Suggested Topics within your search.
Suggested Topics within your search.
- Moral and ethical aspects 3
- Economic policy 2
- Professional ethics 2
- Agriculture 1
- Algebra 1
- Applied linguistics 1
- Artificial Intelligence 1
- Artificial intelligence 1
- Automobiles 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Civil law 1
- Civil service 1
- Coding and Information Theory 1
- Coding theory 1
- Conditional sales 1
- Corporations 1
- Data Mining and Knowledge Discovery 1
- Data mining 1
- Economic Policy 1
- Economic conditions 1
- Emotions 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Environmental Economics 1
- Environmental economics 1
- Exercise 1
-
1761
Can ChatGPT Support Clinical Coding Using the ICD-10-CM/PCS?
Published 2024-11-01Subjects: Get full text
Article -
1762
Can a referral diagnosis code for duplex ultrasound "predict" carotid artery stenosis?
Published 2023-05-01Subjects: Get full text
Article -
1763
Cultural Codes of Marriage Rituals in Anatolia: From Ritual to Word in the Context of Oral Culture
Published 2025-06-01Get full text
Article -
1764
Transcriptional landscape of small non-coding RNAs reveals diversity of categories and functions in molluscs
Published 2024-12-01“…Small non-coding RNAs (sncRNAs) are non-coding RNA molecules that play various roles in metazoans. …”
Get full text
Article -
1765
Joint use of frequency-time division and antinoise coding in radio communication systems with FHSS
Published 2021-08-01Subjects: Get full text
Article -
1766
Using Open Source to Accelerate Development of a Finite Element-Boundary Integral Code
Published 2024-01-01“…With large amounts of open-source code available, both from within computational electromagnetics and from other fields, new combinations can be made by using already existing code packages. …”
Get full text
Article -
1767
The problem of multiple interpretations of the terms “Information” and “Data” in the Polish Criminal Code and its consequences
Published 2024-12-01“… This paper examines the legal definitions of “information” and “data” within the Polish Criminal Code (CC), highlighting their implications for criminal liability, particularly in the realm of cybercrime. …”
Get full text
Article -
1768
Smell-ML: A Machine Learning Framework for Detecting Rarely Studied Code Smells
Published 2025-01-01Subjects: “…Code smell detection…”
Get full text
Article -
1769
Reconstructing unreadable QR codes: a deep learning based super resolution strategy
Published 2025-04-01Subjects: “…QR code reading…”
Get full text
Article -
1770
Theta oscillations optimize a speed-precision trade-off in phase coding neurons.
Published 2024-12-01“…Here, we address this question by introducing a theoretical framework that combines the efficient coding and neural oscillatory sampling hypotheses, focusing on the information rate (bits/s) of phase coding neurons. …”
Get full text
Article -
1771
Construction of Binary Locally Repairable Codes with Nonuniform Locality and Availability Using Combinatorial Designs
Published 2025-03-01Subjects: “…coding theory…”
Get full text
Article -
1772
Compare the pair: Rotated versus unrotated surface codes at equal logical error rates
Published 2025-07-01“…Practical quantum computers will require resource-efficient error-correcting codes. The rotated surface code uses approximately half the number of qubits as the unrotated surface code to create a logical qubit with the same error-correcting distance. …”
Get full text
Article -
1773
POLITENESS STRATEGIES APPLIED IN THE DIRECTIVE SPEECH ACT IN THE DA VINCI CODE AND ITS TRANSLATION
Published 2016-01-01“…This research aims at identifying what and how politeness strategies are applied in the directive speech act in The Da Vinci Code and how they are transfered into their translation. …”
Get full text
Article -
1774
Marina Bers, Beyond Coding: How Children Learn Broader Values through Programming
Published 2023-05-01Get full text
Article -
1775
A New Construction of Multisender Authentication Codes from Polynomials over Finite Fields
Published 2013-01-01“…In this paper, we construct one multisender authentication code from polynomials over finite fields. Some parameters and the probabilities of deceptions of this code are also computed.…”
Get full text
Article -
1776
A method of vehicle networking environment information sharing based on distributed fountain code
Published 2024-01-01“…Firstly, we propose a distributed fountain coding scheme to improve transmission efficiency and reduce vehicles’ delay in acquiring peripheral information. …”
Get full text
Article -
1777
Asynchronous Two-Way Relaying Networks Using Distributed Differential Space-Time Coding
Published 2015-01-01“…A signal detection scheme is proposed for two-way relaying network (TWRN) using distributed differential space-time coding (DDSTC) under imperfect synchronization. Unlike most of existing work, which assumed perfect synchronization and channel state information (CSI) at all nodes, a more realistic scenario is investigated here by considering the signals transmitted from the two source nodes arriving at the relay not exactly at the same time due to the distributed nature of the nodes, and no CSI is available at any node. …”
Get full text
Article -
1778
Quasi-Optimal Path Convergence-Aided Automorphism Ensemble Decoding of Reed–Muller Codes
Published 2025-04-01Subjects: “…Reed–Muller codes…”
Get full text
Article -
1779
Content-based image retrieval using block truncation coding based on edge quantization
Published 2020-10-01“…In this paper, we propose an effective image retrieval approach using block truncation coding compressed data stream based on edge-based quantization (EQBTC). …”
Get full text
Article -
1780
Criminal Law Characteristics of Criminal Offences Under Article 190 of the Criminal Code of Ukraine
Published 2025-07-01“…This article is devoted to the consideration of the main aspects of the criminal law characteristics of fraud as a criminal offence under Article 190 of the Criminal Code of Ukraine. The review includes an analysis of such components as the object, subject, objective and subjective aspects of fraud. …”
Get full text
Article