Showing 4,241 - 4,260 results of 5,630 for search '(( targeting and coding ) OR ( making and coding ))', query time: 0.17s Refine Results
  1. 4241

    Sistem Deteksi Nomor Polisi Mobil dengan Menggunakan Metode Haar Classifier dan OCR guna Mempermudah Administrasi Pembayaran Parkir by Agus Bahtiar

    Published 2017-08-01
    “…Sistem parkir yang masih menggunakan karcis manual kerap dijadikan target untuk melakukan tindakan krimanal dengan adanya duplikasi karcis. …”
    Get full text
    Article
  2. 4242

    Visuospatial sequence learning without seeing. by Clive R Rosenthal, Christopher Kennard, David Soto

    Published 2010-07-01
    “…We demonstrate that conscious access to the sequence of target locations and responses that coincide with structure of the target sequence are dispensable features when learning higher-order visuospatial associations. …”
    Get full text
    Article
  3. 4243

    Simulation study on global migration of locally generated impurity in JT-60U by Ryuichi Sano, Tomohide Nakano, Shohei Yamoto

    Published 2025-03-01
    “…The transport of carbon and neon particles locally emitted from plasma facing components under the JT-60U L-mode plasma condition is investigated by the integrated divertor code SONIC. In this analysis, an impurity point source emitting a small amount of impurity particles functioning as tracers at the divertor target is added into previously calculated background plasma with changing point source location. …”
    Get full text
    Article
  4. 4244

    Efficient "communication through coherence" requires oscillations structured to minimize interference between signals. by Thomas E Akam, Dimitri M Kullmann

    Published 2012-01-01
    “…Here we use a simple mathematical model to investigate how accurately coherent gain modulation can filter a population-coded target signal from task-irrelevant distracting inputs. …”
    Get full text
    Article
  5. 4245

    Calculation of the electron stopping power of some components of human body tissues by Itab F. Hussein, Rana O. Abdaljalil, Sahar A. Mohammed, Ahmed F. Mkhaiber

    Published 2023-10-01
    “…The stopping power of the target material is an essential variable for evaluating the effects of radiation. …”
    Get full text
    Article
  6. 4246

    Understanding Home Health Agencies' Perspectives Toward Telehealth Use Among Home Health Stakeholders in the Post–COVID-19 Era: Qualitative Interview Study by Daniel Spertus, Kiran Abraham-Aggarwal, Mark Aaron Unruh, Jiani Yu, Kathryn H Bowles, Michael P Thompson, Cisco Espinosa, Hye-Young Jung, Madeline R Sterling

    Published 2025-08-01
    “…ResultsStakeholders identified 4 key themes: (1) telehealth offers operational efficiencies (eg, increased patient touchpoints and workforce support) and clinical benefits (eg, improved patient monitoring and potential reduction in rehospitalizations); (2) the lack of CMS reimbursement makes telehealth adoption financially unsustainable for many HHAs; (3) specific HHAs, particularly those integrated with health systems or serving high-risk patient populations, may derive sufficient benefits to continue telehealth use despite financial constraints; and (4) current regulatory policies, including new CMS G-codes, increase administrative burden without providing financial incentives and discouraging telehealth adoption. …”
    Get full text
    Article
  7. 4247

    SIMPLE: Simple Intensity Map Producer for Line Emission by Maja Lujan Niemeyer, José Luis Bernal, Eiichiro Komatsu

    Published 2023-01-01
    “…We present the Simple Intensity Map Producer for Line Emission ( Simple ), a public code for quickly simulating mock line-intensity maps, and an analytical framework for modeling intensity maps including observational effects. …”
    Get full text
    Article
  8. 4248

    PUBLIC DANGER AND CURRENT ISSUES OF QUALIFICATION OF VIOLATION OF INVIOLABILITY OF HOUSING by NOVIKOV Valery Anatolyevich

    Published 2025-03-01
    “…Purpose: to determine, based on the analysis of criminal legislation and modern judicial practice, the influence of various circumstances on the degree of public danger of violating the inviolability of housing; to interpret the basic concepts used in Article 139 of the Criminal Code of the Russian Federation; to develop recommendations for qualifying the crime; to make proposals for amending the current legislation. …”
    Get full text
    Article
  9. 4249

    SURROGATE MOTHER “RENTAL AGREEMENT MADE IN THE PRESENCE OF A NOTARY by Sonny Gondo Hudaya, Habib Adjie

    Published 2024-01-01
    “…Likewise with regulations in the realm of civil law, even though Article 1338 of the Civil Code states that "All agreements made legally apply to the law for those who make them," Article 1320 of the Civil Code provides conditions for the validity of an agreement, one of which is the existence of a halal cause. …”
    Get full text
    Article
  10. 4250

    The advantages of lexicon-based sentiment analysis in an age of machine learning. by A Maurits van der Veen, Erik Bleich

