Showing 101 - 120 results of 2,827 for search 'making and coding', query time: 0.08s Refine Results
  1. 101

    Algorithm for Image Retrieval Based on Edge Gradient Orientation Statistical Code by Jiexian Zeng, Yonggang Zhao, Weiye Li, Xiang Fu

    Published 2014-01-01
    “…Firstly, we construct the n-direction vector and make maximal summation restriction on EGOSC to make sure this algorithm is invariable for rotation effectively. …”
    Get full text
    Article
  2. 102

    Opening the AI Black Box: Distilling Machine-Learned Algorithms into Code by Eric J. Michaud, Isaac Liao, Vedang Lad, Ziming Liu, Anish Mudide, Chloe Loughridge, Zifan Carl Guo, Tara Rezaei Kheirkhah, Mateja Vukelić, Max Tegmark

    Published 2024-12-01
    “…As opposed to large language models, this program synthesis technique makes no use of (and is therefore not limited by) human training data such as algorithms and code from GitHub. …”
    Get full text
    Article
  3. 103

    Fast Adaptive CU Partition Decision Algorithm for VVC Intra Coding by Lina Si, Wendi Zhu, Qiuwen Zhang

    Published 2023-01-01
    “…However, when the CU selects the division type, it needs to traverse all possible division types and compute the Rate-distortion (RD) cost, which greatly enhances the coding complexity. Therefore, this paper designs a Joint Random Forest Classifier (JRFC) to make decisions on CU partition types, and proposes fast adaptive CU partition decision algorithm for VVC intra coding combined with our previous work. …”
    Get full text
    Article
  4. 104

    Fast and Safe Concrete Code Execution for Reinforcing Static Analysis and Verification by M. Belyaev, V. Itsykson

    Published 2015-12-01
    “…The problem of improving precision of static analysis and verification techniques for C is hard due to simplification assumptions these techniques make about the code model. We present a novel approach to improving precision by executing the code model in a controlled environment that captures program errors and contract violations in a memory and time efficient way. …”
    Get full text
    Article
  5. 105

    Protection of HEVC Video Delivery in Vehicular Networks with RaptorQ Codes by Pablo Piñol, Miguel Martínez-Rach, Otoniel López, Manuel Pérez Malumbres

    Published 2014-01-01
    “…A vast number of applications will arise that will make use of this connectivity. Some of them will be based on video streaming. …”
    Get full text
    Article
  6. 106
  7. 107

    The Requirement of Promulgation of Non-Legislative Acts in the 1983 Code of Canon Law by Ginter Dzierżon

    Published 2024-06-01
    “…In his opinion, the occurrence of such solutions in the canonical legal order calls for a revision of the definition of promulgation, which, in his opinion, was determined by the principle set out in the decretal law “leges instituuntur, cum promulgantur” (X.1.3.4) and the considerations of pre-code canonists referring to it. The author considers the definition of promulgation developed by Javer Otaduy to be adequate for the systemic solutions: “promulgation is the act of a competent authority by which it makes public a legal text addressed to a certain community”.…”
    Get full text
    Article
  8. 108

    Improved RLCE public key encryption scheme based on Polar codes by Zhe LI, Yiliang HAN, Yu LI

    Published 2020-10-01
    “…For PolarRLCE has no semantic security and be vulnerable to adaptively chosen ciphertext attacks.Based onrandom linear code encryptionscheme,the structure of the RLCE scheme and Polar code polarization propertieswere used to make the Polar code as underlying encoding scheme,and through the method of RLCEspad message padding,a kind of improved public key encryption scheme which considers semantic security and can resistant toadaptively chosen ciphertext attacks was proposed.The improved scheme transformed the public key matrix into a system matrix and reduces the storage space of the public key.Some pre-computation for private key are estimated to reduce the storage space of private key.Through analysis,this scheme does not change the structure of PolarRLCE scheme,which can resist structural attacks against hamming quasi-cyclic codes.At the 128 bit security level,compared with HermitianRLCE scheme,GRSRLCE scheme and GoppaMcEliece scheme,the public key size of this scheme decreased by 4%,46.5% and 47.9% respectively.…”
    Get full text
    Article
  9. 109

    The role of non-coding RNAs in the regulation of cell death pathways in melanoma by Yekta Metanat, Maria Sviridova, Bareq N. Al-Nuaimi, Fateme Janbazi, Mahtab Jalali, Nogol Ghalamkarpour, Elnaz Khodabandehloo, Ehsan Ahmadi

