Showing 941 - 960 results of 10,293 for search 'data coding', query time: 0.16s Refine Results
  1. 941

    Symbol-Pair Distances of a Class of Repeated-Root Constacyclic Codes of Length <i>np<sup>s</sup></i> over <inline-formula><math display="inline"><semantics><mrow><msub><mi mathvari... by Wei Zhao, Weixian Li, Hui Chen

    Published 2025-04-01
    “…Symbol-pair codes are a class of block codes with symbol-pair metrics designed to protect against pair errors that may occur in high-density data storage systems. …”
    Get full text
    Article
  2. 942

    Improving MRAM Performance with Sparse Modulation and Hamming Error Correction by Nam Le, Thien An Nguyen, Jong-Ho Lee, Jaejin Lee

    Published 2025-06-01
    “…During the encoding process, three check bits are appended to the user data and processed using a generator matrix. If the resulting codeword fails to satisfy the sparsity constraint, it is inverted to comply with the coding requirement. …”
    Get full text
    Article
  3. 943
  4. 944

    Development and testing of data infrastructure in the American College of Emergency Physicians’ Clinical Emergency Data Registry for opioid‐related research by Andrew Taylor, Jeremiah Kinsman, Kathryn Hawk, Gail D'Onofrio, Caitlin Malicki, Bill Malcom, Pawan Goyal, Arjun K. Venkatesh

    Published 2022-10-01
    “…Feasibility testing highlighted low‐to‐moderate feasibility of date and social history data elements, significant EHR platform variation, and inconsistency in the extraction of common national data standards (eg, Logical Observation Identifiers Names and Codes, International Classification of Diseases, Tenth Revision codes). …”
    Get full text
    Article
  5. 945

    IAP: Intrusion-Tolerant Malicious Data Injection Attack Analysis and Processing in Traffic Flow Data Collection Based on VANETs by Nan Ding, Guozhen Tan, Wei Zhang

    Published 2016-05-01
    “…Next, we propose an intrusion-tolerant security algorithm to protect traffic flow data collection in VANETs from malicious data injection attacks, that is, IA 2 P, without any security codes or authentication. …”
    Get full text
    Article
  6. 946

    Leveraging the process mining technique to optimize data preparation time in a database used as an automated data delivery center by Seyed Hossein Abrehdari

    Published 2025-12-01
    “…This study investigates the development and implementation of a seismic database utilizing process mining techniques. This data format is generated and stored in seismic centers, such as the U.S. …”
    Get full text
    Article
  7. 947

    Identity-based linear homomorphic signature for a restricted combiners’ group for e-commerce by Yuan Tian, Weitao Song, Tanping Zhou, Bin Hu, Xuan Zhou, Yujie Ding, Weidong Zhong, Xiaoyuan Yang

    Published 2025-08-01
    “…As the volume of electronic transaction data increases and the demand for real-time processing grows, network coding techniques have become popular for improving performance. …”
    Get full text
    Article
  8. 948

    Complete Colombian Caribbean loggerhead turtle mitochondrial genome: tRNA structure analysis and revisited marine turtle phylogeny by Javier Hernández-Fernández, Katherin Otálora

    Published 2018-11-01
    “…Mitochondrial DNA sequence data are of great importance for the description, monitoring, and phylogenetic analyses of migratory turtle populations. …”
    Get full text
    Article
  9. 949
  10. 950
  11. 951

    High Fidelity Single-Pixel Imaging by Chao Deng, Xuemei Hu, Xiaoxu Li, Jinli Suo, Zhili Zhang, Qionghai Dai

    Published 2019-01-01
    “…Experiments both on synthetic data and real captured data demonstrate that our method can achieve better reconstruction from the same measurements, or reduce the number of required measurements for the same reconstruction quality.…”
    Get full text
    Article
  12. 952
  13. 953

    Data transmission system with encryption by chaotic sequences by R. L. Politans’kyy, P. M. Shpatar, A. V. Hres, A. D. Verigha

    Published 2014-06-01
    “…Improvement of methods of hidden data transfer based on the systems with chaotic synchronization is the important task of research in the field of information and telecommunication systems based on chaos. …”
    Get full text
    Article
  14. 954

    Improving Problem Solving Skills of High School Students Through The Implementation of Digital Module by Putera Islamiyadi Rahmatullah, Muhammad Akhyar, Agus Efendi

    Published 2025-04-01
    “…Data analysis, including independent sample t-tests and N-Gain calculations, demonstrated a significant improvement in the experimental group’s problem-solving performance. …”
    Get full text
    Article
  15. 955

    Monitoring the reliability of integrated circuits protection against Trojans: encoding and decoding of combinational structures by L. A. Zolotorevich, V. A. Ilyinkov

    Published 2021-09-01
    “…For the purpose of hardware protection of projects, the methods of hardware coding are currently used.The paper discusses the features and reliability of logical coding of combinational circuits. …”
    Get full text
    Article
  16. 956

    Complete mitochondrial genome of orthotomus sutorius (passeriformes: cisticolidae) by Hui Gao, Zhicheng Yao, Yanyan Zhao, Minhao Chen, Zongzhi Li, Xue Meng Zhou, Yuanguang Wen, Xiaoguo Zhou, Yongjie Huang

    Published 2025-05-01
    “…It is 16,982 bp in length and consists of 13 protein-coding genes (PCGs), 22 tRNA genes, two rRNA genes (12S rRNA and 16S rRNA) and a control region (CR). …”
    Get full text
    Article
  17. 957

    Sensitivity of Spiking Neural Networks Due to Input Perturbation by Haoran Zhu, Xiaoqin Zeng, Yang Zou, Jinfeng Zhou

    Published 2024-11-01
    “…<b>Methods:</b> This paper first defines the sensitivity of a temporal-coded spiking neuron (SN) as the deviation between the perturbed and unperturbed output under a given input perturbation with respect to overall inputs. …”
    Get full text
    Article
  18. 958

    Compact classification using the biomimetic properties of ultrafast spiking microlaser neurons by Gibaek Kim, Matthieu Dubernard, Sami V El-Nakouzi, Amir-Hossein Masominia, Sylvain Barbay, Laurie E Calvet

    Published 2025-01-01
    “…Machine learning using spiking neurons offers high computational efficiency with minimal resources, enabling sparse coding and brain-inspired methods. Photonic systems potentially enable very fast classifications but, despite recent progress, demonstrations are still challenging to implement. …”
    Get full text
    Article
  19. 959

    Surveillance of severe acute respiratory infections using ICD-10 diagnosis codes and national electronic health records, Denmark, 2022 to 2024 by Lasse Skafte Vestergaard

    Published 2025-08-01
    “…Second, using this case definition, we evaluated the surveillance system’s timeliness and completeness by comparing weekly data reported with a delay of 1, 8, 15, 22 and 29 days, respectively, against a complete set of data extracted after 120 days. …”
    Get full text
    Article
  20. 960

    Are you a die-hard K-pop fan? Examining English Korean code mixing uttered by an American native speaker youtuber by Khadijah Khadijah, Emy Sudarwati

    Published 2022-02-01
    “…However, the data identified three specific reasons for code-mixing with Korean native speaker interlocutor, notably clarification of the speech content, interjection, and quotation of someone else. …”
    Get full text
    Article