Showing 41 - 60 results of 457 for search 'Code Geass~', query time: 2.92s Refine Results
  1. 41

    New family of multilength multi-wavelength reed-solomon code of OCDMA system by ZHOU Xiu-li 1, MA Jun-xian2, HU Yu1

    Published 2006-01-01
    “…A new class of multilength, constant-weight two-dimensional multi-wavelength reed-solomon (2D MW RS) code with large capacity and good correlation properties was constructed. …”
    Get full text
    Article
  2. 42

    Status of GPU capabilities within the Shift Monte Carlo radiation transport code* by Biondo Elliott, Davidson Gregory, Evans Thomas, Hamilton Steven, Johnson Seth, Pandya Tara, Royston Katherine, Salcedo-Pérez José

    Published 2025-01-01
    “…Shift is a general-purpose Monte Carlo (MC) radiation transport code for fission, fusion, and national security applications. …”
    Get full text
    Article
  3. 43

    Combinational Circuits Testing Based on Hsiao Codes with Self-Dual Check Functions by Dmitry V. Efanov, Tatiana S. Pogodina, Nazirjan M. Aripov, Sunnatillo T. Boltayev, Asadulla R. Azizov, Elnara K. Ametova, Feruza F. Shakirova

    Published 2025-01-01
    “…These signs indicate that the functions (there are functions that describe check bits) belong to the class of self-dual Boolean functions and also belong to the codewords of Hsiao codes (these are codes with an odd column of weights). …”
    Get full text
    Article
  4. 44

    Genome biology of long non-coding RNAs in humans: A virtual karyotype by Alessandro Palma, Giulia Buonaiuto, Monica Ballarino, Pietro Laneve

    Published 2025-01-01
    “…Long non-coding RNAs (lncRNAs) represent a groundbreaking class of RNA molecules that exert regulatory functions with remarkable tissue and cellular specificity. …”
    Get full text
    Article
  5. 45
  6. 46

    Explicit construction of girth-eight QC-LDPC codes and its application in CRT method by Guo-hua ZHANG, Rong SUN, Xin-mei WANG

    Published 2012-03-01
    “…For arbitrary code lengths of the form PL(P≥3L<sup>2</sup>/4+L-1),a new family of (4,L)-regular quasi-cyclic (QC) low-density parity-check (LDPC) codes was proposed explicitly with girth ight.Employing the new code as a component code in the construction method of Chinese remainder theorem (CRT),a novel class of compound QC-LDPC codes was presented with both girth at least eight and very flexible code lengths.Simulation results show that the new compound codes with rate 1/2 and moderate code lengths perform very well over the additive white Gaussian noise (AWGN) channel.…”
    Get full text
    Article
  7. 47
  8. 48

    Smell-ML: A Machine Learning Framework for Detecting Rarely Studied Code Smells by Esraa Hamouda, Abeer El-Korany, Soha Makady

    Published 2025-01-01
    “…This paper proposes a novel approach, called Smell-ML, for detecting five rarely studied code smells: Middle Man (MM), Class Data Should Be Private (CDSBP), Inappropriate Intimacy (II), Refused Bequest (RB), and Speculative Generality (SG). …”
    Get full text
    Article
  9. 49

    Leveraging an Enhanced CodeBERT-Based Model for Multiclass Software Defect Prediction via Defect Classification by Rida Ghafoor Hussain, Kin-Choong Yow, Marco Gori

    Published 2025-01-01
    “…Comparative analysis against established models such as RoBERTa, Microsoft CodeBERT, and GPT-2 demonstrates that our approach yields significant improvements in prediction performance, with accuracy gains of up to 20% and 7% respectively in binary and multi class experimentation. …”
    Get full text
    Article
  10. 50

    Design and analysis of multi-channel MAC scheduling code for mobile ad hoc network by Xi-yang LI, Ping-zhi1 FAN

