Showing 1,201 - 1,220 results of 5,630 for search '(( targeting and coding ) OR ( making and coding ))', query time: 0.23s Refine Results
  1. 1201
  2. 1202

    The role of MYEOV gene: a review and future directions by Yidan Xi, Xuefei Liu, Yanan Ge, Mingzhe Jiang, Dong Zhao, Ershu Zhao, Fei Cai, Xinlong Wang, Jiatong Li, Tingting Li, Zhendong Zheng

    Published 2025-06-01
    “…The presence of the open reading frame of MYEOV in humans and other primates suggests its potential protein-coding capacity, although direct evidence of functional MYEOV protein is currently lacking. …”
    Get full text
    Article
  3. 1203

    Targeted Knock-Down of miR21 Primary Transcripts Using snoMEN Vectors Induces Apoptosis in Human Cancer Cell Lines. by Motoharu Ono, Kayo Yamada, Fabio Avolio, Vackar Afzal, Dalila Bensaddek, Angus I Lamond

    Published 2015-01-01
    “…We have previously reported an antisense technology, 'snoMEN vectors', for targeted knock-down of protein coding mRNAs using human snoRNAs manipulated to contain short regions of sequence complementarity with the mRNA target. …”
    Get full text
    Article
  4. 1204

    Bilingual feedback and translanguaging in online EFL mentoring: mediating academic writing for undergraduate theses by Lanoke Intan Paradita, Haira Rizka, Banatul Murtafi’ah, Lutfi Ashar Mauludin, Gatot Prasetyo

    Published 2025-12-01
    “…Data were recursively examined using thematic analysis, which involved two rounds of coding: an inductive, open coding approach followed by categorization of emerging patterns. …”
    Get full text
    Article
  5. 1205

    Hash Value Security Improvement of PCS Password using Signed Binary Operation by Haikal Rahmadi, Ary Bayu Nurwicaksono

    Published 2024-05-01
    “…The proposed method is able to make a simple but strong password system.…”
    Get full text
    Article
  6. 1206

    SIZE EFFECT ON THE ULTIMATE DRYING SHRINKAGE OF CONCRETE - EXPERIMENTAL EVIDENCE AND ENGINEERING PRACTICE by Lenka Dohnalová, Petr Havlásek

    Published 2020-03-01
    “…Finally, this size effect is compared against the current codes of practice and recommendations.…”
    Get full text
    Article
  7. 1207

    Improved segmented CRC assisted puncturing Polar decoding by Yanhong NI, Xiangxiong LOU, Jianrong BAO

    Published 2019-03-01
    “…A segmented cyclic redundancy check (CRC) assisted decoding algorithm was proposed.This method makes use of the high parallelism of BP decoding and the high reliability of CRC verification,and uniformly or proportionally disperses CRC verification bits into the original information bits.Simulation results show that when the code length N is 1 024 and the SNR is 3.5 dB,the average iterations of segmented CRC(2,16×2)and CRC (2,24+8) are 2.7 and 2.8 times less than those of G matrix based decoding.When the code length M is 896,the two segmented methods with a bit error rate of 10<sup>-5</sup>obtained about 0.7 dB gain compared with the non-CRC assisted BP puncturing decoding.…”
    Get full text
    Article
  8. 1208

    Algebraic Linear Analysis for Number Theoretic Transform in Lattice-Based Cryptography by Chun-Ming Chiu, Jiaxiang Liu, Ming-Hsien Tsai, Xiaomu Shi, Bow-Yaw Wang, Bo-Yin Yang

    Published 2025-06-01
    “…We add semi-automatic range-check reasoning capability to the CryptoLine toolkit via the Integer Set Library (wrapped via the python package islpy) which makes it easier and faster to verify more arithmetic crypto code, including Barrett and Plantard finite-field arithmetic, and show experimentally that this is viable on production code. …”
    Get full text
    Article
  9. 1209

    Study of Reaction Mechanisms in α + 69Ga reaction at ≈10 – 50 MeV by F. K. Amanuel

    Published 2023-04-01
    “…The theoretical model predictions were based on the statistical code COMPLETE, and the predicted results were compared and discussed with existing experimental data. …”
    Get full text
    Article
  10. 1210

    Waves of Pixels and Word-generated Algorithms: Drone Poetry as a Collaborative Practice between Machine and Human in Waveform by Richard A. Carter by Katarzyna Ostalska

