optimization by Mojtaba Ghasemi, Mohamed Deriche, Pavel Trojovský, Zulkefli Mansor, Mohsen Zare, Eva Trojovská, Laith Abualigah, Absalom E. Ezugwu, Soleiman kadkhoda Mohammadi

    Published 2025-03-01
    “…These findings confirm WMA is an effective instrument for addressing intricate optimization challenges across several domains. The source code of the WMA is publicly available at https://www.optim-app.com/projects/wma.…”
    Get full text
    Article