Showing 4,761 - 4,780 results of 5,630 for search '(( targeting and coding ) OR ( making and coding ))', query time: 0.18s Refine Results
  1. 4761

    Transfer learning of neural operators for partial differential equations based on sparse network λ-FNO. by Jinghong Xu, Yuqian Zhou, Qian Liu, Kebing Li, Haolin Yang

    Published 2025-01-01
    “…Our model and data generation code can get through https://github.com/Xumouren12/TL-FNO.…”
    Get full text
    Article
  2. 4762

    How to relieve teething syndrome in babies by D. V. Kovalev, I. V. Kovaleva

    Published 2021-07-01
    “…The pediatrician must make sure that the child does not have ARVI, acute intestinal infection and a number of other pathological conditions, up to such serious ones as pneumonia, pyelonephritis and acute meningitis. …”
    Get full text
    Article
  3. 4763

    Power of the Legend: the Tale of Sloven and Rus in Russian Chronicles of the 17th Century by Andrey P. Bogdanov

    Published 2022-03-01
    “…The fact that the attempt remake the tale in a scholarly way and to integrate it into the chronographic text was unique and unsuccessful makes us think that ancient scribes and readers of their works, like M.V. …”
    Get full text
    Article
  4. 4764

    Iris Recognition System Based on Wavelet Transform by Maha Hasso, Bayez Al-Sulaifanie, Kaydar Quboa

    Published 2009-07-01
    “…Most iris recognition systems make use of a band pass decomposition of the iris image to create a biometric template. …”
    Get full text
    Article
  5. 4765

    Integrity of Best-Answer Assignments in Large Enrollment Classes; the role of Compulsory Attribution by Kurt Schmitz, Veda Storey

    Published 2024-12-01
    “…The method secures compulsory attribution of digital solutions using meta-data, access controls, and extensible code available in many common applications, including Microsoft Office. …”
    Get full text
    Article
  6. 4766

    Integrity of Best-Answer Assignments in Large Enrollment Classes; the role of Compulsory Attribution by Kurt Schmitz, Veda Storey

    Published 2024-12-01
    “…The method secures compulsory attribution of digital solutions using meta-data, access controls, and extensible code available in many common applications, including Microsoft Office. …”
    Get full text
    Article
  7. 4767

    Shape optimization using a level set based mesh evolution method: an overview and tutorial by Dapogny, Charles, Feppon, Florian

    Published 2023-10-01
    “…In the second part of this article, we propose a simple albeit efficient python-based implementation of this framework. The code is described with a fair amount of details, and it is expected that the reader can easily elaborate upon the presented examples to tackle his own problems.…”
    Get full text
    Article
  8. 4768

    Evaluasi Kerentanan Insecure Direct Object Reference pada Aplikasi Pendaftaran Sidang Universitas XYZ by Stefanus Eko Prasetyo, Haeruddin, Tiara

    Published 2024-12-01
    “…The testing results indicate that all documents can be accessed without proper authorization, with a status code of 200 indicating successful access. These findings underscore the necessity for stricter security improvement measures in the thesis registration application to protect students' personal data. …”
    Get full text
    Article
  9. 4769

    POÉTICAS/POLÍTICAS DE LA MATERIALIDAD EN LA POESÍA DIGITAL LATINOAMERICANA by Claudia Kozak

    Published 2019-07-01
    “…This paper aims to read Latin American digital poetry in regards to the poetic-political event that emerges whenever its materiality is considered. To make materiality visible enables one to restrict the naturalization of meanings associate with contemporary hegemonic digital culture. …”
    Get full text
    Article
  10. 4770

    Geosites as Educational Key-Elements for Sustainability: The UNESCO Global Geoparks Model by Jesús Enrique Martínez-Martín

    Published 2022-11-01
    “…Their particularity and, above all, its variability, make them unique places that range from outcrops to mining complexes or spectacular viewpoints, where we can learn about the message that the landscape conveys. …”
    Get full text
    Article
  11. 4771

