-
41
New family of multilength multi-wavelength reed-solomon code of OCDMA system
Published 2006-01-01“…A new class of multilength, constant-weight two-dimensional multi-wavelength reed-solomon (2D MW RS) code with large capacity and good correlation properties was constructed. …”
Get full text
Article -
42
Status of GPU capabilities within the Shift Monte Carlo radiation transport code*
Published 2025-01-01“…Shift is a general-purpose Monte Carlo (MC) radiation transport code for fission, fusion, and national security applications. …”
Get full text
Article -
43
Combinational Circuits Testing Based on Hsiao Codes with Self-Dual Check Functions
Published 2025-01-01“…These signs indicate that the functions (there are functions that describe check bits) belong to the class of self-dual Boolean functions and also belong to the codewords of Hsiao codes (these are codes with an odd column of weights). …”
Get full text
Article -
44
Genome biology of long non-coding RNAs in humans: A virtual karyotype
Published 2025-01-01“…Long non-coding RNAs (lncRNAs) represent a groundbreaking class of RNA molecules that exert regulatory functions with remarkable tissue and cellular specificity. …”
Get full text
Article -
45
-
46
Explicit construction of girth-eight QC-LDPC codes and its application in CRT method
Published 2012-03-01“…For arbitrary code lengths of the form PL(P≥3L<sup>2</sup>/4+L-1),a new family of (4,L)-regular quasi-cyclic (QC) low-density parity-check (LDPC) codes was proposed explicitly with girth ight.Employing the new code as a component code in the construction method of Chinese remainder theorem (CRT),a novel class of compound QC-LDPC codes was presented with both girth at least eight and very flexible code lengths.Simulation results show that the new compound codes with rate 1/2 and moderate code lengths perform very well over the additive white Gaussian noise (AWGN) channel.…”
Get full text
Article -
47
Beam Synthesis with Low-Bit Reflective Coding Metamaterial Antenna: Theoretical and Experimental Results
Published 2018-01-01Get full text
Article -
48
Smell-ML: A Machine Learning Framework for Detecting Rarely Studied Code Smells
Published 2025-01-01“…This paper proposes a novel approach, called Smell-ML, for detecting five rarely studied code smells: Middle Man (MM), Class Data Should Be Private (CDSBP), Inappropriate Intimacy (II), Refused Bequest (RB), and Speculative Generality (SG). …”
Get full text
Article -
49
Leveraging an Enhanced CodeBERT-Based Model for Multiclass Software Defect Prediction via Defect Classification
Published 2025-01-01“…Comparative analysis against established models such as RoBERTa, Microsoft CodeBERT, and GPT-2 demonstrates that our approach yields significant improvements in prediction performance, with accuracy gains of up to 20% and 7% respectively in binary and multi class experimentation. …”
Get full text
Article -
50
Design and analysis of multi-channel MAC scheduling code for mobile ad hoc network
Published 2014-05-01“…A multi-channel topology-transparent MAC scheduling code was proposed for mobile ad hoc network sup-porting multi-classes of users via polynomials over finite field. …”
Get full text
Article -
51
mVulSniffer: a multi-type source code vulnerability sniffer method
Published 2023-09-01“…Given the problem that the code slice used by existing deep learning-based vulnerability sniffer methods could not comprehensively encompass the subtle characteristics between vulnerability classes, and a single deep learning sniffer model had insufficient ability to learn long context-dependent information between cross-file and cross-function code statements, a multi-type source code vulnerability sniffer method was proposed.Firstly, fine-grained two-level slices containing the types of vulnerabilities were extracted based on the control dependency and data dependency information in program dependency graph.Secondly, the two-level slices were transformed into initial feature vector.Finally, a fusion model of deep learning vulnerability sniffer suitable for two-level slices was constructed to achieve accurate vulnerability detection of multi-type source code.The experimental results on multiple synthetic datasets and two real datasets show that the proposed method outperforms the existing multi-type source code vulnerability sniffer methods.…”
Get full text
Article -
52
Code-switching as a linguistic resource in an EFL context at a language center in Mexico
Published 2023-11-01“…This study explores code-switching (CS) as an interactional resource by learners in an EFL classroom in a predominantly monolingual context of Mexico could provide university students with a useful resource in language learning. …”
Get full text
Article -
53
Honeypot contract detection method for Ethereum based on source code structure and graph attention network
Published 2023-09-01“…To address the problems of low accuracy and poor generalization of current honeypot contract detection methods, a honeypot contract detection method for Ethereum based on source code structure and graph attention network was proposed.Firstly, in order to extract the structural information of the Solidity source code of the smart contract, the source code was parsed and converted into an XML parsing tree.Then, a set of feature words that could express the structural and content characteristics of the contract was selected, and the contract source code structure graph was constructed.Finally, in order to avoid the impact of dataset imbalance, the concepts of teacher model and student model were introduced based on the ensemble learning theory.Moreover, the graph attention network model was trained from the global and local perspectives, respectively, and the outputs of all models were fused to obtain the final contract detection result.The experiments demonstrate that CSGDetector has higher honeypot detection capability than the existing method KOLSTM, with increments of 1.27% and 7.21% on F<sub>1</sub> measurement in two-class classification and multi-class classification experiments, respectively.When comparing with the existing method XGB, the average recall rate of CSGDetector in the masked honeypot detection experiments for different types of honeypot contracts is improved by 7.57%, which verifies the effectiveness of the method in improving the generalization performance of the algorithm.…”
Get full text
Article -
54
Simplified sequence repetition nodes-based fast successive cancellation decoding algorithm for polar code
Published 2023-05-01Get full text
Article -
55
-
56
BER performance analysis of polar-coded FBMC/OQAM in the presence of AWGN and Nakagami-m fading channel
Published 2024-06-01“…It offers several advantages over traditional orthogonal frequency-division multiplexing (OFDM) modulation, including higher spectral efficiency, lower out-of-band emission, and improved robustness to time-frequency selective channels. Polar codes, a new class of error-correcting codes, have received much attention recently due to their ability to achieve the Shannon limit with practical decoding complexity. …”
Get full text
Article -
57
Incorporation of Histogram Intersection and Semantic Information into Non-Negative Local Laplacian Sparse Coding for Image Classification
Published 2025-01-01“…Traditional sparse coding has proven to be an effective method for image feature representation in recent years, yielding promising results in image classification. …”
Get full text
Article -
58
THE DESIGN AND IMPLEMENTATION OF AN AUTOMATED CNC TYPEWRITER
Published 2024-07-01Get full text
Article -
59
-
60
Blind despreading and deconvolution of asynchronous multiuser direct sequence spread spectrum signals under multipath channels
Published 2023-05-01Subjects: Get full text
Article