-
1
Signal equalization and coding techniques in ultra-high-speed short-reach optical interconnect
Published 2025-04-01“…To meet the requirements of high rate, low power consumption, low latency, and high integration for ultra-high-speed short-reach optical interconnect, the development trend of the optical module industry was introduced, and relevant equalization and coding technologies were discussed. …”
Get full text
Article -
2
Spectral Efficiency Improved 2D-PAM8 Trellis Coded Modulation for Short Reach Optical System
Published 2017-01-01“…This paper proposes and demonstrates a 31.25 Gbps two-dimensional eight level pulse amplitude modulation with trellis coded modulation (2D-PAM8-TCM) transmission in intensity modulation and direct detection based short reach system. …”
Get full text
Article -
3
Precoded APPM Modulated Short Reach Optical System Based on Two-Dimensional Cyclic Iterative Coding
Published 2017-01-01“…This paper proposes and demonstrates a novel coded amplitude and pulse position modulation (APPM) scheme based on 2-D cyclic iterative coding (TDCIC) for short-reach optical systems. …”
Get full text
Article -
4
Neural geometry from mixed sensorimotor selectivity for predictive sensorimotor control
Published 2025-05-01Subjects: “…neural coding…”
Get full text
Article -
5
Limitless Borderless Forgetfulness? Limiting the Geographical Reach of the ‘Right to be Forgotten’
Published 2015-01-01Get full text
Article -
6
Yoked surface codes
Published 2025-05-01“…For two-dimensional architectures, the surface code has long been the leading candidate quantum memory, but can require upwards of a thousand physical qubits per logical qubit to reach algorithmically-relevant logical error rates. …”
Get full text
Article -
7
Examining the reach of a diabetes screening program in an urban emergency department
Published 2025-06-01“…This study aims to assess the reach of an ED-based screening program by examining the characteristics of patients screen-detected for diabetes or prediabetes. …”
Get full text
Article -
8
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
9
Was last will prescribed in The Code of Hammurabi?
Published 2017-01-01“…Bearing in mind that the very content of the Code of Hammurabi is a combination of existing customs in the area between Tigris and Euphrates and the innovating ambitions of the legislator, the absence of clear indications of the freedom of an individual to unilaterally regulate the future of his/her estate in the case of his/her death, indicates that the Babylonian law of the emperor Hammurabi had not yet reached the level of the necessary development for the affirmation of this legal transaction. …”
Get full text
Article -
10
Hand position fields of neurons in the premotor cortex of macaques during natural reaching
Published 2025-04-01“…Our findings suggest field-like positional coding may be a mechanism shared across brain regions for spatial representation in goal-directed movements, including body navigation and forelimb reaching.…”
Get full text
Article -
11
Reversible Data Hiding in Absolute Moment Block Truncation Codes via Arithmetical and Logical Differential Coding
Published 2024-12-01“…Experimental results show that our proposed scheme typically achieves an embedding rate exceeding 30%, surpassing the latest research by more than 2%. Our scheme reaches outstanding embedding rates while allowing the image to be perfectly restored to its original absolute moment block truncation coding form.…”
Get full text
Article -
12
A Physical-Layer Secure Coding Scheme for Indoor Visible Light Communication Based on Polar Codes
Published 2018-01-01“…Both the security and reliability of VLC are guaranteed by the proposed coding scheme. And the practical secrecy rate reaches <inline-formula><tex-math notation="LaTeX">$85.96\%$ </tex-math></inline-formula> at some positions when codeword length is <inline-formula><tex-math notation="LaTeX"> $2\,048$</tex-math></inline-formula> bits. …”
Get full text
Article -
13
Corporate Governance Code and Earnings Management
Published 2024-11-01“…Considering this issue and the new corporate governance code in the Iranian capital market, in this research, the impact of the new corporate governance code on accrual-based earnings management and real earnings management is investigated. …”
Get full text
Article -
14
Blind estimation of pseudo-random codes in non-periodic long code direct-sequence spread-spectrum signals
Published 2015-05-01“…The existence of common peaks in triple correlation functions of different m-sequences is proven based on the detail study of the characteristics of triple correlation functions of m-sequences,the features of common peaks and the direct relationship between common peak coordinates and the primitive polynomials of m-sequences are deduced.An es-timation algorithm of pseudo-random (PN) codes in non-periodic long code direct-sequence spread-spectrum (NPLC-DSSS) signals is proposed based on the above theories.Simulations under additive white Gaussian noise show that the probability of spreading code and scrambling code being both correctly estimated can reach 99% when the signal with a quarter of the cycle length of the long PN code is used only and the signal-to-noise ratio is greater than 4dB.…”
Get full text
Article -
15
A reach-integrated hydraulic modelling approach for large-scale and real-time inundation mapping
Published 2025-06-01Get full text
Article -
16
Adaptive channel decoding method for polar codes
Published 2022-09-01“…The polar code is a channel coding technology which can reach the Shannon limit in theory and has the advantage of low coding and decoding complexity. …”
Get full text
Article -
17
The Criminal Code of Mongolia. The General Part. Crime
Published 2024-09-01“…In a number of positions, the Criminal Code of Mongolia is recognized as more progressive than the Criminal Code of the Russian Federation. …”
Get full text
Article -
18
Uplink and downlink performance analysis of a structured coded NOMA in Cognitive Radio Networks
Published 2025-07-01“…This study examines the uplink and downlink communication in a structured coded nonorthogonal multiple access (NOMA) in the context of cognitive radio networks (CRNs). …”
Get full text
Article -
19
Low-Overhead Magic State Distillation with Color Codes
Published 2025-07-01“…Our second scheme achieves significantly lower infidelities (e.g., approximately 2×10^{−16} at p=10^{−3}), surpassing the capabilities of both cultivation and single-level distillation. Notably, to reach a given target infidelity, our schemes require approximately 2 orders of magnitude fewer resources than the previous best magic-state-distillation schemes for color codes.…”
Get full text
Article -
20
Building and coding (physical - skill) for advanced players with handball
Published 2020-11-01“…The SPSS statistical program was used to statistically process the data, and they concludedResearcher to build vehicle tests for some types of precision skill shooting hand reel four tests of their number, and the researcher recommends the use of the final composite tests reached …”
Get full text
Article