Showing 4,961 - 4,980 results of 5,630 for search '(( targeting and coding ) OR ( making and coding ))', query time: 0.21s Refine Results
  1. 4961

    Natural barriers facing female cyclists and how to overcome them: A cross national examination of bikesharing schemes by Richard Bean, Dorina Pojani, Jonathan Corcoran

    Published 2024-12-01
    “…In the spirit of open science, all data and code on which this paper is based have been provided on Mendeley: https://data.mendeley.com/datasets/vmy42hywwx/1.…”
    Get full text
    Article
  2. 4962

    Analysis of Light in Office Space Based on Topic 4 of National Building Regulations in Different Climates (Case Study: Iran) by P. Ildarabadi, A. Ghalehnovi

    Published 2025-04-01
    “…In compliance with the National Building Code of Iran, it is mandated that office spaces possess access to natural light and ventilation through one or more windows, constituting at least 12.5% of the total glass area in relation to the floor space. …”
    Get full text
    Article
  3. 4963

    What Does It Mean to Be Leader of a “One Nation Conservative Government”? The Case of Boris Johnson by Raphaele Espiet Kilty

    Published 2020-09-01
    “…The third part will consider the more loaded charge that One Nation “in a way has just become a code term for trying to make the party electable and to keep the party electable” to quote Lord Biffen, himself a leading One Nation Conservative. …”
    Get full text
    Article
  4. 4964

    Sustainable ecosystem of business models: experience and lessons of the development project by M. A. Nekrasova, V. S. Palagin

    Published 2024-10-01
    “…The main objective of the study is to review current and propose effective approaches to project business planning in the National Park—Development Region system.To develop an effective, sustainable ecosystem of national park business models that make a positive contribution to the regional gross product (RGP) of the region, the current approaches to assessing the contribution of economic and other activities, including project activities, to the socio-economic development of regions and the country as a whole were analyzed. …”
    Get full text
    Article
  5. 4965

    Improving Token-Based Object Detection With Video by Abhineet Singh, Nilanjan Ray

    Published 2025-01-01
    “…We also compare it with several video detectors on UA-DETRAC to show that it is competitive with the current state of the art even with the computational bottleneck. We make our code and models publicly available.…”
    Get full text
    Article
  6. 4966

    Proteome-wide Mendelian randomization reveals causal associations between plasma proteins and autoimmune thyroid disease by Yang Li, Weixi Zhu, Yijing Chen, Qingqing Kang, Ying Zhang, Pan Yang, Shumin Wang, Chao Liu, Yi Zhang, Qiu Zhang

    Published 2025-06-01
    “…Identifying new biomarkers and therapeutic targets in plasma proteins is crucial. We conducted a proteome-wide Mendelian randomization (MR) and colocalization analysis to determine plasma proteins causally associated with AITD. …”
    Get full text
    Article
  7. 4967

    System Reliability Analysis of Slope Stability of Earth Rock Dams Based on Finite Element Strength Reduction Method by Huibao Huang, Junchi Zhu, Zhenyu Wu, Jiankang Chen, Jichen Tian

    Published 2025-04-01
    “…The system reliability index (6.81) significantly exceeds the code target (4.2), highlighting the method’s ability to integrate material randomness, stress-strain nonlinearity, and multi-slip interactions. …”
    Get full text
    Article
  8. 4968

    Epidemiological Model for Stability Analysis of Wireless Sensor Network under Malware Attack by Chakradhar Verma, C. P. Gupta

    Published 2022-03-01
    “…And Wireless Sensor Network (WSN) is also facing a hazardous type of situation due to attack of malware (malicious code, virus, worm etc.). Malwares target sensor nodes easily because, nodes are equipped with limited resources. …”
    Get full text
    Article
  9. 4969

    New Potential Ultracompact X-Ray Binaries for Space-based Gravitational-wave Detectors from a Low-mass Main-sequence Companion Channel by Minghua Chen, Jinzhong Liu

    Published 2025-01-01
    “…We investigate the formation and evolution of ultracompact X-ray binaries (UCXBs) using the COMPAS binary evolution code, starting from the zero-age main sequence (MS). …”
    Get full text
    Article
  10. 4970

    Remote Sensing Change Detection by Pyramid Sequential Processing With Mamba by Jiancong Ma, Bo Li, Hanxi Li, Siying Meng, Ruitao Lu, Shaohui Mei

    Published 2025-01-01
    “…However, various challenges still persist, such as complex backgrounds, small targets, and diverse change types. To address these challenges, we propose a novel Mamba-based multiscale feature enhancement method. …”
    Get full text
    Article
  11. 4971

    Do People Believe They Are Less Predictable Than Others? Three Replications of Pronin and Kugler’s (2010) Experiment 1 by Subramanya Prasad Chandrashekar, Stephanie Permut, Hallgeir Sjåstad, Chelsea (Chi Wing) Lo, Yong Jun Kueh, Emily Sihui Zhong, Kai Hin Wan, Kai Yi Kelly Choy, Man Chung Wong, Stanley Wei Jian Hugh, Khan Tahira, Bo Ley Cheng, Gilad Feldman

