Suggested Topics within your search.
Suggested Topics within your search.
- Agriculture 1
- Artificial Intelligence 1
- Artificial intelligence 1
- Automobiles 1
- Data Mining and Knowledge Discovery 1
- Data mining 1
- Economic Policy 1
- Economic policy 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Environmental Economics 1
- Environmental economics 1
- Fault location (Engineering) 1
- Industrial Organization 1
- Industrial organization 1
- Maintenance and repair 1
- Soil Science & Conservation 1
- Soil conservation 1
- Soil science 1
- Sustainable Development 1
- Sustainable development 1
-
321
Enhancing Learning-Based Cross-Modality Prediction for Lossless Medical Imaging Compression
Published 2025-01-01“…However, this significantly increases data size, posing storage and transmission challenges. …”
Get full text
Article -
322
Mapping of UK Biobank clinical codes: Challenges and possible solutions.
Published 2022-01-01“…Significant efforts to perform data reformatting, mapping to any selected ontologies (such as SNOMED-CT) and harmonization are required from any data user to integrate UK Biobank hospital inpatient and self-reported data, data from various registers with primary care (GP) data. …”
Get full text
Article -
323
A Comparison of Peer- and Tutor-Grading of an Introductory R Coding Assessment
Published 2025-08-01“…Using standard multivariate data analysis techniques we find that tutors and peers grade similarly given a prescriptive criterion. …”
Get full text
Article -
324
Efficient routing algorithm for opportunistic networks based on network coding
Published 2013-09-01“…To address the problem in opportunistic network that t existing epidemic-mechanism-based routing algorithms incur redundant communication overhead during the transmission of data packets,an efficient routing algorithm based on network coding,called NCBER (network-coding-based epidemic routing),was proposed.During the transmission of data packets,NCBER adopts an active XOR coding operation and multicast,and cancels the transmission of the Request control packets,so as to reduce the time used to transmit data packets,as well as the number of control packets.As a result,NCBER cuts down the network overhead and ortens the end-to-end delay of data packets.Theoretical analysis and extensive simulation results show that NCBER outperforms the classical epidemic routing algorithm and its improvement called MRRMR (message redundancy removal of multi-copy routing) in terms of the network overhead and the end-to-end delay,while still keeping the delivery rate at 100%.…”
Get full text
Article -
325
Code vulnerability detection method based on graph neural network
Published 2021-06-01“…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
Get full text
Article -
326
Multi-Layered Security Framework Combining Steganography and DNA Coding
Published 2025-05-01“…This study proposes a multi-layered security approach that integrates cryptographic and steganographic techniques to enhance data protection. The framework leverages advanced methods such as encrypted data embedding in images, DNA sequence coding, QR codes, and least significant bit (LSB) steganography. …”
Get full text
Article -
327
Cognitive Computing with Large Language Models for Student Assessment Feedback
Published 2025-04-01Subjects: “…data science assessments…”
Get full text
Article -
328
AN ANALYSIS OF CODE MIXING USED ON GITA SAVITRI'S YOUTUBE CHANNEL
Published 2024-09-01“…The results reveal 164 data of code-mixing. The first video, with the title ”Jadi Kaum Open-Minded,” with a total of 92 data, contains intra sentential and intra-lexical code mixing; the second video, with the title “Pengen Jago Bahasa Inggris,” with a total 44 data code mixing, contains intra sentential and intra lexical code mixing. …”
Get full text
Article -
329
An Explainable Deep Semantic Coding for Binary-Classification- Oriented Communication
Published 2025-04-01“…Prior efforts toward semantic coding often rely on learning-based feature extraction methods but tend to overlook data compression and lack a rigorous theoretical foundation. …”
Get full text
Article -
330
Rateless Space Time Block Code for Massive MIMO Systems
Published 2014-01-01“…We show that RSTBC guarantees the reliability of the system in such cases, even when the data loss rate is 25% or more. In such a highly lossy channel, the conventional fixed-rate codes fail to perform well, particularly when channel state information is not available at the transmitter. …”
Get full text
Article -
331
Dynamic RCS Reduction Performances of Antenna Array with Coding Metasurface
Published 2022-01-01“…On the basis of combining the two concepts of digital coding metasurface and metasurface antenna, low radar cross-section (RCS) coding metasurface antenna array with dynamic scattering performances is presented in this paper. …”
Get full text
Article -
332
A method for uncertainty and sensitivity analysis in fuel performance codes
Published 2021-09-01“…The present study proposes a method for the execution of uncertainty and sensitivity analysis on TRANSURANUS code, adapted for the use of stainless steel AISI-348 as the cladding material for a PWR reactor fuel rod, thus allowing to determine which input data are more relevant to the TRANSURANUS models, as well as a confidence interval for the results. …”
Get full text
Article -
333
Smart Attendance System for University Students Based on QR Code
Published 2025-05-01“…When a student presents the ID card in front of a QR reader, the student's data is scanned using the algorithm described in this paper. …”
Get full text
Article -
334
Predicting proprioceptive cortical anatomy and neural coding with topographic autoencoders.
Published 2024-12-01Get full text
Article -
335
POSITIONING AND NAVIGATION TECHNIQUES FOR AUTONOMOUS VEHICLES USING QR CODE
Published 2025-06-01“…The system integrates a Raspberry Pi 4 embedded computer to process QR code information via a USB camera, receive commands from a remote control interface, and transmit control signals to the microcontroller after analyzing QR code data. …”
Get full text
Article -
336
Code-mixing Analysis on Narasi Newsroom with Cinta Laura Kiehl
Published 2023-04-01“…The primary data were gathered by conducting video observation on YouTube and doing note-taking of the manuscript which consists of code-mixing. …”
Get full text
Article -
337
Malnutrition: The Importance of Identification, Documentation, and Coding in the Acute Care Setting
Published 2016-01-01“…Ninety-eight percent of malnourished patients were coded as malnourished in medical records. The results of the medical history audit of patients in control groups showed that between 0.9 and 5.4% of patients were coded as malnourished which is remarkably lower than the 52% of patients who were coded as malnourished from the point prevalence study data. …”
Get full text
Article -
338
Algorithms weighing lives and freedoms: The case of China’s health code
Published 2023-03-01“… In response to the COVID-19 outbreak in the beginning of 2020, Chinese local governments created a software extension on existing mobile applications to monitor citizens’ movement and collect their health data. Very quickly China’s health code became a key resource for the country’s governments to track and contain COVID-19 cases using time, location, and personal interactions. …”
Get full text
Article -
339
A Code-Based ISE to Protect Boolean Masking in Software
Published 2025-03-01“… Side-Channel Attacks (SCAs) pose a significant threat to data security in embedded environments. To counteract the power-based SCAs, masking is a widely used defense technique, that introduces randomness to obscure the sidechannel information generated during the processing of secret data. …”
Get full text
Article -
340
The work of Živojin Perić on the codification of the Civil Code of interwar Yugoslavia
Published 2021-01-01Get full text
Article