    Social Media and the Journalist–Source Relationship: How Digital Death Knocks Might Exacerbate Moral Injury by Alysson Lee Watson

    Published 2025-04-01
    “…Journalists are at risk of moral injury, which occurs when they breach their own moral code, including through institutional betrayal. This article argues the digital death knock increases the risk of moral injury because unfettered access to, and sanctioned use of, social media material creates new ethical complexities. …”
    Get full text
    Article
  12. 4772

    A tool for automatic parallelization of affine programs for systems with shared and distributed memory by Sh. G. Magomedov, A. S. Lebedev

    Published 2019-10-01
    “…The task of automatic parallelization of program code was formulated from the moment of the appearance of the first parallel computers made in Russia (for example, PS2000). …”
    Get full text
    Article
  13. 4773

    Verbal prefixation and realizations of antipassive alternations in Polish by Katarzyna Mroczyńska

    Published 2017-12-01
    “…Following this line of thought, this article presents the results of corpus-based studies on antipassive structure in the Polish language and makes an attempt at confirming the fact that aspectual notion may determine argument realization. …”
    Get full text
    Article
  14. 4774

    The current impact of incidental findings found during neuroimaging on neurologists' workloads. by Thomas C Booth, Jennifer M Boyd-Ellison

    Published 2015-01-01
    “…Data was collected through semi-structured interviews of purposively sampled neurologists, coded, and concurrent comparative analysis performed. …”
    Get full text
    Article
  15. 4775

    Effects of Mindfulness-Based Practices on Children’s Self-Regulation: A Review on Early Childhood Research by Aylin SOP, Buse HANÇER

    Published 2024-01-01
    “…Considering the data obtained from the results, it benefts teachers and educators to make mindfulness-based programs common for children’s emoton, atenton, and behavior regulaton from an early age. …”
    Get full text
    Article
  16. 4776

    UCM-NetV2: An efficient and accurate deep learning model for skin lesion segmentation by Chunyu Yuan, Dongfang Zhao, Sos S. Agaian

    Published 2025-11-01
    “…To foster further innovation in mobile health diagnostics, the source code for UCM-NetV2 is on https://github.com/chunyuyuan/UCMV2-Net.…”
    Get full text
    Article
  17. 4777

    Exploring the Cybercrime Prevention Campaign on Twitter: Evidence from the Indonesian Government by Al Fauzi RAHMAT, Catalin VRABIE, Galih Bagas SOESILO

    Published 2023-06-01
    “… Cybercrime in Indonesia has recently become a significant problem in line with the increase in internet users, which is a serious issue among online community networks. Therefore, this makes government authorities strive to take preventive measures to prevent the spread of cybercrime. …”
    Get full text
    Article
  18. 4778

    "Euthanasia" in ancient Rome - historical and legal aspects by Piotr Sadowski

    Published 2025-04-01
    “…Conclusions Nevertheless, such types of behaviour described, for example, by Valerius Maximus in relation to those tired of life from Marseilles, make us think that such today's understanding of euthanasia sporadically occurred in the era under study. …”
    Get full text
    Article
  19. 4779

    The introduction of the guarantee judge in Brazil and the electronic police inquiry by Rodrigo Régnier Chemim Guimarães, Sarah Ribeiro

    Published 2020-03-01
    “…In a preliminary decision, minister Fux accepted the intention to suspend the rules included in the Code of Criminal Procedure, for an indefinite period. …”
    Get full text
    Article
  20. 4780

    The use of mint and thyme extracts as eco–friendly natural dyes and the antimicrobial properties of dyed products

    Published 2025-01-01
    “…The color analysis of the dyed textile samples was evaluated in terms of rubbing, washing, and light fastness values. The color codes were determined with the Pantone Color Guide, and the L∗, a∗, b∗, C∗, ho, and K/S values were detected with a color measurement spectrophotometer. …”
    Get full text
    Article