-
1
Multilevel coding scheme based on low-density parity-check codes in DAMB
Published 2006-01-01Get full text
Article -
2
Multilevel coding scheme based on low-density parity-check codes in DAMB
Published 2006-01-01Get full text
Article -
3
-
4
-
5
Exploring Low-Code Development: A Comprehensive Literature Review
Published 2023-10-01“…This approach speeds up the development process, fosters closer collaboration between software development and business teams, and enhances the organization’s ability to respond to business and market demands or changes. In this article, existing knowledge of low-code development from multiple perspectives is summarized, including the definitions, used tools, applied development lifecycles, application areas, potential benefits, challenges, and, consequently, relevant development and delivery principles.…”
Get full text
Article -
6
Criminal Law Characteristics of Criminal Offences Under Article 190 of the Criminal Code of Ukraine
Published 2025-07-01“…In recent years, the number of such criminal offences has been on the rise. This article is devoted to the consideration of the main aspects of the criminal law characteristics of fraud as a criminal offence under Article 190 of the Criminal Code of Ukraine. …”
Get full text
Article -
7
Nonbinary polar coding with low decoding latency and complexity
Published 2023-05-01Get full text
Article -
8
-
9
-
10
-
11
Evaluation of ATLHAMC12 subchannel code for total loss of flow scenario
Published 2023-12-01Get full text
Article -
12
Optimizing low complexity encoding method for systematic polar code
Published 2018-07-01Get full text
Article -
13
Adaptive Modulation and Coding With LDPC Codes and Retransmission for Ultraviolet Communication
Published 2024-01-01Get full text
Article -
14
The Construction of an Universal Linearized Control Flow Graph for Static Code Analysis of Algorithms
Published 2013-04-01“…Optimizing compiler CLANG&LLVM is used as a technical tool for building a linearized control flow graph. The analysis of LLVM compiler procedural optimizations is carried out in the article. …”
Get full text
Article -
15
Auto forensic detecting algorithms of malicious code fragment based on TensorFlow
Published 2021-08-01Get full text
Article -
16
Selective Forwarding Attacks against Data and ACK Flows in Network Coding and Countermeasures
Published 2012-01-01Get full text
Article -
17
Two-Phase Flow Simulations for PTS Investigation by Means of Neptune_CFD Code
Published 2009-01-01Get full text
Article -
18
Dispersed Two-Phase Flow Modelling for Nuclear Safety in the NEPTUNE_CFD Code
Published 2017-01-01Get full text
Article -
19
Using Low-Code Technology to Develop Tasks in an Interactive Testing System
Published 2024-07-01“…Currently, for the development of certain solutions, they are actively switching to Low-code technologies, i.e. they use blocks with ready-made code and get the final product with the necessary functionality. …”
Get full text
Article -
20
Beyond Low-Code Development: Marrying Requirements Models and Knowledge Representations
Published 2022-09-01Get full text
Article