Showing 4,181 - 4,200 results of 5,630 for search '(( making and coding ) OR ( targeting and coding ))', query time: 0.15s Refine Results
  1. 4181

    Physiological signal analysis and open science using the Julia language and associated software by George Datseris, Jacob S. Zelko, Jacob S. Zelko

    Published 2024-11-01
    “…Such an environment increases the likelihood that an individual not (originally) associated with a software program would still be willing to contribute their code, further promoting code sharing and reuse. On the other hand, Julia’s exceptionally strong package manager and surrounding ecosystem make it easy to create self-contained, reproducible projects that can be instantly installed and run, irrespective of processor architecture or operating system.…”
    Get full text
    Article
  2. 4182

    ملتان میں تاریخ و اصول حدیث پر ہونے والے کام کا تنقیدی جائزہ by Muhammad Zafar Iqbal Saeedi, Muhammad Akram Rana

    Published 2021-02-01
    “…Both the sources have played an important role in the establishment of code of conduct. Throughout the history the scholars of the ancient and the modern times have played an important role to make them understandable. …”
    Get full text
    Article
  3. 4183

    Transformation of C Programming Language Memory Model into Object-Oriented Representation of EO Language by Alexander I. Legalov, Yegor G. Bugayenko, Nickolay K. Chuykin, Maksim V. Shipitsin, Yaroslav I. Riabtsev, Andrey N. Kamenskiy

    Published 2022-09-01
    “…One of such problems is static code analysis. Such solutions make it possible to isolate low-level code fragments into separate program objects, focusing on their study and possible transformations into more reliable code.…”
    Get full text
    Article
  4. 4184

    Automatic Three-Dimensional Measurement of Large-Scale Structure Based on Vision Metrology by Zhaokun Zhu, Banglei Guan, Xiaohu Zhang, Daokui Li, Qifeng Yu

    Published 2014-01-01
    “…All relevant key techniques involved in photogrammetric vision metrology for fully automatic 3D measurement of large-scale structure are studied. A new kind of coded target consisting of circular retroreflective discs is designed, and corresponding detection and recognition algorithms based on blob detection and clustering are presented. …”
    Get full text
    Article
  5. 4185

    A multiband self-oscillation mode in radar with a positive feedback by V. M. Kutuzov

    Published 2015-02-01
    “…A multiband self-oscillation mode in radar with a positive space and target feedback (PFB) is suggested and analyzed. It does not degrade characteristics of emission security in case of parallel space range surveillance. …”
    Get full text
    Article
  6. 4186

    Encouraging reusability of computational research through Data-to-Knowledge Packages - A hydrological use case [version 2; peer review: 2 approved] by Markus Konkol, Sami Domisch, Astra Labuce, Vanessa Bremerich, Merret Buurman

    Published 2025-07-01
    “…However, reproducibility alone does not guarantee these benefits. Users still need to make considerable efforts to understand the data and analysis code before they can reuse these components in other contexts. …”
    Get full text
    Article
  7. 4187

    Designing an efficient model of employee behavior intelligence by Mohammad Ali Sadeghi, Abbas Babaeenezhad, Reza Zeinalzadeh, Mehdi mohammad Bagheri

    Published 2025-02-01
    “…The results showed that the extracted concepts related to the efficient model of employee behavior intelligence in the General Customs Department and the General Tax Department of Hormozgan Province include 92 primary codes, 24 basic themes, and 8 organizing themes of organizational citizenship behavior, destructive work behaviors, planned behaviors, strategic proactive behaviors, political behaviors, counterproductive behaviors, ethical behaviors, and desirable social behaviors. …”
    Get full text
    Article
  8. 4188

    Detection of Malware Propagation in Sensor Node and Botnet Group Clustering Based on E-mail Spam Analysis by Taejin Lee, Hesun Cho, Haeryong Park, Jin Kwak

    Published 2015-09-01
    “…This paper proposes a scheme that detects those types accurately, including a clustering method that targets the URL included in the e-mail body, e-mail subject, attached file, and hosting server, to detect the botnet group infected with the same malicious code. …”
    Get full text
    Article
  9. 4189

    Some Disagreements with the Concept of “Consent” in Criminal Proceedings by Pavel G. Marfitsin

