Showing 4,121 - 4,140 results of 5,630 for search '(( making and coding ) OR ( targeting and coding ))', query time: 0.17s Refine Results
  1. 4121
  2. 4122
  3. 4123

    Software watermarking scheme with cloud computing constraints by Guang SUN, Xiao-ping FAN, Wang-dong JIANG, Hang-jun ZHOU, Sheng-zong LIU, Chun-hong GONG, Jing ZHU

    Published 2016-09-01
    “…A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the source code unavailable.Watermarks map to transform rules were embedded concurrently into these obfuscated codes.The recovery module was a recognizer to prove the watermarks when the original program was recovering.Experimental results,using Java decompliers,indicate that the code become ob-fuscated,is difficult to reverse engineering,thereby mabe the watermarks robust.…”
    Get full text
    Article
  4. 4124

    Missense variants in FRS3 affect body mass index in populations of diverse ancestries by Andrea B. Jonsdottir, Gardar Sveinbjornsson, Rosa B. Thorolfsdottir, Max Tamlander, Vinicius Tragante, Thorhildur Olafsdottir, Solvi Rognvaldsson, Asgeir Sigurdsson, Hannes P. Eggertsson, Hildur M. Aegisdottir, David O. Arnar, Karina Banasik, Doruk Beyter, Ragnar G. Bjarnason, Gyda Bjornsdottir, Søren Brunak, Mie Topholm Bruun, Joseph Dowsett, Eythor Einarsson, Gudmundur Einarsson, Christian Erikstrup, Run Fridriksdottir, Jonas Ghouse, Solveig Gretarsdottir, Gisli H. Halldorsson, Torben Hansen, Anna Helgadottir, Peter C. Holm, Erna V. Ivarsdottir, Kasper Karmark Iversen, Bitten Aagaard Jensen, Ingileif Jonsdottir, Stacey Knight, Kirk U. Knowlton, Snaedis Kristmundsdottir, Adalheidur E. Larusdottir, Olafur Th. Magnusson, Gisli Masson, Pall Melsted, Christina Mikkelsen, Kristjan H. S. Moore, Asmundur Oddsson, Pall I. Olason, Frosti Palsson, Ole Birger Pedersen, Michael Schwinn, Emil L. Sigurdsson, Aron Skaftason, Lilja Stefansdottir, Hreinn Stefansson, Thora Steingrimsdottir, Arni Sturluson, Unnur Styrkarsdottir, Erik Sørensen, Unnur D. Teitsdottir, Thorgeir E. Thorgeirsson, Gudmundur A. Thorisson, Unnur Thorsteinsdottir, Magnus O. Ulfarsson, Henrik Ullum, Arnor Vikingsson, G. Bragi Walters, DBDS Genomic Consortium, Lincoln D. Nadauld, Henning Bundgaard, Sisse Rye Ostrowski, Agnar Helgason, Bjarni V. Halldorsson, Gudmundur L. Norddahl, Samuli Ripatti, Daniel F. Gudbjartsson, Gudmar Thorleifsson, Valgerdur Steinthorsdottir, Hilma Holm, Patrick Sulem, Kari Stefansson

    Published 2025-03-01
    Get full text
    Article
  5. 4125

    First steps on plasma beam prebuncher for free electron lasers through more suitable relativistic reference-frame-based particle-in-cell tools by Driss Oumbarek Espinos, Alexei Zhidkov, Alexandre Rondepierre, Masafumi Tawada, Mika Masuzawa

    Published 2025-06-01
    “…However, the computational and time resources needed for PICs make them impractical when high resolution and long time/distance simulations are required. …”
    Get full text
    Article
  6. 4126

    Neutronics/thermal-hydraulics coupling simulation using JAMPAN in a single BWR assembly by Tomohiro KAMIYA, Taku NAGATAKE, Ayako ONO, Kenichi TADA, Ryoichi KONDO, Yasunobu NAGAYA, Hiroyuki YOSHIDA

    Published 2025-04-01
    “…Hence, a continuous energy Monte Carlo code MVP is adopted as a neutronics analysis code and a detailed and phenomenological numerical analysis code JUPITER is adopted as a thermal-hydraulics analysis code. …”
    Get full text
    Article
  7. 4127

    Involving young people with lived experience in advancing mental health science: an exploratory qualitative study from Pakistan and India by Syed Usman Hamdani, Zill-e- Huma, Bhismadev Chakrabarti, Syeda Wajeeha Zafar, Ayella Gillani, Vaishali Bagrodia, Amy Finlay Jones

    Published 2025-07-01
    “…The qualitative data was analysed using a thematic analysis approach that moved through the phases of familiarization, generation of codes, searching, identification and review of themes and selection of illustrative quotes. …”
    Get full text
    Article
  8. 4128

    Designing and Interpreting a Mathematical Programming Language by Hüseyin Pehlivan

    Published 2019-12-01
    “…The interpreter consists of several basic components such as parser, semantic controller and code evaluator, each of which makes a different kind of code interpretation. …”
    Get full text
    Article
  9. 4129

    Children and youngster's gaze behaviour when cycling in familiar environments by Katja Kircher, Christer Ahlström

    Published 2023-12-01
    “…Additionally, glance targets and glance purpose were coded. More than 80 % of all target areas were monitored. …”
    Get full text
    Article
  10. 4130