    Published 2025-06-01
    “…In recent years, non-coding RNAs (ncRNAs) have been acknowledged as master regulators of various biological processes, including PCD. …”
    Get full text
    Article
  10. 110

    Modification of Neutron Kinetic Code for Plate Type Fuel Nuclear Reactor by Salah Ud-Din Khan, Shahab Ud-Din Khan, Yang Zhifei

    Published 2013-01-01
    “…The purpose of the research is to make the code work for the hexagonal fuel assemblies with plate type fuel element.…”
    Get full text
    Article
  11. 111

    Semiautomatic Generation of Code Ontology Using ifcOWL in Compliance Checking by Yuchao Li, Qin Zhao, Yunhe Liu, Xinhong Hei, Zongjian Li

    Published 2021-01-01
    “…This method can ensure the completeness of the hierarchical relationship of the classes in code ontology with good scalability, which makes use of taxonomy in ifcOWL. …”
    Get full text
    Article
  12. 112

    Temporal resolution of spike coding in feedforward networks with signal convergence and divergence. by Zach Mobille, Usama Bin Sikandar, Simon Sponberg, Hannah Choi

    Published 2025-04-01
    “…Convergent and divergent structures in the networks that make up biological brains are found across many species and brain regions at various spatial scales. …”
    Get full text
    Article
  13. 113

    ‘It’s bawdier in Greek’: A.C. Swinburne’s Subversions of the Hellenic Code by Charlotte Ribeyrol

    Published 2013-09-01
    “…When Algernon Charles Swinburne was asked in 1872 to make a contribution to Théophile Gautier’s Tombeau, he impressed his French friends, including Hugo or Mallarmé, by sending no fewer than six poems, two in English, two in French, one in Latin and one in Greek. …”
    Get full text
    Article
  14. 114

    Coding for Young Learners: Enhancing Computational Thinking and Creativity in Elementary Education by Hilmiyah, Abd Muhith, Syamsul Bahri

    Published 2025-05-01
    “…It recommends developing innovative and sustainable learning strategies to make coding an integral part of the elementary education curriculum in Indonesia.…”
    Get full text
    Article
  15. 115
  16. 116

    Iterative Shaping of Error Patterns For Normal Syndrome Decoding of Iterative Codes by X. H. Ren, V. K. Kanapelka, V. Yu. Tsviatkou

    Published 2022-03-01
    “…In two-dimensional coding, sequence code is first transformed into a code matrix, and then the row and column check code are calculated. …”
    Get full text
    Article
  17. 117

    Low error floor LT coding algorithm for unequal error protection by Xin SONG, Shuyan NI, Zhe ZHANG, Yurong LIAO, Tuofeng LEI

    Published 2022-06-01
    “…Methods: This paper considers designing independent systematic UEP-LT codes for AWGN channels.A design method of check distribution matching this scheme is given,and a coding scheme characterized by segmentation is proposed.In this scheme,systematic nodes connected with information nodes one by one are designed to provide non-zero log-likelihood ratio (LLR) information from the channel.After that, there is a fixed number of check nodes,that is,the fixed segment.The check node of this segment is only connected to the important bit(MIB),and its purpose is to make the MIB the closest to the successful decoding state.The final part of the coding scheme is the rateless coding segment. …”
    Get full text
    Article
  18. 118

    Code Obfuscation: A Comprehensive Approach to Detection, Classification, and Ethical Challenges by Tomer Raitsis, Yossi Elgazari, Guy E. Toibin, Yotam Lurie, Shlomo Mark, Oded Margalit

    Published 2025-01-01
    “…Code obfuscation has become an essential practice in modern software development, designed to make source or machine code challenging for both humans and computers to comprehend. …”
    Get full text
    Article
  19. 119

    Recurrent predictive coding models for associative memory employing covariance learning. by Mufeng Tang, Tommaso Salvatori, Beren Millidge, Yuhang Song, Thomas Lukasiewicz, Rafal Bogacz

    Published 2023-04-01
    “…We further show that our models can be combined with hierarchical predictive coding networks to model the hippocampo-neocortical interactions. …”
    Get full text
    Article
  20. 120

    Refining Software Clustering: The Impact of Code Co-Changes on Architectural Reconstruction by Adelina Diana Stana, Ioana Sora

    Published 2025-01-01
    “…This makes their extraction independent of the programming language. …”
    Get full text
    Article