Showing 841 - 860 results of 26,141 for search '"code"', query time: 0.11s Refine Results
  1. 841

    Monte Carlo simulation code for polarized inverse Compton scattering sources by Hongze Zhang, Zhijun Chi, Yingchao Du, Wenhui Huang, Chuanxiang Tang

    Published 2024-10-01
    “…This code considers the polarization as well as the bandwidth of incident laser beams. …”
    Get full text
    Article
  2. 842
  3. 843

    Evaluation of ATLHAMC12 subchannel code for total loss of flow scenario by Tomáš Křeček, Štěpán Foral

    Published 2023-12-01
    “… The ALTHAMC12 subchannel code is a new subchannel code developed by the ALVEL company. …”
    Get full text
    Article
  4. 844

    Opening the AI Black Box: Distilling Machine-Learned Algorithms into Code by Eric J. Michaud, Isaac Liao, Vedang Lad, Ziming Liu, Anish Mudide, Chloe Loughridge, Zifan Carl Guo, Tara Rezaei Kheirkhah, Mateja Vukelić, Max Tegmark

    Published 2024-12-01
    “…Can we turn AI black boxes into code? Although this mission sounds extremely challenging, we show that it is not entirely impossible by presenting a proof-of-concept method, MIPS, that can synthesize programs based on the automated mechanistic interpretability of neural networks trained to perform the desired task, auto-distilling the learned algorithm into Python code. …”
    Get full text
    Article
  5. 845
  6. 846

    Low error floor LT coding algorithm for unequal error protection by Xin SONG, Shuyan NI, Zhe ZHANG, Yurong LIAO, Tuofeng LEI

    Published 2022-06-01
    Subjects: “…channel coding;rateless code;unequal error protection;convergence;bit error rate…”
    Get full text
    Article
  7. 847
  8. 848

    Characterization of human pseudogene-derived non-coding RNAs for functional potential. by Xingyi Guo, Mingyan Lin, Shira Rockowitz, Herbert M Lachman, Deyou Zheng

    Published 2014-01-01
    “…Applying the pipeline to datasets from 16 distinct normal human tissues identified ∼ 3,000 pseudogenes that could produce non-coding RNAs in a manner of low abundance but high tissue specificity under normal physiological conditions. …”
    Get full text
    Article
  9. 849

    The Requirement of Promulgation of Non-Legislative Acts in the 1983 Code of Canon Law by Ginter Dzierżon

    Published 2024-06-01
    “…In this study, the author reflects on the ratio legis of the necessity of promulgating certain non-legislative acts in the 1983 Code of Canon Law, such as general executory decrees (Can. 31 § 2) and authentic interpretation put forth in the form of law (Can. 16 § 2). …”
    Get full text
    Article
  10. 850
  11. 851
  12. 852
  13. 853

    Weight processing of signals based on the Barker codes with few different weights by V. A. Syanov

    Published 2015-12-01
    “…The method of the inverse filter to suppress side lobe signals based on the Barker codes with few different weights. The regular methodology of finding the weight coefficients is presented. …”
    Get full text
    Article
  14. 854
  15. 855

    Motorcycle Parking Security System based on Website and QR Code Technology by Riva Andra Yuni, Werman Kasoep, Desta Yolanda

    Published 2023-09-01
    “…The system uses a website accessible via smartphones using QR code. Users scan the provided QR code to access the website, where they will be prompted to enter a password that functions as a controller for the locking and unlocking process of the motorcycle's front wheel using a servo motor. …”
    Get full text
    Article
  16. 856
  17. 857

    An Improved Retransmission Approacb Based on Opportunistic Network Coding in Multicast Networks by Pengfei Shao, Yanwei Zhao, Yaohui Wu, Xinwei Yao

    Published 2015-04-01
    Subjects: “…wireless multicast;network coding;opportunistic network coding;retransmission…”
    Get full text
    Article
  18. 858
  19. 859

    Improving Performance Of Hmm-based Asr For Gsm-efr Speech Coding by Lallouani Bouchakour, Mohamed Debyeche

    Published 2014-06-01
    Subjects: “…speech coding, GSM, EFR, CHMM, ASR, ARADIGT, MFCC, bit-strea…”
    Get full text
    Article
  20. 860

    Knowledge Workers, Identities, and Communication Practices: Understanding Code Farmers in China by Sophie Sun Ping, Michelangelo Magasic

    Published 2016-05-01
    “…Through the discursive analysis of programmers’ personal memoirs (collected via personal interviews and online ethnography), four themes of identity dynamics emerge: IT programmers demonstrate identification with professionalism and technology; they naturalize the high mobility and internal precarity of their work via discourses of the self and social improvement; the term manong (“code monkey” or “code farmer” in English) is used to support a sense of selfhood amidst high pressure schedules and “panoptic control”; the disparaging term diaosi (“loser” in English) is appropriated in order to activate a sense of self-expression and collective resistance regarding the programmers’ working and living conditions. …”
    Get full text
    Article