    Published 2014-05-01
    “…A multi-channel topology-transparent MAC scheduling code was proposed for mobile ad hoc network sup-porting multi-classes of users via polynomials over finite field. …”
    Get full text
    Article
  11. 51

    mVulSniffer: a multi-type source code vulnerability sniffer method by Xuejun ZHANG, Fenghe ZHANG, Jiyang GAI, Xiaogang DU, Wenjie ZHOU, Teli CAI, Bo ZHAO

    Published 2023-09-01
    “…Given the problem that the code slice used by existing deep learning-based vulnerability sniffer methods could not comprehensively encompass the subtle characteristics between vulnerability classes, and a single deep learning sniffer model had insufficient ability to learn long context-dependent information between cross-file and cross-function code statements, a multi-type source code vulnerability sniffer method was proposed.Firstly, fine-grained two-level slices containing the types of vulnerabilities were extracted based on the control dependency and data dependency information in program dependency graph.Secondly, the two-level slices were transformed into initial feature vector.Finally, a fusion model of deep learning vulnerability sniffer suitable for two-level slices was constructed to achieve accurate vulnerability detection of multi-type source code.The experimental results on multiple synthetic datasets and two real datasets show that the proposed method outperforms the existing multi-type source code vulnerability sniffer methods.…”
    Get full text
    Article
  12. 52

    Code-switching as a linguistic resource in an EFL context at a language center in Mexico by Tatiana Estefanía Galván de la Fuente

    Published 2023-11-01
    “…This study explores code-switching (CS) as an interactional resource by learners in an EFL classroom in a predominantly monolingual context of Mexico could provide university students with a useful resource in language learning. …”
    Get full text
    Article
  13. 53

    Honeypot contract detection method for Ethereum based on source code structure and graph attention network by Youwei WANG, Yudong HOU, Lizhou FENG

    Published 2023-09-01
    “…To address the problems of low accuracy and poor generalization of current honeypot contract detection methods, a honeypot contract detection method for Ethereum based on source code structure and graph attention network was proposed.Firstly, in order to extract the structural information of the Solidity source code of the smart contract, the source code was parsed and converted into an XML parsing tree.Then, a set of feature words that could express the structural and content characteristics of the contract was selected, and the contract source code structure graph was constructed.Finally, in order to avoid the impact of dataset imbalance, the concepts of teacher model and student model were introduced based on the ensemble learning theory.Moreover, the graph attention network model was trained from the global and local perspectives, respectively, and the outputs of all models were fused to obtain the final contract detection result.The experiments demonstrate that CSGDetector has higher honeypot detection capability than the existing method KOLSTM, with increments of 1.27% and 7.21% on F<sub>1</sub> measurement in two-class classification and multi-class classification experiments, respectively.When comparing with the existing method XGB, the average recall rate of CSGDetector in the masked honeypot detection experiments for different types of honeypot contracts is improved by 7.57%, which verifies the effectiveness of the method in improving the generalization performance of the algorithm.…”
    Get full text
    Article
  14. 54
  15. 55
  16. 56

    BER performance analysis of polar-coded FBMC/OQAM in the presence of AWGN and Nakagami-m fading channel by Tadele A. Abose, Fanuel O. Ayana, Thomas O. Olwal, Yihenew W. Marye

    Published 2024-06-01
    “…It offers several advantages over traditional orthogonal frequency-division multiplexing (OFDM) modulation, including higher spectral efficiency, lower out-of-band emission, and improved robustness to time-frequency selective channels. Polar codes, a new class of error-correcting codes, have received much attention recently due to their ability to achieve the Shannon limit with practical decoding complexity. …”
    Get full text
    Article
  17. 57

    Incorporation of Histogram Intersection and Semantic Information into Non-Negative Local Laplacian Sparse Coding for Image Classification by Ying Shi, Yuan Wan, Xinjian Wang, Huanhuan Li

    Published 2025-01-01
    “…Traditional sparse coding has proven to be an effective method for image feature representation in recent years, yielding promising results in image classification. …”
    Get full text
    Article
  18. 58
  19. 59
  20. 60