Suggested Topics within your search.
Suggested Topics within your search.
- Agriculture 1
- Artificial Intelligence 1
- Artificial intelligence 1
- Automobiles 1
- Data Mining and Knowledge Discovery 1
- Data mining 1
- Economic Policy 1
- Economic policy 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Environmental Economics 1
- Environmental economics 1
- Fault location (Engineering) 1
- Industrial Organization 1
- Industrial organization 1
- Maintenance and repair 1
- Soil Science & Conservation 1
- Soil conservation 1
- Soil science 1
- Sustainable Development 1
- Sustainable development 1
-
401
A Review of the Accuracy of Crash Coding When Applied to Motorcycle Crashes
Published 2024-11-01“…In Australia, crash type is defined by the last vehicle movement before the first crash impact. This coding system was originally based on police data for motor vehicle crashes but did not distinguish between vehicle types. …”
Get full text
Article -
402
Low error floor LT coding algorithm for unequal error protection
Published 2022-06-01“…Objectives:Rateless LT code is designed to provide an ideal transport protocol for large-scale data distribution and reliable broadcasting.The rateless LT code has three excellent characteristics,namely link adaptation,the code rate can be switched seamlessly, and the feedback method is relatively simple. …”
Get full text
Article -
403
An Integer Erasure Correction Coding and Its Application for Security Enhancement of Encryption
Published 2025-01-01“…The proposed ECCs employ integer arithmetic to encode and decode data bits and can correct all data bytes, each affected by exactly two erasures. …”
Get full text
Article -
404
DECODING OF THE NONLINEAR ERROR CONTROL CODE ON THE BASIS OF CRYPTOGRAPHIC ALGORITHM OF RIJNDAEL
Published 2019-06-01“…The nonlinear error control code on the basis of cryptographic transformation of data through Rijndael algorithm is considered. …”
Get full text
Article -
405
The Effects of Code-switching on Teaching English from EFL Students’ Perspective
Published 2023-04-01“…To obtain data, for this study an open-ended questionnaire is used. …”
Get full text
Article -
406
Three-Dimensional Adaptive Modulation and Coding for DDO-OFDM Transmission System
Published 2017-01-01“…To evaluate the performance of the proposed algorithm, we tailor the system parameters of direct detection optical OFDM (DDO-OFDM) to investigate the difference of effective data rate (EDR) between fixed schemes and proposed adaptive modulation and coding (AMC) schemes. …”
Get full text
Article -
407
Research on side information generation algorithm for Wyner-Ziv video coding
Published 2010-01-01“…To reduce the block artifacts and ghosting artifacts of side-information frame in Wyner-Ziv video coding,an overlapped block bi-directional motion compensation algorithm based on the original-image correlation was proposed.Firstly,the correlation of the original image in the encoder is calculated and sent to the decoder.Secondly,the correlation data is used to motion estimation in the decoder to get more accurate motion vector.Then the side information is gener-ated by bi-directional motion compensation.Compared with the existing algorithm,the proposed method can increase the average PSNR(peak signal-to-noise ratio) by 1.5~3dB,and also significantly improve the subjective quality of the side information.…”
Get full text
Article -
408
A fast network coding scheme for mobile wireless sensor networks
Published 2017-02-01“…However, the linear dependence of coded packets caused by linear network coding will result in significant instability of the entire network during data transmission. …”
Get full text
Article -
409
CORRECTION OF DEPENDENT ERRORS BY THE TURBOcodec based ON ATTACHED evenly convolutional codes
Published 2019-06-01“…The effectiveness of the proposed methods for data coding by two- and three-components turbocodes is evaluated. …”
Get full text
Article -
410
Validation of the Subchannel Code SUBCHANFLOW Using the NUPEC PWR Tests (PSBT)
Published 2012-01-01“…As part of the ongoing assessment efforts, the code has been validated by using experimental data from the NUPEC PWR Subchannel and Bundle Tests (PSBT). …”
Get full text
Article -
411
Liberatory "accession" to debt: An overlooked institution of the Draft Code on Obligations and contracts
Published 2022-01-01Get full text
Article -
412
Network-coding-based two-way relay cooperation with energy harvesting
Published 2017-04-01“…We introduce a maximal ratio combining–based decoding algorithm for the proposed system to achieve coding gain and diversity gain. Furthermore, we analyze the outage probability and bit error rate of the system when the optimal antenna selection algorithm is adopted at the relay to transmit data. …”
Get full text
Article -
413
Feature dependence graph based source code loophole detection method
Published 2023-01-01“…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
Get full text
Article -
414
Feature dependence graph based source code loophole detection method
Published 2023-01-01“…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
Get full text
Article -
415
Indonesian-English Code Switching Used on Pita’s Life Youtube Channel
Published 2021-05-01“…The use of language styles such as code-switching become a trend. In this study, the researcher aims to analyze the reasons and social function of why the speaker of YouTube video uses code-switching in their vlog. …”
Get full text
Article -
416
Collaborative Music Creation Method Based on Image Collection of Lattice Code
Published 2022-01-01“…After searching for a pair of dot codes with the shortest distance in the horizontal or vertical direction, starting from the first code point in the vertical direction and following the second code point. …”
Get full text
Article -
417
A survey on deep learning based joint source-channel coding
Published 2020-10-01“…Classical information theory shows that separate source-channel coding is asymptotically optimal over a point-to-point channel.As modern communication systems are becoming more sensitive to delays and bandwidth,it becomes difficult to adopt the assumption that such separate designs have unlimited computing power for encoding and decoding.Compared to joint source-channel coding,separate coding has proven to be sub-optimal when the bandwidth is limited.However,conventional joint source-channel coding schemes require complicated design.In contrast,data-driven deep learning brings new designing ideas into the paradigm.A summary of relevant research results was provided,which will help to clarify the way in which deep learning methods solve the joint source-channel coding problem and to provide an overviewof new research directions.Source compression schemes and end-to-end communication system models were firstly introduced,both based on deep learning,then two kinds of joint coding designs under different types of source,and potential problems of joint source-channel coding based on deep learning and possible future research directions were introduced.…”
Get full text
Article -
418
THE USE OF CODE-SWITCHING AMONG THE LATE ADOLESCENTS IN SOCIAL MEDIA FACEBOOK
Published 2017-12-01“…This study discussed the use of code-switching among the late adolescents in social media Facebook. …”
Get full text
Article -
419
Post-Quantum Homomorphic Encryption: A Case for Code-Based Alternatives
Published 2025-05-01“…We compare lattice-based and code-based homomorphic encryption solutions identifying challenges that have inhibited the progress of code-based schemes. …”
Get full text
Article -
420
An analysis of the impact of India’s Labour Codes on its organized and unorganized sectors
Published 2023-12-01“…The analysis on the unorganized sector is also significant as it highlights the lacunae in the existing laws and also emphasizes on the insufficient reforms ushered in by the Labour Codes. The article uses the doctrinal methodology of legal research to gather and analyze the data. …”
Get full text
Article