    Published 2016-09-01
    “…The author gives grounds and makes suggestions for improvements in the legislation.…”
    Get full text
    Article
  10. 4190

    BoostPolyGlot: A Structured IR Generation-Based Fuzz Testing Framework for GCC Compiler Frontend by Hui Liu, Hanbin Guo, Peng Liu, Tongding Hou

    Published 2025-05-01
    “…The compiler serves as a bridge connecting hardware architecture and application software, converting source code into executable files and optimizing code. Fuzz testing is an automated testing technology that evaluates software reliability by providing a large amount of random or mutated input data to the target system to trigger abnormal program behavior. …”
    Get full text
    Article
  11. 4191

    A qualitative study of safety and human factors challenges in process control rooms operators by Raziyeh Janizadeh, Alireza Choobineh, Hamidreza Mokarami, Mehdi Jahangiri

    Published 2025-07-01
    “…Key findings include overall workload (197 codes) followed by health hazards (69 codes) and workstation design (54 codes), highlighting ergonomic concerns. …”
    Get full text
    Article
  12. 4192
  13. 4193

    Nonparaxial propagation of an intense relativistic electron beam through dense media by Carl Ekdahl

    Published 2025-04-01
    “…An envelope equation is used to explore the propagation of a focused electron beam through dense conductive media like partially ionized high-pressure gas, metal vapor plumes from beam-target interactions, or low-density solid-phase targets. …”
    Get full text
    Article
  14. 4194

    THE CLASS OF PERFECT TERNARY ARRAYS by A. V. Sokolov, O. N. Zhdanov

    Published 2018-08-01
    “…Bent-sequences are used for development of modern cryptographic primitives, as well as for constructing constant amplitude codes (C-codes) used in code division multiple access technology. …”
    Get full text
    Article
  15. 4195

    THE PROBLEMS OF THE LEGAL REGIME OF LANDS OF HEALTH-IMPROVING AREAS AND RESORTS by E. Navasardova, G. Chechel, R. Nutrikhin

    Published 2021-09-01
    “…The norms of the Land code of the Russian Federation and related legislation were also amended, resulting in a number of theoretical and applied problems. …”
    Get full text
    Article
  16. 4196

    A practice-based approach to the conceptualisation of geographical mobility by Mathis Stock, Philippe Duhamel

    Published 2005-06-01
    “…In this paper, we will attempt to adopt an original approach: to classify different practices of mobility using a “geographical code of practice”. This code takes into account the conditions in which movements occur and the characteristics of the geographical sites involved. …”
    Get full text
    Article
  17. 4197

    Development of cohort definitions and algorithms to identify patients with Lennox-Gastaut syndrome or Dravet syndrome from real-world administrative healthcare databases by Drishti Shah, Victoria Divino, Justin Chen, Arturo Benitez, Jeannine Roth, J. Scott Andrews

    Published 2025-02-01
    “…LGS-specific and DS-specific diagnosis codes were identified in the United States, Spain, and United Kingdom; local codes in France, China, and Japan; and no LGS-specific or DS-specific diagnosis codes in Germany or Italy. …”
    Get full text
    Article
  18. 4198

    Comparative analysis of software optimization methods in context of branch predication on GPUs by I. Yu. Sesin, R. G. Bolbakov

    Published 2021-12-01
    “…GPU-run general-purpose programs will inevitably run into performance issues stemming from code branch predication. Code predication is a GPU feature that makes both conditional branches execute, masking the results of incorrect branch. …”
    Get full text
    Article
  19. 4199

    Culture as a Universal Variable Opportunity Flow and Selection Process in Silicon Valley by Olivier Alexandre

    Published 2022-03-01
    “…On the one hand, promotion of Silicon Valley’s “culture codes” increases the flow of entrants. On the other hand, from the techies’ point of view, acceptance of these codes by newcomers makes the selection process easier and more rational. …”
    Get full text
    Article
  20. 4200

    DIFFERENTIATING OF IMPLEMENTATION OF CIVIL LAW PRINCIPLES IN COURT PRACTICE by A. Y. Ryzhenkov

    Published 2013-12-01
    “…Practical value: the conclusion that the absence of a special rule allows the courts to apply the law analogy, or make a decision in accordance with the basic principles of civil legislation.…”
    Get full text
    Article