Showing 3,021 - 3,040 results of 9,936 for search 'chav~', query time: 1.29s Refine Results
  1. 3021
  2. 3022

    Quasi-cyclic extension based on PEG algorithm for construction of LDPC codes by LEI Jing1, WANG Jian-hui1, TANG Chao-jing1

    Published 2008-01-01
    “…Several important relations between the cycle structure on the Tanner graph and the parity-check matrix H of LDPC codes were proved.A new algorithm for constructing LDPC codes was proposed that introduced quasi-cyclic ex-tension method to PEG algorithm.After a basic matrix was constructed with PEG algorithm,circulant permutation ma-trices would replace the "1"s in the basic matrix.The new method could eliminate effectively the short cycles in the basic matrix without changing the degree distribution fraction of the basic matrix.Simulations show that the quasi-cyclic extended codes based on PEG algorithm have as good error correcting performance as the LDPC codes generated by PEG algorithm in the same conditions of code length,rate,degree distribution and decoding algorithm.The conclusion of contrastive analysis is that well-chosen cycle structures can improve the decoding performance obviously under the given degree distribution.The proposed algorithm can offer a good performance and low encoding complexity synchronously by taking advantage of the quasi-cyclic code’s characteristic that its parity-check matrix H has less superposition within the cycles.…”
    Get full text
    Article
  3. 3023

    Backdoor detection in embedded system firmware without file system by Chao-jian HU, Yi-bo XUE, Liang ZHAO, Zhou-jun LI

    Published 2013-08-01
    “…Any embedded system firmware without file system will integrate its system code and user application code into a single file.This setting has brought some additional difficulties to analyze them.Aimed at this kind of firmware,the problem of library function identification was analyzed,and several heuristic methods to recognize some important function relevant with manipulating network socket and character string / memory were proposed.Based on this analysis,the backdoor detection problem of some typical types including unauthorized listener,unintended function,hidden function,outward connection request etc.were discussed,and several backdoors (one is critical level) in a real world firmware were found.The result shows this method of identifying library function can be useful for security analysis to this type of firmware.…”
    Get full text
    Article
  4. 3024

    Personality associations with online vs. offline social capital and life satisfaction by Miao Chao, Dmitri Rozgonjuk, Jon D. Elhai, Haibo Yang, Christian Montag

    Published 2024-12-01
    “…In an increasingly digitalized world, social capital can be established and used in both online and offline contexts. …”
    Get full text
    Article
  5. 3025

    Genome sequence of Vibrio sp. OULL4 isolated from shellfish by Vengadesh Letchumanan, Wen-Si Tan, Wai-Fong Yin, Kok-Gan Chan

    Published 2020-04-01
    “…The control of these vibrios has been a hurdle due to the rising numbers of antibiotic resistant strains in the environments. …”
    Get full text
    Article
  6. 3026

    Therapeutic Decision Making in Hepatocellular Carcinoma According to Age and Child–Pugh Class: A Nationwide Cohort Analysis in South Korea by Sunmin Park, Chai Hong Rim, Young Kul Jung, Won Sup Yoon

    Published 2021-01-01
    “…Age and liver function have a significant impact on the therapeutic decision-making of HCC patients in Korea. …”
    Get full text
    Article
  7. 3027
  8. 3028

    Variation in soil enzyme activity with amendments of biochar and polyacrylamide in coal gangue soils by Qiuyun Fan, Na Li, Yuqing Geng, Ying Dong, ChaoYing Zhang

    Published 2025-02-01
    “…Abstract Coal gangue is a prevalent solid waste material, and its utilization presents an urgent challenge. …”
    Get full text
    Article
  9. 3029

    Resource reservation based on relaxed policy for grid workflow by Peng XIAO, Zhi-gang HU, Chao-kun YAN, Xi-long QU

    Published 2012-02-01
    “…To address the problem that applications tend to overestimate reservation duration,a novel reservation technique based on overlapping relaxing policy was proposed,so as to mitigate the negative effects of stringent reservation mechanisms on system performance.The analysis of the relaxed policy was represented theoretically and a relaxed admission algorithm was designed for large-scale grid workflows.Experimental results show that relaxed policy can significantly mitigate the negative effects of classical policies when system is in presence of heavy workload.Experimental results based on a real workflow indicate that the relaxed policy is able to decreasing the efficiency loss due to the overestimation of reservation durations.…”
    Get full text
    Article
  10. 3030

    Opportunities, challenges and school strategies for integrating generative AI in education by Davy Tsz Kit Ng, Eagle Kai Chi Chan, Chung Kwan Lo

    Published 2025-06-01
    “…The increasing accessibility of Generative Artificial Intelligence (GenAI) tools has led to their exploration and adoption in education. …”
    Get full text
    Article
  11. 3031
  12. 3032
  13. 3033

    Generalized Dirac Oscillator in Cosmic String Space-Time by Lin-Fang Deng, Chao-Yun Long, Zheng-Wen Long, Ting Xu

    Published 2018-01-01
    “…The corresponding eigenfunctions can be represented as confluent hypergeometric function and hypergeometric function. …”
    Get full text
    Article
  14. 3034

    University of Florida Potato Variety Spotlight: Red LaSoda by Lincoln Zotarelli, Doug Gergela, Chad M. Hutchinson, David Dinkins, Edsel Redden

    Published 2013-11-01
    “…It was observed in 1949 as a deep red mutant of LaSoda in the Louisiana potato breeding program. It has been in trials over many seasons and at many locations in Florida including university and grower sites. …”
    Get full text
    Article
  15. 3035

    Costoclavicular block as a diaphragm-sparing nerve block for shoulder surgery: a randomized controlled trial by Youngin Lee, Seunguk Bang, Jihyun Chung, Min Suk Chae, Jungwon Shin

    Published 2025-02-01
    “…Background Distal nerve block approaches have been explored to reduce hemidiaphragmatic paresis (HDP) more effectively than interscalene block (ISB). …”
    Get full text
    Article
  16. 3036

    Synthesis of Uniformly Excited Concentric Ring Arrays by the Strategy of Partial Density Tapering and the Algorithm of Differential Evolution by Xin-Kuan Wang, Gui-Bao Wang, Jianke Jia, Chao-Jun Huang

    Published 2020-01-01
    “…Through performing the PDT, a sound starting solution for DE can be generated. Then, the ring filling factor (RFF) is introduced so that the optimization of the number of elements can be transformed into the optimization of RFFs within the tapered thresholds, and thereby the real coding can be directly used with respect to the consideration of parallel encoding strategy. …”
    Get full text
    Article
  17. 3037

    Combined Effect of Subchondral Drilling and Hyaluronic Acid with/without Diacerein in Full-Thickness Articular Cartilage Lesion in Rabbits by Wanwisa Suwannaloet, Wiroon Laupattarakasem, Peerapol Sukon, Siriwan Ong-Chai, Pisamai Laupattarakasem

    Published 2012-01-01
    “…The newly formed tissue in SCD lesions showed significantly better histological grading scale and had higher content of type II collagen in HA-treated group compared to NSS control. …”
    Get full text
    Article
  18. 3038
  19. 3039
  20. 3040

    Colorectal Cancer Presenting as Single Pulmonary Hilar Lymph Node Metastasis by Ahmed M. Habib, Xenophon Kassianides, Samuel Chan, Mahmoud Loubani, Syed Qadri

    Published 2018-01-01
    “…It is not uncommon to perform pulmonary metastasectomy and identify mediastinal metastasis. Previous studies have identified incidental lymph node involvement following routine mediastinal lymph node clearance in 20–50% of cases. …”
    Get full text
    Article