Suggested Topics within your search.
Suggested Topics within your search.
-
521
SIZE EFFECT ON THE ULTIMATE DRYING SHRINKAGE OF CONCRETE - EXPERIMENTAL EVIDENCE AND ENGINEERING PRACTICE
Published 2020-03-01“…Finally, this size effect is compared against the current codes of practice and recommendations.…”
Get full text
Article -
522
Improved segmented CRC assisted puncturing Polar decoding
Published 2019-03-01“…A segmented cyclic redundancy check (CRC) assisted decoding algorithm was proposed.This method makes use of the high parallelism of BP decoding and the high reliability of CRC verification,and uniformly or proportionally disperses CRC verification bits into the original information bits.Simulation results show that when the code length N is 1 024 and the SNR is 3.5 dB,the average iterations of segmented CRC(2,16×2)and CRC (2,24+8) are 2.7 and 2.8 times less than those of G matrix based decoding.When the code length M is 896,the two segmented methods with a bit error rate of 10<sup>-5</sup>obtained about 0.7 dB gain compared with the non-CRC assisted BP puncturing decoding.…”
Get full text
Article -
523
Algebraic Linear Analysis for Number Theoretic Transform in Lattice-Based Cryptography
Published 2025-06-01“…We add semi-automatic range-check reasoning capability to the CryptoLine toolkit via the Integer Set Library (wrapped via the python package islpy) which makes it easier and faster to verify more arithmetic crypto code, including Barrett and Plantard finite-field arithmetic, and show experimentally that this is viable on production code. …”
Get full text
Article -
524
Waves of Pixels and Word-generated Algorithms: Drone Poetry as a Collaborative Practice between Machine and Human in Waveform by Richard A. Carter
Published 2023-11-01“…Drone-generated poetry challenges a human-centered (literary) perspective, raising questions about AI’s creativity and code’s generative and aesthetic, and not only functional, potential. …”
Get full text
Article -
525
Documentation of individual-level social determinants of health among adults diagnosed with cancer in the United States
Published 2025-08-01“…Among 112 medical oncologists/hematologists who responded to a survey about SDOH Z codes, 54% had not heard of Z codes to document SDOH. 26% reported that lack of reimbursement makes it difficult to increase their documentation and 64% would consider using Z codes if they are tied to payer reimbursement. …”
Get full text
Article -
526
Software diversification method based on binary rewriting
Published 2023-04-01“…Software diversity is an effective defense against code-reuse attacks, but most existing software diversification technologies are based on source code.Obtaining program source code may be difficult, while binary files are challenging to disassemble accurately and distinguish between code pointers and data constants.This makes binary file diversification difficult to generate high levels of randomization entropy, and easily compromised by attackers.To overcome these challenges, a binary file oriented software diversification method was proposed based on static binary rewriting technology, namely instruction offset randomization.This method inserted NOP instructions of varying byte lengths before program instructions with a certain probability, reducing the number of unintended gadgets in the program and randomly offsetting the original instruction address.This disrupts the program’s original memory layout and increases the cost of code-reuse attacks.At the same time, an optimization strategy based on hot code was designed for this method.The execution times of basic blocks in binary files were obtained by dynamic pile insertion, so as to adjust the NOP instruction insertion probability in each basic block.The higher the execution frequency, the fewer NOP instructions were inserted into the basic block, which can ensure lower performance overhead and produce higher randomization entropy.In the experimental part, the SPEC benchmark program was used to test the optimized method from the aspects of performance overhead, gadget survival rate and file size.The results show that a 15% insertion probability achieves the best effect, with an average gadget survival rate of less than 1.49%, increasing attackers’ difficulty in reusing the same gadget attack chain.Furthermore, only a 4.1% operation overhead and 7.7% space overhead are added, maintaining high levels of security.…”
Get full text
Article -
527
Determination of Local Site-Specific Spectra Using Probabilistic Seismic Hazard Analysis for Bitlis Province, Turkey
Published 2015-07-01“…The obtained results were compared with the spectral responses proposed for seismic evaluation and retrofit of the building structure in Turkish Earthquake Code, Section 2. At the end of this study, it is apprehended that the Code proposed earthquake response spectra are not sufficient for the performance evaluation of the existing structures and the current estimations show that the potential seismic hazard research of the Turkey is underestimated in the code.Therefore, site- specific design spectra for the region should be developed, which reflect the characteristics of local sites. …”
Get full text
Article -
528
Digital rule-based compliance processes. The urban regeneration of ex-Corradini, Naples (IT)
Published 2021-12-01“…The application of BIM-based procedures in the early design process stage becomes an opportunity to develop a multi-scenario approach, which employs Code and Model Checking systems as ‘heuristic’ tools to support decisions and enhancing risk management in complex projects.…”
Get full text
Article -
529
Design a knowledge-based governance model in executive organizations
Published 2024-06-01Get full text
Article -
530
Revisiting partition priming in judgement under uncertainty: replication and extension Registered Report of Fox and Rottenstreich (2003)
Published 2025-07-01“…Materials, data and code are available on at https://osf.io/g9czs/. This Registered Report has been officially endorsed by Peer Community in Registered Reports: https://doi.org/10.24072/pci.rr.100877.…”
Get full text
Article -
531
Challenges faced by cardiac patients prior to coronary artery bypass grafting: a qualitative study
Published 2025-02-01“…Results A total of 575 initial codes were extracted from the interviews and categorized into 16 subcategories based on similarities and differences. …”
Get full text
Article -
532
Responsabilité sociale de l’entreprise et manipulation des salariés au travail : un éclairage institutionnaliste à partir d’une analyse de la littérature sur les codes de conduite...
Published 2015-06-01“…The multiple crises of our social models have led scholars to wonder about the alternative ways of regulating capitalism and, in so doing, to make CSR a strong and useful research area – including in public opinion. …”
Get full text
Article -
533
Patient and Provider Perspectives on Cesarean Delivery Pain and Anesthesia Experiences: A Qualitative Study
Published 2025-01-01“…Interview transcripts were independently coded by three coders and qualitatively analyzed for major themes until thematic saturation was achieved. …”
Get full text
Article -
534
QoS-Aware Link Adaptation for Beyond 5G Networks: A Deep Reinforcement Learning Approach
Published 2025-01-01“…QDRLLA learns from the environment and past observations to make informed decisions that go beyond conventional heuristic-based methods. …”
Get full text
Article -
535
Los códigos de buen gobierno corporativo en las entidades sin ánimo de lucro: en especial en las fundaciones (Codes of good corporate governance in non-profit organizations: especi...
Published 2011-10-01“…This necessity makes clear especially in Organizations with partnership public-private. …”
Get full text
Article -
536
Codification of International Criminal Law: A Political-Legal Analysis
Published 2021-10-01Get full text
Article -
537
-
538
Sporting and tourist activities: legal aspects
Published 2013-05-01“…The adoption of the sports code is an attempt to restore this situation to order.…”
Get full text
Article -
539
Reformation of Law Administration in Jean Domat‘s Masterworks
Published 2011-12-01“…Aiming to the suppression of the judge´s discretionary legal practice and making him bounded to the sovereign´s law was a certain way to controlling the non-conformist members of the judiciary administration. …”
Get full text
Article -
540
Reformation of Law Administration in Jean Domat‘s Masterworks
Published 2011-12-01“…Aiming to the suppression of the judge´s discretionary legal practice and making him bounded to the sovereign´s law was a certain way to controlling the non-conformist members of the judiciary administration. …”
Get full text
Article