Suggested Topics within your search.
Suggested Topics within your search.
- Agriculture 1
- Artificial Intelligence 1
- Artificial intelligence 1
- Automobiles 1
- Data Mining and Knowledge Discovery 1
- Data mining 1
- Economic Policy 1
- Economic policy 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Environmental Economics 1
- Environmental economics 1
- Fault location (Engineering) 1
- Industrial Organization 1
- Industrial organization 1
- Maintenance and repair 1
- Soil Science & Conservation 1
- Soil conservation 1
- Soil science 1
- Sustainable Development 1
- Sustainable development 1
-
101
An Enhanced Approach for Reliable Bulk Data Transmission Based on Erasure-Resilient Codes in Wireless Sensor Networks
Published 2013-12-01“…This paper proposes an enhanced FEC scheme, called M-FEC, which reduces the overhead and the total number of transmissions. M-FEC fragments bulk data into many small blocks and these blocks are encoded using rateless codes. …”
Get full text
Article -
102
Stochastic Technique on Assigning Adaptive Minimal Code Bits to Locally Frequent Symbols in Continuous Data Stream
Published 2025-01-01Subjects: “…Lossless data compression…”
Get full text
Article -
103
Standardization of Journal Title Information from Interlibrary Loan Data: A Customized Python Code Approach
Published 2023-08-01“…This article introduces a solution utilizing customized Python code to standardize journal titles obtained from user-entered data. …”
Get full text
Article -
104
Integrating predictive coding and a user-centric interface for enhanced auditing and quality in cancer registry data
Published 2024-12-01“…By presenting key registry items along the timeline of a patient’s reports with accurate code predictions, the system improves the quality of registrar outcomes and reduces the labor resources and time required for data abstraction. …”
Get full text
Article -
105
The performance of the LSTM-based code generated by Large Language Models (LLMs) in forecasting time series data
Published 2024-12-01Subjects: Get full text
Article -
106
-
107
Real-Time Phase Tracking Scheme With Mismatched-Basis Data for Phase-Coding Quantum Key Distribution
Published 2020-01-01“…Phase drift is an inevitable problem in the practical implementation of phase-coding quantum key distribution (QKD) systems. Conventional active phase tracking and compensation solutions cannot be implemented during the key transmission process, resulting in reduced efficiency of the system. …”
Get full text
Article -
108
A quantization-coding scheme with variable data rates for cyber-physical systems under DoS attacks
Published 2024-12-01Subjects: Get full text
Article -
109
OmicShare tools: A zero‐code interactive online platform for biological data analysis and visualization
Published 2024-10-01Get full text
Article -
110
Network-Coding-Based Energy-Efficient Data Fusion and Transmission for Wireless Sensor Networks with Heterogeneous Receivers
Published 2014-03-01“…This paper proposes a multirate network coding scheme to improve the energy efficiency of wireless sensor networks (WSNs). …”
Get full text
Article -
111
Code multiplexing using linear block codes
Published 2025-01-01“…This paper explores the application of code multiplexing using linear block codes in communication systems. …”
Get full text
Article -
112
SmellyCode++: Multi-Label Dataset for Code Smell Detection
Published 2025-07-01“…Data cleaning, unification, and merging techniques were applied to support four code smells: God Class, Data Class, Feature Envy, and Long Method. …”
Get full text
Article -
113
A Reversible Compression Coding Method for 3D Property Volumes
Published 2025-07-01Subjects: Get full text
Article -
114
High-Throughput Variable-to-Fixed Entropy Codec Using Selective, Stochastic Code Forests
Published 2020-01-01Subjects: “…Data compression…”
Get full text
Article -
115
Implementation of Coding Theory with The Extended Hamming Code in Steganography
Published 2024-01-01“…In this article, we implement data security using a combination of coding theory and steganography. …”
Get full text
Article -
116
On the Properties of Algebraic Geometric Codes as Copy Protection Codes
Published 2020-03-01“…Traceability schemes which are applied to the broadcast encryption can prevent unauthorized parties from accessing the distributed data. In a traceability scheme a distributor broadcasts the encrypted data and gives each authorized user unique key and identifying word from selected error-correcting code for decrypting. …”
Get full text
Article -
117
Simulation of the burnup in cell calculation using the wimsd-5b code considering different nuclear data libraries
Published 2021-07-01“…The simulation of fuel burning in the cell calculation took into account different nuclear data libraries. The WIMSD-5B code supports several nuclear data libraries and in the present work the following libraries were used: IAEA, ENDFB-VII.1, JENDL3.2, JEFF3.1 and JEF2.2, all formatted for 69 energy groups.…”
Get full text
Article -
118
Biomedical Data Commons (BMDC) prioritizes B-lymphocyte non-coding genetic variants in Type 1 Diabetes.
Published 2021-09-01“…The repurposing of biomedical data is inhibited by its fragmented and multi-formatted nature that requires redundant investment of time and resources by data scientists. …”
Get full text
Article -
119
Development of a Thermal Infrared Network for Volcanic and Environmental Monitoring: Hardware Design and Data Analysis Software Code
Published 2025-07-01“…This work presents the comprehensive development of a thermal infrared monitoring network, detailing everything from the hardware schematics of the remote monitoring station (RMS) to the code for the final data processing software. The procedures implemented in the RMS for managing TIR sensor operations, acquiring environmental data, and transmitting data remotely are thoroughly discussed, along with the technical solutions adopted. …”
Get full text
Article -
120
Steganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images
Published 2017-06-01“…Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. …”
Get full text
Article