Showing 41 - 60 results of 62 for search 'code machine scheme', query time: 0.08s Refine Results
  1. 41
  2. 42
  3. 43
  4. 44
  5. 45

    On Characteristics of Symbolic Execution in the Problem of Assessing the Quality of Obfuscating Transformations by Petr D. Borisov, Yury V. Kosolapov

    Published 2021-03-01
    “…The paper proposes two implementations of the scheme: extended and simplified. The extended scheme is closer to the process of analyzing a program by an analyst, since it includes the steps of disassembly and translation into intermediate code, while in the simplified scheme these steps are excluded. …”
    Get full text
    Article
  6. 46

    Theoretical studies results for a mathematical model of a road roller turn by M. N. Artemenko, P. A. Korchagin, I. A. Teterina

    Published 2022-06-01
    “…As a result of the developed mathematical model, a program code was built in the MATLAB software product, which formed the basis of theoretical studies that made it possible to fully study the influence of the design and operational parameters of the machine on the motion trajectory and positioning accuracy.Results. …”
    Get full text
    Article
  7. 47

    An Efficient Quantized Message Passing Receiver Design for SCMA Systems by Hao Cheng, Min Zhang, Ruoyu Su

    Published 2025-05-01
    “…Sparse code multiple access (SCMA) has been considered as an efficient technique to provide both massive connectivity and high spectrum efficiency for future machine-type wireless networks. …”
    Get full text
    Article
  8. 48

    Distributed Software Build Assurance for Software Supply Chain Integrity by Ken Lew, Arijet Sarker, Simeon Wuthier, Jinoh Kim, Jonghyun Kim, Sang-Yoon Chang

    Published 2024-10-01
    “…We design and build a software build assurance scheme detecting if there have been injections or modifications in the various steps in the software supply chain, including the source code, compiling, and distribution. …”
    Get full text
    Article
  9. 49

    Enhancing Biomedical Semantic Annotations through a Knowledge Graph-Based Approach by Asim Abbas, Mutahira Khalid, Sebastian Chalarca, Fazel Keshtkar, Syed Ahmad Chan Bukhari

    Published 2023-05-01
    “…However, this information has various access challenges due to the need for precise machine-interpretable semantic metadata required by search engines. …”
    Get full text
    Article
  10. 50

    Multi-strategy enhanced marine predator algorithm: performance investigation and application in intrusion detection by Zhongmin Wang, Yujun Zhang, Jun Yu, YuanYuan Gao, Guangwei Zhao, Essam H. Houssein, Rui Zhong

    Published 2025-02-01
    “…The source code of this research can be downloaded at https://github.com/RuiZhong961230/MEMPA .…”
    Get full text
    Article
  11. 51
  12. 52

    A reliable NLOS error identification method based on LightGBM driven by multiple features of GNSS signals by Xiaohong Zhang, Xinyu Wang, Wanke Liu, Xianlu Tao, Yupeng Gu, Hailu Jia, Chuanming Zhang

    Published 2024-11-01
    “…Finally, we introduce the LightGBM model to establish an effective correlation between signal features and satellite visibility and adopt a multifeature-driven scheme to achieve reliable identification of NLOSs. …”
    Get full text
    Article
  13. 53

    The Training Method for Digital Data Operation by I. V. Shevtsova

    Published 2020-09-01
    “…While the modern IT and data sources contain tools for working with data, which are available to a wide range of users without the need to write the code. Materials and methods. The study is based on the theoretical materials and the practice of operation with digital data in management processes. …”
    Get full text
    Article
  14. 54

    Experimental and Numerical Investigation on the Bearing Behavior of Curved Continuous Twin I-Girder Composite Bridge with Precast Concrete Slab by Chuandong Shen, Yifan Song, Lei Yan, Yuan Li, Xiaowei Ma, Shuanhai He, Xiaodong Han

    Published 2021-01-01
    “…These above may indicate that the TGCB designed according to Chinese codes has good safety reserve and ductility. From parameter analysis results, it was concluded that the TGCB with full-support construction scheme has larger yield load and ultimate load compared with the one with erecting machine construction scheme. …”
    Get full text
    Article
  15. 55

    Lossless Compression of Malaria-Infected Erythrocyte Images Using Vision Transformer and Deep Autoencoders by Md Firoz Mahmud, Zerin Nusrat, W. David Pan

    Published 2025-04-01
    “…To ensure no loss in reconstructed image quality, we further compress the residuals produced by these autoencoders using the Huffman code. Simulation results show that the proposed method achieves lower overall bit rates and thus higher compression ratios than traditional compression schemes such as JPEG 2000, JPEG-LS, and CALIC. …”
    Get full text
    Article
  16. 56

    Explicit collocation algorithm for the nonlinear fractional Duffing equation via third-kind Chebyshev polynomials by Y.H. Youssri, A.G. Atta, M.O. Moustafa, Z.Y. Abu Waar

    Published 2025-06-01
    “…The main advantages of the proposed method are that it does not require a huge number of retained modes, simply a few terms, and does not exhaust the machine used to render the codes.…”
    Get full text
    Article
  17. 57

    Efficient Channel Prediction Technique Using AMC and Deep Learning Algorithm for 5G (NR) mMTC Devices by Vipin Sharma, Rajeev Kumar Arya, Sandeep Kumar

    Published 2022-01-01
    “…Efficient utilisation of adaptive modulation and coding ensures the quality transmission of information bits through the significant reduction in bit error rate (BER). …”
    Get full text
    Article
  18. 58

    Computational complexity when constructing rational plans for program execution in a given field of parallel computers by V. M. Bakanov

    Published 2022-12-01
    “…An iterative approach to improving heuristic methods favors developing optimal schemes for solving the objective problem.Conclusions. …”
    Get full text
    Article
  19. 59

    Entropy of Neuronal Spike Patterns by Artur Luczak

    Published 2024-11-01
    “…Finally, we discuss strategies to overcome these challenges, including dimensionality reduction techniques, advanced entropy estimators, sparse coding schemes, and the integration of machine learning approaches. …”
    Get full text
    Article
  20. 60

    Symbolic Framework for Evaluation of NOMA Modulation Impairments Based on Irregular Constellation Diagrams by Nenad Stefanovic, Vladimir Mladenovic, Borisa Jovanovic, Ron Dabora, Asutosh Kar

    Published 2025-05-01
    “…In contrast to legacy modulation and coding schemes (MCSs), NOMA MCSs typically have irregular symbol constellations with asymmetric symbol decision regions affecting synchronization at the receiver. …”
    Get full text
    Article