Suggested Topics within your search.
Suggested Topics within your search.
- Moral and ethical aspects 3
- Economic policy 2
- Professional ethics 2
- Agriculture 1
- Algebra 1
- Applied linguistics 1
- Artificial Intelligence 1
- Artificial intelligence 1
- Automobiles 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Civil law 1
- Civil service 1
- Coding and Information Theory 1
- Coding theory 1
- Conditional sales 1
- Corporations 1
- Data Mining and Knowledge Discovery 1
- Data mining 1
- Economic Policy 1
- Economic conditions 1
- Emotions 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Environmental Economics 1
- Environmental economics 1
- Exercise 1
-
1661
Enhancing smart contract security using a code representation and GAN based methodology
Published 2025-05-01“…This research introduces a new method that combines code embedding with Generative Adversarial Networks (GANs) to find integer overflow vulnerabilities in smart contracts. …”
Get full text
Article -
1662
WCN24-1446 The Role of Long Non-Coding RNAs in the Progression of Renal Fibrosis
Published 2024-04-01Get full text
Article -
1663
Exploring the regulatory role of long non-coding RNAs in pigmentation in juvenile Plectropomus leopardus
Published 2025-07-01Subjects: “…Long non-coding RNA…”
Get full text
Article -
1664
Research on Spread Spectrum Codes Optimized by Sparrow Search Algorithm and Extreme Gradient Boosting
Published 2024-12-01“…The problem of spread code identification is transferred into a peak detection classification problem. …”
Get full text
Article -
1665
SynergyScore: Leveraging Pretrained Language Models for Effective Evaluation of Code-Switched Sentences
Published 2025-01-01Subjects: Get full text
Article -
1666
Analysis of Spatial Discretization Error Estimators Implemented in ARES Transport Code for SN Equations
Published 2018-01-01“…Three error estimators, a two-mesh estimator, a residual-based estimator, and a dual-weighted residual estimator, are derived and implemented in the ARES transport code to evaluate the error of zeroth-order spatial discretization for SN equations. …”
Get full text
Article -
1667
A Novel Behavioral Strategy for RoboCode Platform Based on Deep Q-Learning
Published 2021-01-01“…This paper addresses a new machine learning-based behavioral strategy using the deep Q-learning algorithm for the RoboCode simulation platform. According to this strategy, a new model is proposed for the RoboCode platform, providing an environment for simulated robots that can be programmed to battle against other robots. …”
Get full text
Article -
1668
COUPLED SIMULATION OF GAS COOLED FAST REACTOR FUEL ASSEMBLY WITH NESTLE CODE SYSTEM
Published 2018-05-01“…The NESTLE code is a coupled multigroup neutron diffusion code with thermal-hydraulic sub-channel code. …”
Get full text
Article -
1669
Affective polarization in a word: Open-ended and self-coded evaluations of partisan affect.
Published 2025-01-01“…We find that our self-coded open-ended measure has strong face validity and correlates strongly with existing affect measures. …”
Get full text
Article -
1670
Characteristics of Slovak amaranth varieties based on coding regions polymorphism and endophytic bacteria prevalence
Published 2024-12-01Subjects: Get full text
Article -
1671
Can large language models be used to code text for thematic analysis? An explorative study
Published 2025-07-01Subjects: Get full text
Article -
1672
Seismic Performance Evaluation of RC Frame Designed Using Ethiopian and Chinese Seismic Codes
Published 2020-01-01“…This study presents the seismic performance evaluation of the reinforced concrete (RC) frame designed as per Ethiopian (based on EN1998-1) and Chinese seismic codes to realize best practices within them. In the study, three-model RC frames with 4-, 8-, and 12-story are designed with the respective codes. …”
Get full text
Article -
1673
Intersemiotic Translation and Film Adaptation: The Case Of The Da Vinci Code Novel By Dan Brown
Published 2023-12-01Subjects: Get full text
Article -
1674
Analysis of Methods and Tools for Detecting Sensitive Information in Source Code: Issues of Accuracy and Completeness
Published 2025-04-01Subjects: Get full text
Article -
1675
Image Compression Using Tap 9/7 Wavelet Transform and Quadtree Coding Scheme
Published 2011-06-01“…While the approximation coefficients are coded using delta coding followed by LZW encoding. …”
Get full text
Article -
1676
Enhancing Malware Analysis Using Data Visualization Through Shared Code and Attribute Analysis
Published 2025-01-01“…The SCA component searches for similarities in code within multiple malware samples using the MinHash techniques. …”
Get full text
Article -
1677
Flexible terahertz beam manipulation and convolution operations in light-controllable digital coding metasurfaces
Published 2025-02-01“…Summary: The development of coding metasurface opens an important development direction for beam modulator components. …”
Get full text
Article -
1678
High-Throughput Variable-to-Fixed Entropy Codec Using Selective, Stochastic Code Forests
Published 2020-01-01Subjects: “…high-throughput entropy coding…”
Get full text
Article -
1679
A negative feedback loop in the GPCR pathway underlies efficient coding of external stimuli
Published 2022-09-01“…As GPCRs are ubiquitously expressed in all sensory neurons, this mechanism may be a general solution for efficient cell‐autonomous coding of external stimuli.…”
Get full text
Article -
1680
ANALYSIS AND MINIMIZATION OF THE RISKS OF HARMFUL DEPENDENCIES IN THE PROCESS OF CONTINUOUS INTEGRATION AND IMPLEMENTATION OF SOFTWARE CODE
Published 2024-10-01“…The analysis of the risks of malicious dependencies in the process of continuous integration and implementation of the program code is carried out. Methods have been identified to minimize the risks of dependency abuse, the need to implement multi-level security measures, including automated monitoring and analysis tools, strict access control to repositories and the use of cryptographic methods to verify the integrity of packages. …”
Get full text
Article