    Published 2023-11-01
    “…Drone-generated poetry challenges a human-centered (literary) perspective, raising questions about AI’s creativity and code’s generative and aesthetic, and not only functional, potential. …”
    Get full text
    Article
  11. 1211

    Documentation of individual-level social determinants of health among adults diagnosed with cancer in the United States by Chia-Yun Hsu, Gabriel Henderson, Julia F. Slejko, Arif Hussain, Richard Scott Swain, Bindu Kalesan, Pei-Lin Huang, Eberechukwu Onukwugha

    Published 2025-08-01
    “…Among 112 medical oncologists/hematologists who responded to a survey about SDOH Z codes, 54% had not heard of Z codes to document SDOH. 26% reported that lack of reimbursement makes it difficult to increase their documentation and 64% would consider using Z codes if they are tied to payer reimbursement. …”
    Get full text
    Article
  12. 1212

    Software diversification method based on binary rewriting by Benwei HE, Yunfei GUO, Yawen WANG, Qingfeng WANG, Hongchao HU

    Published 2023-04-01
    “…Software diversity is an effective defense against code-reuse attacks, but most existing software diversification technologies are based on source code.Obtaining program source code may be difficult, while binary files are challenging to disassemble accurately and distinguish between code pointers and data constants.This makes binary file diversification difficult to generate high levels of randomization entropy, and easily compromised by attackers.To overcome these challenges, a binary file oriented software diversification method was proposed based on static binary rewriting technology, namely instruction offset randomization.This method inserted NOP instructions of varying byte lengths before program instructions with a certain probability, reducing the number of unintended gadgets in the program and randomly offsetting the original instruction address.This disrupts the program’s original memory layout and increases the cost of code-reuse attacks.At the same time, an optimization strategy based on hot code was designed for this method.The execution times of basic blocks in binary files were obtained by dynamic pile insertion, so as to adjust the NOP instruction insertion probability in each basic block.The higher the execution frequency, the fewer NOP instructions were inserted into the basic block, which can ensure lower performance overhead and produce higher randomization entropy.In the experimental part, the SPEC benchmark program was used to test the optimized method from the aspects of performance overhead, gadget survival rate and file size.The results show that a 15% insertion probability achieves the best effect, with an average gadget survival rate of less than 1.49%, increasing attackers’ difficulty in reusing the same gadget attack chain.Furthermore, only a 4.1% operation overhead and 7.7% space overhead are added, maintaining high levels of security.…”
    Get full text
    Article
  13. 1213

    Determination of Local Site-Specific Spectra Using Probabilistic Seismic Hazard Analysis for Bitlis Province, Turkey by Ercan Işık, Mustafa Kutanis

    Published 2015-07-01
    “…The obtained results were compared with the spectral responses proposed for seismic evaluation and retrofit of the building structure in Turkish Earthquake Code, Section 2. At the end of this study, it is apprehended that the Code proposed earthquake response spectra are not sufficient for the performance evaluation of the existing structures and the current estimations show that the potential seismic hazard research of the Turkey is underestimated in the code.Therefore, site- specific design spectra for the region should be developed, which reflect the characteristics of local sites.   …”
    Get full text
    Article
  14. 1214

    Vulnerability in Colorectal Cancer: Adjusted Gross Income and Geography as Factors in Determining Overall Survival in Colorectal Cancer: A Single-Center Study Across a Broad Income... by Cataldo Doria, Patrick G. De Deyne, Papachristou Charalampos

    Published 2024-12-01
    “…<b>Introduction</b>: Regional differences in socioeconomic status (SES) are well known, and we believe that the use of geocoding (zip code) can facilitate the introduction of targeted interventions for underserved populations. …”
    Get full text
    Article
  15. 1215
  16. 1216
  17. 1217
  18. 1218
  19. 1219

    Digital rule-based compliance processes. The urban regeneration of ex-Corradini, Naples (IT) by Marina Rigillo, Sergio Russo Ermolli, Giuliano Galluccio

    Published 2021-12-01
    “…The application of BIM-based procedures in the early design process stage becomes an opportunity to develop a multi-scenario approach, which employs Code and Model Checking systems as ‘heuristic’ tools to support decisions and enhancing risk management in complex projects.…”
    Get full text
    Article
  20. 1220