    Exemption from Criminal Liability in Connection with Other Measures of Criminal Law by Anatoly V. Kuznetsov, Alexander E. Kukovyakin

    Published 2016-09-01
    “…The article outlines the problems which can arise after passing the draft of the federal law “On Amendments to the Criminal Code of the Russian Federation and the Criminal Procedure Code of the Russian Federation on the improvement of the grounds and procedure of exemption from criminal responsibility”. …”
    Get full text
    Article
  11. 4131

    PENGGUNAAN ALIH KODE DALAM PERCAKAPAN PADA JARINGAN WHATSAPP OLEH MAHASISWA KNB YANG BERKULIAH DI UNIVERSITAS SEBELAS MARET by Khodiyo Thesa, Nababan Nababan, Sri Marmanto

    Published 2017-05-01
    “…The result of analizing research that refers to Spreadly theory or etnography theory showed that intrasentential  was the dominan switching code that appear on KNB students conversation about 43% (2) the factors that caused KNB students switching the code of on their conversation were speaker, addresse speaker, topic, situation, humor, ability, technology, familiarity, and relation whereas (3) the functions of switching codes on the KNB students conversations were to familiar between the speaker and address speaker, to respect the local culture they stayed, to make easy the communication, words of technology, to rich language ability, to remind something to address speaker, to respond the questions, to begin, middle and to end the conversations, to emphasize the speaker meaning, invitation, to change formal situation to informal, perception, to express the speaker feeling, to quote the other person conversation, humor, to address specification, to ask a help, to explain the speaker meaning, and to change a topic. …”
    Get full text
    Article
  12. 4132

    MENAKAR DALUWARSA: Kajian Perbandingan Daluwarsa Pemalsuan Surat Dalam Pembaharuan Hukum Pidana by Tofik Yanuar Chandra, Hajairin Hajairin

    Published 2024-01-01
    “…Comparison of the expiration of mail forgery in the Criminal Code and the New Criminal Code from the aspect of offense formulation and expiration limitation is very different, but there is a similarity in placing the object that can be subject to the crime of mail forgery, namely a person who makes a fake letter and uses a fake letter. …”
    Get full text
    Article
  13. 4133

    Revision of the Protocol of the Telephone Triage System in Tokyo, Japan by Atsushi Sakurai, Jun Oda, Takashi Muguruma, Shiei Kim, Sachiko Ohta, Takeru Abe, Naoto Morimura

    Published 2021-01-01
    “…This study examined the revision of the #7119 protocol by referring the linked data to each code of the triage protocol. Methods. We selected candidates based on the medical codes targeted by the revision, linking data from the nurses’ decisions in triage and the patients’ condition severity when the ambulance arrived at the hospital, gathering data from June 1, 2016, to December 31, 2017. …”
    Get full text
    Article
  14. 4134

    The linkage between opioid treatment programs and recovery community centers: results of a survey of OTP directors by Bettina B. Hoeppner, Alivia C. Williamson, Cora Nicoll, Diadora Finley-Abboud, Allison Futter, Judeline Joseph, Angela Burton, Drew Hickman, Anita Bradley, Felecia Pullen, Andre Johnson, Susanne S. Hoeppner

    Published 2025-08-01
    “…Close collaboration is needed especially in Black communities, as Black Americans face significant disparities in opioid-involved overdoses and deaths.MethodsWe conducted an online survey and interviews of directors of OTPs located near RCCs serving Black communities (operationally defined as located in a ZIP code where ≥25% of residents are Black, as per US Census data). …”
    Get full text
    Article
  15. 4135

    Influence of hydrogen content in tokamak scrape-off-layer on performance of lithium divertor by E.D. Marenkov, A.A. Pshenov

    Published 2024-01-01
    “…The target erosion rate and surface temperatures are within limits of the most target designs. …”
    Get full text
    Article
  16. 4136

    Virtual Channel Purification by Zhenhuan Liu, Xingjian Zhang, Yue-Yang Fei, Zhenyu Cai

    Published 2025-05-01
    “…Quantum error mitigation is a key approach for extracting target state properties on state-of-the-art noisy machines and early fault-tolerant devices. …”
    Get full text
    Article
  17. 4137
  18. 4138

    The Necessity and Feasibility of the Pledge of Intangible Assets in the Contemporary Legal System of Iran by Muhammad Hasan Sadeghi Moqadam, Hojjatollah Moradi

    Published 2022-05-01
    “…In article 774 of the civil code following the well-known opinion in fiqh, the void of the pledge of intangible assets has been specified. …”
    Get full text
    Article
  19. 4139

    A Cross-Project Defect Prediction Model Based on Deep Learning With Self-Attention by Wanzhi Wen, Ruinian Zhang, Chuyue Wang, Chenqiang Shen, Meng Yu, Suchuan Zhang, Xinxin Gao

    Published 2022-01-01
    “…In particular, we provide semantic extractor named ALC to extract source code semantics based on source code files, and propose classification algorithm based on the semantic information of source project and target project, namely BSL, to build a prediction model. …”
    Get full text
    Article
  20. 4140

    Low Overhead Qutrit Magic State Distillation by Shiroman Prakash, Tanay Saha

    Published 2025-06-01
    “…Moreover, the $[[20,7,2]]_3$ qutrit code that arises from our construction when $m=3$ already has a yield parameter of $1.51$ which outperforms all known qubit triorthogonal codes of size less than a few hundred qubits.…”
    Get full text
    Article