Showing 521 - 540 results of 2,827 for search 'making and coding', query time: 0.14s Refine Results
  1. 521

    SIZE EFFECT ON THE ULTIMATE DRYING SHRINKAGE OF CONCRETE - EXPERIMENTAL EVIDENCE AND ENGINEERING PRACTICE by Lenka Dohnalová, Petr Havlásek

    Published 2020-03-01
    “…Finally, this size effect is compared against the current codes of practice and recommendations.…”
    Get full text
    Article
  2. 522

    Improved segmented CRC assisted puncturing Polar decoding by Yanhong NI, Xiangxiong LOU, Jianrong BAO

    Published 2019-03-01
    “…A segmented cyclic redundancy check (CRC) assisted decoding algorithm was proposed.This method makes use of the high parallelism of BP decoding and the high reliability of CRC verification,and uniformly or proportionally disperses CRC verification bits into the original information bits.Simulation results show that when the code length N is 1 024 and the SNR is 3.5 dB,the average iterations of segmented CRC(2,16×2)and CRC (2,24+8) are 2.7 and 2.8 times less than those of G matrix based decoding.When the code length M is 896,the two segmented methods with a bit error rate of 10<sup>-5</sup>obtained about 0.7 dB gain compared with the non-CRC assisted BP puncturing decoding.…”
    Get full text
    Article
  3. 523

    Algebraic Linear Analysis for Number Theoretic Transform in Lattice-Based Cryptography by Chun-Ming Chiu, Jiaxiang Liu, Ming-Hsien Tsai, Xiaomu Shi, Bow-Yaw Wang, Bo-Yin Yang

    Published 2025-06-01
    “…We add semi-automatic range-check reasoning capability to the CryptoLine toolkit via the Integer Set Library (wrapped via the python package islpy) which makes it easier and faster to verify more arithmetic crypto code, including Barrett and Plantard finite-field arithmetic, and show experimentally that this is viable on production code. …”
    Get full text
    Article
  4. 524

    Waves of Pixels and Word-generated Algorithms: Drone Poetry as a Collaborative Practice between Machine and Human in Waveform by Richard A. Carter by Katarzyna Ostalska

    Published 2023-11-01
    “…Drone-generated poetry challenges a human-centered (literary) perspective, raising questions about AI’s creativity and code’s generative and aesthetic, and not only functional, potential. …”
    Get full text
    Article
  5. 525

    Documentation of individual-level social determinants of health among adults diagnosed with cancer in the United States by Chia-Yun Hsu, Gabriel Henderson, Julia F. Slejko, Arif Hussain, Richard Scott Swain, Bindu Kalesan, Pei-Lin Huang, Eberechukwu Onukwugha

    Published 2025-08-01
    “…Among 112 medical oncologists/hematologists who responded to a survey about SDOH Z codes, 54% had not heard of Z codes to document SDOH. 26% reported that lack of reimbursement makes it difficult to increase their documentation and 64% would consider using Z codes if they are tied to payer reimbursement. …”
    Get full text
    Article
  6. 526

    Software diversification method based on binary rewriting by Benwei HE, Yunfei GUO, Yawen WANG, Qingfeng WANG, Hongchao HU

    Published 2023-04-01
    “…Software diversity is an effective defense against code-reuse attacks, but most existing software diversification technologies are based on source code.Obtaining program source code may be difficult, while binary files are challenging to disassemble accurately and distinguish between code pointers and data constants.This makes binary file diversification difficult to generate high levels of randomization entropy, and easily compromised by attackers.To overcome these challenges, a binary file oriented software diversification method was proposed based on static binary rewriting technology, namely instruction offset randomization.This method inserted NOP instructions of varying byte lengths before program instructions with a certain probability, reducing the number of unintended gadgets in the program and randomly offsetting the original instruction address.This disrupts the program’s original memory layout and increases the cost of code-reuse attacks.At the same time, an optimization strategy based on hot code was designed for this method.The execution times of basic blocks in binary files were obtained by dynamic pile insertion, so as to adjust the NOP instruction insertion probability in each basic block.The higher the execution frequency, the fewer NOP instructions were inserted into the basic block, which can ensure lower performance overhead and produce higher randomization entropy.In the experimental part, the SPEC benchmark program was used to test the optimized method from the aspects of performance overhead, gadget survival rate and file size.The results show that a 15% insertion probability achieves the best effect, with an average gadget survival rate of less than 1.49%, increasing attackers’ difficulty in reusing the same gadget attack chain.Furthermore, only a 4.1% operation overhead and 7.7% space overhead are added, maintaining high levels of security.…”
    Get full text
    Article
  7. 527

