Suggested Topics within your search.
Suggested Topics within your search.
- Moral and ethical aspects 3
- Economic policy 2
- Professional ethics 2
- Agriculture 1
- Algebra 1
- Applied linguistics 1
- Artificial Intelligence 1
- Artificial intelligence 1
- Automobiles 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Civil law 1
- Civil service 1
- Coding and Information Theory 1
- Coding theory 1
- Conditional sales 1
- Corporations 1
- Data Mining and Knowledge Discovery 1
- Data mining 1
- Economic Policy 1
- Economic conditions 1
- Emotions 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Environmental Economics 1
- Environmental economics 1
- Exercise 1
-
601
Code-Switching in Speech of Tundra Yukaghir: Bi- and Multilingual Repetition
Published 2023-06-01Subjects: Get full text
Article -
602
Automatic code optimization for computing the McCaskill partition functions
Published 2022-09-01Get full text
Article -
603
The number of divorces adjudicated on Polish soil under Napoleonic Code
Published 2020-08-01Get full text
Article -
604
Neural coding: Foundational concepts, statistical formulations, and recent advances
Published 2025-05-01Subjects: “…Neural coding…”
Get full text
Article -
605
Code-Switching and Community: Navigating Identity Through in-Group Language
Published 2025-03-01“…Abstract: Code-switching, the practice of alternating between languages or linguistic varieties within a conversation, plays a pivotal role in shaping individual and collective identities within linguistic communities. …”
Get full text
Article -
606
Generalized Toric Codes on Twisted Tori for Quantum Error Correction
Published 2025-06-01“…The Kitaev toric code is widely considered one of the leading candidates for error correction in fault-tolerant quantum computation. …”
Get full text
Article -
607
Code vulnerability detection method based on graph neural network
Published 2021-06-01“…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
Get full text
Article -
608
POSITIONING AND NAVIGATION TECHNIQUES FOR AUTONOMOUS VEHICLES USING QR CODE
Published 2025-06-01Subjects: Get full text
Article -
609
Joint quadrature modulation and network coding for cooperative Hybrid-ARQ
Published 2013-10-01Subjects: Get full text
Article -
610
Application of PN Code in Time Delay Measurement of Telephone Network
Published 2025-01-01Subjects: Get full text
Article -
611
Research of fast decoding for longer constraint length convolutional codes
Published 2010-01-01Subjects: “…convolutional codes;decoding algorithm;particle swarm optimization;decoding performance…”
Get full text
Article -
612
New information triggers prospective codes to adapt for flexible navigation
Published 2025-05-01“…When mice did not adapt, prefrontal choice codes failed to switch. Prospective codes were dependent on the amount of behavioral adaptation needed; the new goal arm was represented more strongly when animals needed to change their behavior more. …”
Get full text
Article -
613
Culture Codes in Children’s Literature: Voices from Scotland and Armenia
Published 2023-03-01Subjects: Get full text
Article -
614
DEVELOPMENT OF TABULAR METHOD FOR CALCULATION OF PRIMITIVE FUNCTION IN MODULAR CODE
Published 2022-05-01Subjects: Get full text
Article -
615
Using pseudo-AI submissions for detecting AI-generated code
Published 2025-05-01Subjects: “…programming code plagiarism detection…”
Get full text
Article -
616
Research on malicious code variants detection based on texture fingerprint
Published 2014-08-01“…The texture fingerprint of a malware is the set of texture fingerprints for each uncompressed gray-scale image block. The ma-licious code is mapped to uncompressed gray-scale image by integrating image analysis techniques and variants of mali-cious code detection technology. …”
Get full text
Article -
617
Some Coding Theorems for Nonadditive Generalized Mean-Value Entropies
Published 2012-01-01“…The main instrument is the 𝑙(𝑛𝑖) function of the word lengths in obtaining the average length of the code.…”
Get full text
Article -
618
Non-coding RNA-mediated regulation of seed endosperm development
Published 2025-08-01Subjects: Get full text
Article -
619
Sistem Informasi Pemesanan Menu Kafe Menggunakan QR-Code
Published 2023-06-01Subjects: Get full text
Article -
620
Interoception, insula, and agency: a predictive coding account of aphantasia
Published 2025-05-01Subjects: Get full text
Article