Suggested Topics within your search.
Suggested Topics within your search.
- Agriculture 1
- Artificial Intelligence 1
- Artificial intelligence 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Coding and Information Theory 1
- Coding theory 1
- Corporations 1
- Data Mining and Knowledge Discovery 1
- Data mining 1
- Economic Policy 1
- Economic policy 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Environmental Economics 1
- Environmental economics 1
- Exercise 1
- Finance 1
- Genetics 1
- Industrial Organization 1
- Industrial organization 1
- Information theory 1
- MEDICAL / Biochemistry 1
- MEDICAL / Physiology 1
- MEDICAL / Sports Medicine 1
- Management 1
- Mathematical and Computational Biology 1
-
1
Assessing Compliance: Violations of WHO Code in Breast Milk Substitute Marketing, Ecuador
Published 2025-04-01“…Ecuador, like many countries, seeks to regulate these promotions under the WHO's International Code of Marketing of Breast‐Milk Substitutes. This cross‐sectional analysis assessed BMS marketing compliance with WHO's Code in Ecuador. …”
Get full text
Article -
2
Multi-targets device-free localization based on sparse coding in smart city
Published 2019-06-01“…In order to satisfy the practical localizing application in smart city, an efficient multi-target device-free localization method is proposed based on a sparse coding model. …”
Get full text
Article -
3
Deep Clustering of Student Code Strategies Using Multi-View Code Representation (CMVAE)
Published 2025-03-01“…In programming education, it is common for students to submit solutions to algorithmic problems that implement the same functionality but are not labeled, making it difficult to identify which codes employ similar strategies. …”
Get full text
Article -
4
Understanding Epistatic Interactions between Genes Targeted by Non-coding Regulatory Elements in Complex Diseases
Published 2014-12-01“…Moreover, the majority of associated single-nucleotide polymorphisms resides in non-coding regions, making it difficult to understand their phenotypic contribution. …”
Get full text
Article -
5
Can LLMs effectively assist medical coding? Evaluating GPT performance on DRG and targeted clinical tasks
Published 2025-08-01“…Importantly, the recent and drastic decline of the cost of deploying large language models makes their integration into medical coding workflows increasingly feasible. …”
Get full text
Article -
6
Temporal variation in the diagnosis of resolved atrial fibrillation and the influence of performance targets on clinical coding: cohort study
Published 2019-11-01“…Among ‘resolved AF’ patients with CHA2DS2-VASc score ≥1, 81.9% (95% CI 81.1 to 82.6) had no current anticoagulant prescription, and 62.3% (95% CI 61.4 to 63.2) had no record of any anticoagulant prescription.Conclusion The introduction of AF performance targets was followed by a large increase in use of the ‘resolved AF’ code, particularly in the months immediately before practices make their anticoagulant performance target submissions. …”
Get full text
Article -
7
Corporate Governance Code and Earnings Management
Published 2024-11-01“…Considering this issue and the new corporate governance code in the Iranian capital market, in this research, the impact of the new corporate governance code on accrual-based earnings management and real earnings management is investigated. …”
Get full text
Article -
8
Enforcing Grammar in Code Synthesis with Transformers
Published 2023-05-01“…Even more so than natural language, code is extremely sensitive to syntax; a small error could make an entire snippet invalid. …”
Get full text
Article -
9
What disabilities make it possible to take up employment? Case studies by industry
Published 2019-06-01Subjects: Get full text
Article -
10
Research progress in code reuse attacking and defending
Published 2018-03-01“…Code reuse attacks make use of binary code existed in the attacked target to perform attack action,such technique breaks out the traditional assumption that malicious behavior always be introduced from the outside,it is representative sample of the advanced memory corruption techniques and also the focus of attention in the software security research field.The generation background and implementation principle were described firstly,and then the recent progresses of the technique,including improvement and variants,implementation methods under the different architecture platforms,automatic construction and important extension including blind ROP and non-control data attacks based on code reuse attacks,were introduced respectively.Various defense mechanisms and possible counter-defense methods for code reuse attacks were also discussed.Finally a perspective of the future work in this research area was discussed.…”
Get full text
Article -
11
Application of Internet marketing tools for management decision-making by logistics enterprises
Published 2022-12-01“…The article discusses implementing Internet marketing tools by logistics enterprises for the management of decision-making processes. …”
Get full text
Article -
12
MicroRNA-1303 in cancer pathogenesis and therapy: clinical implications for biomarker development and targeted treatment strategies
Published 2025-07-01Subjects: Get full text
Article -
13
A landscape analysis of investors in the global breast milk substitute industry to target for advocacy
Published 2025-01-01Subjects: Get full text
Article -
14
Women’s exposure to commercial milk formula marketing: a WHO multi-country market research study
Published 2024-11-01Subjects: Get full text
Article -
15
The role of non-coding RNAs in the regulation of cell death pathways in melanoma
Published 2025-06-01“…Such diverse functions make ncRNAs invaluable as diagnostic and prognostic biomarkers and potential therapeutic targets. …”
Get full text
Article -
16
The JPEG Pleno Learning-Based Point Cloud Coding Standard: Serving Man and Machine
Published 2025-01-01“…Efficient point cloud coding has become increasingly critical for multiple applications such as virtual reality, autonomous driving, and digital twin systems, where rich and interactive 3D data representations may functionally make the difference. …”
Get full text
Article -
17
The Need for an International law-Informed Code of Conduct for Nuclear Command, Control and Communication
Published 2025-06-01“…To be effective, NC3 systems must fulfill certain critical functions, including detection, warning, and attack characterization; nuclear planning and targeting; decision-making; receiving orders; and enabling the management and direction of forces. …”
Get full text
Article -
18
Damage and Failure Modeling of Composite Material Structures Using the Pam-Crash Code
Published 2024-12-01Get full text
Article -
19
Asteroids Exploration Trajectory Optimal Design with Differential Evolution Based on Mixed Coding
Published 2015-07-01“…This paper proposes a novel method to design the optimal trajectory by differential evolution (DE) algorithm for asteroid exploration based on mixed coding. In our method, the celestial sequence and the time sequence are coded together into the chromosomes of DE and optimized them simultaneously. …”
Get full text
Article -
20
Novel small non-coding RNAs of Epstein-Barr virus upregulated upon lytic reactivation aid in viral genomic replication and virion production
Published 2025-05-01Subjects: Get full text
Article