-
161
-
162
Monte-Carlo Serpent code validation based on the experimental data from research subcritical facility
Published 2018-12-01“…Description of computation model for Kyoto University Critical Assembly (KUCA) developed with the help of Monte-Carlo Serpent code was presented in this paper. …”
Get full text
Article -
163
Critical Literacy Sustainability: What Pedagogical Practices? Whose Role?
Published 2024-12-01“…Results verified that employing semantic gravity and density sustain critical literacy skills. Notably, the null hypothesis (ℎ0) was rejected, confirming influence of the application of semantic gravity and density on informing critical literacy teaching practices.…”
Get full text
Article -
164
GBsim: A Robust GCN-BERT Approach for Cross-Architecture Binary Code Similarity Analysis
Published 2025-04-01“…Nevertheless, practical deployments in mission-critical scenarios such as binary code similarity detection face two fundamental obstacles: first, the inherent noise in graph construction processes exemplified by incomplete control flow edges during binary function recovery; second, the substantial distribution discrepancies caused by cross-architecture instruction set variations. …”
Get full text
Article -
165
THE RELATION OF POWER IN FILM ‘THE JUDGE’: A CRITICAL DISCOURSE ANALYSIS
Published 2024-03-01“…The researcher employed the concept of code-switching to interpret the film "The Judge" and derive insights into the dynamics of power within it. …”
Get full text
Article -
166
Critical Study on Corrosion Inhibitors in U-Shaped RCC Beams
Published 2022-01-01Get full text
Article -
167
Toward a critical assessment of indoor environmental quality standards
Published 2022-12-01“…However, actual code compliance processes are not always accompanied by critical reflections regarding the evidentiary basis of the entailed mandates and recommendations. …”
Get full text
Article -
168
Advancements in Coded Computation: Integrating Encoding Matrices with Data Shuffling for Enhanced Data Transmission Efficiency
Published 2025-01-01“…In the interconnected age of big data, cloud computing, and the Internet of Things, the demand for robust data processing and transmission systems is critical. This study delves into the fundamental principles, technological advantages, and applications of coded computation, emphasizing the integration of encoding matrices and data shuffling techniques. …”
Get full text
Article -
169
Translational Regulators in Pulmonary Fibrosis: MicroRNAs, Long Non-Coding RNAs, and Transcript Modifications
Published 2025-04-01“…Translational regulation has emerged as a critical aspect of gene expression control, and the dysregulation of key effectors is associated with disease pathogenesis. …”
Get full text
Article -
170
Long non-coding rnas as key modulators of the immune microenvironment in hepatocellular carcinoma: implications for Immunotherapy
Published 2025-04-01“…Hepatocellular carcinoma (HCC) represents a major global health challenge, characterized by its complex immune microenvironment that plays a pivotal role in tumor progression and therapeutic response. Long non-coding RNAs (lncRNAs) have emerged as critical regulators of various biological processes, including gene expression and immune cell function. …”
Get full text
Article -
171
URDU-A CRITICAL ANALYSIS THE QURANIC EDUCATION IN SCHOOLS OF SINDH
Published 2018-07-01Get full text
Article -
172
Framing the role of experts in platform governance: Negotiating the code of practice on disinformation as a case study
Published 2025-03-01“…We found ambivalent opinions on the efficacy of the Code and widespread distrust for platforms, particularly regarding content moderation and data sharing practices. …”
Get full text
Article -
173
Sequence-based analysis uncovers an abundance of non-coding RNA in the total transcriptome of Mycobacterium tuberculosis.
Published 2011-11-01“…More than a quarter of all sequence reads mapping outside of ribosomal RNA genes represent non-coding RNA, and the density of reads mapping to intergenic regions was more than two-fold higher than that mapping to annotated coding sequences. …”
Get full text
Article -
174
Wireless semantic image transmission system based on deep flexible coding strategy and performance prediction
Published 2025-05-01“…To improve adaptivity and coding flexibility for diverse image content under complex and dynamic wireless channel conditions, a deeply flexible joint source-channel coding (DF-JSCC) scheme and a transmission performance prediction network (PreNet) for semantic image transmission (SIT) were proposed. …”
Get full text
Article -
175
Balancing prior knowledge and sensory data in a predictive coding model of coherent motion detection.
Published 2025-05-01“…This study introduces a neurobiologically inspired computational model based on the predictive coding algorithm, providing insights into coherent motion detection processes. …”
Get full text
Article -
176
Energy-Efficient Routing Algorithms Based on OVSF Code and Priority in Clustered Wireless Sensor Networks
Published 2013-07-01Get full text
Article -
177
Experimental performance analysis of lightweight block ciphers and message authentication codes for wireless sensor networks
Published 2017-11-01“…Wireless sensor networks are widely used in many mission critical applications such as environment monitoring, military monitoring, and healthcare. …”
Get full text
Article -
178
Rich Data Versus Quantity of Data in Code Generation AI: A Paradigm Shift for Healthcare
Published 2025-06-01“…This paper evaluates the critical trade-offs between "rich data" and "data quantity" approaches in Code Generation AI (Code Gen AI) and autonomous code agents, particularly in high-integrity sectors like healthcare. …”
Get full text
Article -
179
Q-Pandora Unboxed: Characterizing Resilience of Quantum Error Correction Codes Under Biased Noise
Published 2025-04-01“…Limited research has explored the resilience of QECCs to biased noise, critical for selecting optimal codes. We examine how different noise types impact QECCs, considering the varying susceptibility of quantum systems to specific errors. …”
Get full text
Article -
180