    Determination of Local Site-Specific Spectra Using Probabilistic Seismic Hazard Analysis for Bitlis Province, Turkey by Ercan Işık, Mustafa Kutanis

    Published 2015-07-01
    “…The obtained results were compared with the spectral responses proposed for seismic evaluation and retrofit of the building structure in Turkish Earthquake Code, Section 2. At the end of this study, it is apprehended that the Code proposed earthquake response spectra are not sufficient for the performance evaluation of the existing structures and the current estimations show that the potential seismic hazard research of the Turkey is underestimated in the code.Therefore, site- specific design spectra for the region should be developed, which reflect the characteristics of local sites.   …”
    Get full text
    Article
  8. 528

    Digital rule-based compliance processes. The urban regeneration of ex-Corradini, Naples (IT) by Marina Rigillo, Sergio Russo Ermolli, Giuliano Galluccio

    Published 2021-12-01
    “…The application of BIM-based procedures in the early design process stage becomes an opportunity to develop a multi-scenario approach, which employs Code and Model Checking systems as ‘heuristic’ tools to support decisions and enhancing risk management in complex projects.…”
    Get full text
    Article
  9. 529
  10. 530

    Revisiting partition priming in judgement under uncertainty: replication and extension Registered Report of Fox and Rottenstreich (2003) by Kerou Ding, Gilad Feldman

    Published 2025-07-01
    “…Materials, data and code are available on at https://osf.io/g9czs/. This Registered Report has been officially endorsed by Peer Community in Registered Reports: https://doi.org/10.24072/pci.rr.100877.…”
    Get full text
    Article
  11. 531

    Challenges faced by cardiac patients prior to coronary artery bypass grafting: a qualitative study by Sajjad Ebrahimi, Tayebeh Hasan Tehrani, Azim Azizi, Hakimeh Vahedparast, Efat Sadeghian

    Published 2025-02-01
    “…Results A total of 575 initial codes were extracted from the interviews and categorized into 16 subcategories based on similarities and differences. …”
    Get full text
    Article
  12. 532

    Responsabilité sociale de l’entreprise et manipulation des salariés au travail : un éclairage institutionnaliste à partir d’une analyse de la littérature sur les codes de conduite... by Virgile Chassagnon, Benjamin Dubrion

    Published 2015-06-01
    “…The multiple crises of our social models have led scholars to wonder about the alternative ways of regulating capitalism and, in so doing, to make CSR a strong and useful research area – including in public opinion. …”
    Get full text
    Article
  13. 533

    Patient and Provider Perspectives on Cesarean Delivery Pain and Anesthesia Experiences: A Qualitative Study by Yunseo Linda Park, Briana Clifton, Rida Ashraf, Rose Barlow, Alexandra Anderson, Valeria Altamirano, Emily Miller, Mark Neuman, Grace Lim

    Published 2025-01-01
    “…Interview transcripts were independently coded by three coders and qualitatively analyzed for major themes until thematic saturation was achieved. …”
    Get full text
    Article
  14. 534

    QoS-Aware Link Adaptation for Beyond 5G Networks: A Deep Reinforcement Learning Approach by Ali Parsa, Neda Moghim, Sachin Shetty

    Published 2025-01-01
    “…QDRLLA learns from the environment and past observations to make informed decisions that go beyond conventional heuristic-based methods. …”
    Get full text
    Article
  15. 535
  16. 536
  17. 537
  18. 538

    Sporting and tourist activities: legal aspects by Katja Sontag, Frédérique Roux

    Published 2013-05-01
    “…The adoption of the sports code is an attempt to restore this situation to order.…”
    Get full text
    Article
  19. 539

    Reformation of Law Administration in Jean Domat‘s Masterworks by Alberto Iglesias Garzón

    Published 2011-12-01
    “…Aiming to the suppression of the judge´s discretionary legal practice and making him bounded to the sovereign´s law was a certain way to controlling the non-conformist members of the judiciary administration. …”
    Get full text
    Article
  20. 540

    Reformation of Law Administration in Jean Domat‘s Masterworks by Alberto Iglesias Garzón

    Published 2011-12-01
    “…Aiming to the suppression of the judge´s discretionary legal practice and making him bounded to the sovereign´s law was a certain way to controlling the non-conformist members of the judiciary administration. …”
    Get full text
    Article