    Published 2024-12-01
    “…In Studies 1a and 1b that mirrored the target article’s mixed design (self-other between, past-future within), we found support for the original findings with weaker effects. …”
    Get full text
    Article
  12. 4972

    Machine Learning and Metaheuristic Algorithms for Voice-Based Authentication: A Mobile Banking Case Study by Leili Nosrati, Amir Massoud Bidgoli, Hamid Haj Seyyed Javadi

    Published 2024-11-01
    “…On the other hand, by employing the frequency and phase properties to compare the target's voice to the discovered password key, this method will prevent speech forgeries. …”
    Get full text
    Article
  13. 4973

    Cybersecurity threats and mitigation measures in agriculture 4.0 and 5.0 by Chrysanthos Maraveas, Muttukrishnan Rajarajan, Konstantinos G Arvanitis, Anna Vatsanidou

    Published 2024-12-01
    “…The analysis also revealed that malware attacks occur when hackers change the code of a system application to access sensitive farm-related data and may alter the operations of the digitized systems. …”
    Get full text
    Article
  14. 4974

    Pseudo-class distribution guided multi-view unsupervised domain adaptation for hyperspectral image classification by Jingpeng Gao, Xiangyu Ji, Geng Chen, Yuhang Huang, Fang Ye

    Published 2025-02-01
    “…Existing methods focus on aligning the distribution of source domain (SD) and target domain (TD). However, they all ignore the implicit class distribution information of TD data, which can help the model predict the class with a higher posterior probability. …”
    Get full text
    Article
  15. 4975

    Case Report: Hereditary spastic paraplegia associated with monoallelic variant in the motor domain of KIF1A by Kathryn Sine, David Brodie-Mends, Wafae Chouhani, Lauren Massingham, Lauren Massingham, Saud Alhusaini, Saud Alhusaini

    Published 2025-05-01
    “…ObjectivesTo investigate the genetic etiology of a familial case with spastic paraplegia.MethodsNeurological examination, clinical and genetic work-up, including exome sequencing (ES), followed by targeted testing, were performed to determine the underlying etiology of the patients’ phenotype.ResultsA 45-year-old man was initially diagnosed with spastic diplegic cerebral palsy in early childhood. …”
    Get full text
    Article
  16. 4976

    A Survey on Survivable Safety-Critical Systems by Helber Silva, Marco Vieira, Augusto Neto

    Published 2025-01-01
    “…Due to their crucial functions, these systems are frequent targets of various attacks, including Denial of Service (DoS) attacks, the execution of improper commands, code injection, and data manipulation, which can compromise system safety and put lives and critical infrastructure at risk. …”
    Get full text
    Article
  17. 4977

    Challenges and management of venomous bites and scorpion stings in Lebanon: a qualitative study by Kamil Kadi, Tharwat El-Zahran, Mario Badr, Mohammad Mdaihly, Nesrine Ahmad, Atika Berri, Michelle E. E. Bauer, Samar Al-Hajj

    Published 2025-06-01
    “…The study also highlighted insufficient documentation and reporting mechanisms and inadequate networking among stakeholders, alongside a notable knowledge gap among victims.ConclusionThis study emphasizes the urgent need for targeted interventions to address systemic challenges in managing snakebites and scorpion stings in Lebanon. …”
    Get full text
    Article
  18. 4978

    Research on Video Monitoring Technology for Galloping of OCS Additional Conductors of High-Speed Railway in Strong Wind Zone by Wentao Zhang, Wenhao Wang, Shanpeng Zhao, Huayu Yuan, Youpeng Zhang, Xiaotong Yao, Guangwu Chen

    Published 2024-11-01
    “…Secondly, a preprocessing method for enhancing images of galloping in OCS additional conductors is developed, effectively reducing noise in edge detection through a region chain code clustering analysis. The video monitoring system effectively extracts wire edges, addressing the issues of splitting, breakage, and edge overlap in edge detection, while accurately identifying wire targets in video images. …”
    Get full text
    Article
  19. 4979

    Patterns and inequities in pyogenic arthritis-related mortality in the United States from 1999–2020 by Usama Qamar, Maaz Asif, Farhan Naeem, Eisha Mazhar

    Published 2025-01-01
    “…In conclusion, PA mortality has been on the rise and targeted interventions are warranted to reduce disproportionate mortality rates among vulnerable populations.…”
    Get full text
    Article
  20. 4980

    Distributed High-Speed Videogrammetry for Real-Time 3D Displacement Monitoring of Large Structure on Shaking Table by Haibo Shi, Peng Chen, Xianglei Liu, Zhonghua Hong, Zhen Ye, Yi Gao, Ziqi Liu, Xiaohua Tong

    Published 2024-11-01
    “…This paper presents a distributed high-speed videogrammetric method designed to rapidly measure the 3D displacement of large shaking table structures at high sampling frequencies. The method uses non-coded circular targets affixed to key points on the structure and an automatic correspondence approach to efficiently estimate the extrinsic parameters of multiple cameras with large fields of view. …”
    Get full text
    Article