    Published 2025-01-01
    “…Assessing whether texts are positive or negative-sentiment analysis-has wide-ranging applications across many disciplines. Automated approaches make it possible to code near unlimited quantities of texts rapidly, replicably, and with high accuracy. …”
    Get full text
    Article
  11. 4251

    LI-FI TECHNOLOGY AND THE NEW CONCEPT OF DATA TRANSFER SECURITY by Ramona DUMITRAȘCU

    Published 2017-05-01
    “…It works basically like an incredibly advanced form of Morse code - flicking an LED on and off at extreme speeds and can be used to write and transmit things in binary code. …”
    Get full text
    Article
  12. 4252

    Confidential communication scheme based on uncertainty of underwater noisy channels by Ming XU, Fang CHEN

    Published 2019-04-01
    “…Aiming at the influence of the uncertainty of underwater noise on information transmission and the security problem of the communication over noisy channels,a confidential communication scheme based on the uncertainty of underwater noisy channels was proposed.The proposed scheme was composed of an interactive key extraction protocol based on Godel’s code and a privacy amplification protocol based on r-circulant Toeplitz matrix.During the process of key extraction,the key sequence comparing number was reduced through the Godel’s code.When calculating the key length after privacy amplification,the uncertainty of underwater noise was considered to make the proposed scheme more practical.Experimental results show that under the condition of satisfying protocol security,it takes 11.99 s to transmit 119 940 bit string where the lower bound of the generated secret key length is 117 331 bit after privacy amplification and the upper bound of the adversary’s information about the secret key is 2 609 bit.Moreover,the proposed scheme (nt+s)×(nt+s)-order r-circulant Toeplitz matrix decreases(nt+s)-1 bit memory space compared to the traditional Toeplitz matrix with the same order.…”
    Get full text
    Article
  13. 4253

    A hot-repair method for the running software with zero suspends by Guoyuan Lin, Jiazhen Cai, Yonggang Li, Haonan Li, Jiahui Zhou, Wei Chen, Zhong Chen, Shanqing Guo

    Published 2025-08-01
    “…Then, it selects the safe zone and repairs the defects when the code in the safe zone is called, which can prevent the target process from hanging for a long time. …”
    Get full text
    Article
  14. 4254

    Theoretical Study of Energy Loss of Proton in Human Tissues by Musaab I. Mohammed

    Published 2024-10-01
    “…The total stopping power is directly proportional to the atomic number divided by the target material's atomic mass (Z/A) and target material density (ρ), and inversely proportional to the target material's mean excitation energy (I) and proton energy (E). …”
    Get full text
    Article
  15. 4255

    Graph-Based Prediction of Spatio-Temporal Vaccine Hesitancy From Insurance Claims Data by Sifat Afroj Moon, Rituparna Datta, Tanvir Ferdousi, Hannah Baek, Abhijin Adiga, Achla Marathe, Anil Vullikanti

    Published 2025-01-01
    “…Therefore, there has been a significant interest in understanding how hesitancy is spreading at higher spatio-temporal resolutions, enabling more targeted interventions. Motivated by this, we study the problem of prediction of vaccine hesitancy at the ZIP Code level, referred to as the VaxHesitancy problem. …”
    Get full text
    Article
  16. 4256

    Klinische Sportmedizin by Kornbeck J

    Published 2015-05-01
    “…The paper discusses the implications of this realisation to make the case that increased transparency could strengthen the fight against doping. …”
    Get full text
    Article
  17. 4257

    Research on Primary Knock-on Atom and DPA Calculation in SiC Fuel Clad of Micro Gas-cooled Reactor by WANG Ziqi, GUAN Jingyu, DONG Duo, ZHANG Chenglong, ZHU Siyang, HE Kai, LIU Guoming

    Published 2025-01-01
    “…In addition, inelastic scattering also makes a small contribution. The additional recoils due to the subsequent decay of radionuclides produced by transmutation reactions were further considered using a self-developed neutron activation analysis code named NIAC. …”
    Article
  18. 4258

    El texto, la escena apuntes de Semiótica del texto oral by Lidia Beduschi

    Published 1990-01-01
    “…It brings forth many verbal and non-verbal code, whose connections one must read in order to entirely comprehend; it not they seem "inferior" to written text. …”
    Get full text
    Article
  19. 4259

    Simulation of ions interaction with biological environment using Geant4 by S. O. Liulchenko, M. О. Zhovner, O. M. Kalinkevich

    Published 2017-08-01
    “…Computer model that makes it possible to study the interaction of ion beam with biological objects has been created. …”
    Get full text
    Article
  20. 4260

    Research on Visual Servo Grasping of Household Objects for Nonholonomic Mobile Manipulator by Huangsheng Xie, Guodong Li, Yuexin Wang, Zhihe Fu, Fengyu Zhou

    Published 2014-01-01
    “…Experimental results show that QR Code-based artificial object mark can overcome the difficulties brought by household objects’ variety and operation complexity, and the proposed visual servo scheme makes it possible for service robot to grasp and deliver objects efficiently.…”
    Get full text
    Article