Showing 1 - 20 results of 928 for search 'coded reaching', query time: 0.09s Refine Results
  1. 1

    Signal equalization and coding techniques in ultra-high-speed short-reach optical interconnect by QIN Hao, YANG Chuanchuan, LAN Tianxiang, QIN Xin, ZHAO Yuping, CHEN Zhangyuan

    Published 2025-04-01
    “…To meet the requirements of high rate, low power consumption, low latency, and high integration for ultra-high-speed short-reach optical interconnect, the development trend of the optical module industry was introduced, and relevant equalization and coding technologies were discussed. …”
    Get full text
    Article
  2. 2

    Spectral Efficiency Improved 2D-PAM8 Trellis Coded Modulation for Short Reach Optical System by Yan Fu, Meihua Bi, Da Feng, Xin Miao, Hao He, Weisheng Hu

    Published 2017-01-01
    “…This paper proposes and demonstrates a 31.25 Gbps two-dimensional eight level pulse amplitude modulation with trellis coded modulation (2D-PAM8-TCM) transmission in intensity modulation and direct detection based short reach system. …”
    Get full text
    Article
  3. 3

    Precoded APPM Modulated Short Reach Optical System Based on Two-Dimensional Cyclic Iterative Coding by Bo Liu, Lijia Zhang, Xiangjun Xin

    Published 2017-01-01
    “…This paper proposes and demonstrates a novel coded amplitude and pulse position modulation (APPM) scheme based on 2-D cyclic iterative coding (TDCIC) for short-reach optical systems. …”
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Yoked surface codes by Craig Gidney, Michael Newman, Peter Brooks, Cody Jones

    Published 2025-05-01
    “…For two-dimensional architectures, the surface code has long been the leading candidate quantum memory, but can require upwards of a thousand physical qubits per logical qubit to reach algorithmically-relevant logical error rates. …”
    Get full text
    Article
  7. 7

    Examining the reach of a diabetes screening program in an urban emergency department by Ruth A. Pobee, Kirstie K. Danielson, Angela Kong, Yuval Eisenberg, Brian T. Layden, Janet Lin

    Published 2025-06-01
    “…This study aims to assess the reach of an ED-based screening program by examining the characteristics of patients screen-detected for diabetes or prediabetes. …”
    Get full text
    Article
  8. 8

    Hard-coded backdoor detection method based on semantic conflict by Anxiang HU, Da XIAO, Shichen GUO, Shengli LIU

    Published 2023-02-01
    “…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
    Get full text
    Article
  9. 9

    Was last will prescribed in The Code of Hammurabi? by Stanković Miloš

    Published 2017-01-01
    “…Bearing in mind that the very content of the Code of Hammurabi is a combination of existing customs in the area between Tigris and Euphrates and the innovating ambitions of the legislator, the absence of clear indications of the freedom of an individual to unilaterally regulate the future of his/her estate in the case of his/her death, indicates that the Babylonian law of the emperor Hammurabi had not yet reached the level of the necessary development for the affirmation of this legal transaction. …”
    Get full text
    Article
  10. 10

    Hand position fields of neurons in the premotor cortex of macaques during natural reaching by Sheng-Hao Cao, Xin-Yong Han, Zhi-Ping Zhao, Jian-Wen Gu, Tian-Zi Jiang, Shan Yu

    Published 2025-04-01
    “…Our findings suggest field-like positional coding may be a mechanism shared across brain regions for spatial representation in goal-directed movements, including body navigation and forelimb reaching.…”
    Get full text
    Article
  11. 11

    Reversible Data Hiding in Absolute Moment Block Truncation Codes via Arithmetical and Logical Differential Coding by Ching-Chun Chang, Yijie Lin, Jui-Chuan Liu, Chin-Chen Chang

    Published 2024-12-01
    “…Experimental results show that our proposed scheme typically achieves an embedding rate exceeding 30%, surpassing the latest research by more than 2%. Our scheme reaches outstanding embedding rates while allowing the image to be perfectly restored to its original absolute moment block truncation coding form.…”
    Get full text
    Article
  12. 12

    A Physical-Layer Secure Coding Scheme for Indoor Visible Light Communication Based on Polar Codes by Zhen Che, Junbin Fang, Zoe Lin Jiang, Jin Li, Shancheng Zhao, Yongchun Zhong, Zhe Chen

    Published 2018-01-01
    “…Both the security and reliability of VLC are guaranteed by the proposed coding scheme. And the practical secrecy rate reaches <inline-formula><tex-math notation="LaTeX">$85.96\%$ </tex-math></inline-formula> at some positions when codeword length is <inline-formula><tex-math notation="LaTeX"> $2\,048$</tex-math></inline-formula> bits. …”
    Get full text
    Article
  13. 13

    Corporate Governance Code and Earnings Management by Azam Valizadeh Iarijani, Reyhaneh Iranpour

    Published 2024-11-01
    “…Considering this issue and the new corporate governance code in the Iranian capital market, in this research, the impact of the new corporate governance code on accrual-based earnings management and real earnings management is investigated. …”
    Get full text
    Article
  14. 14

    Blind estimation of pseudo-random codes in non-periodic long code direct-sequence spread-spectrum signals by HAOZhi-jin Z, UXiao-wei G, HENLei S, HANYi Z

    Published 2015-05-01
    “…The existence of common peaks in triple correlation functions of different m-sequences is proven based on the detail study of the characteristics of triple correlation functions of m-sequences,the features of common peaks and the direct relationship between common peak coordinates and the primitive polynomials of m-sequences are deduced.An es-timation algorithm of pseudo-random (PN) codes in non-periodic long code direct-sequence spread-spectrum (NPLC-DSSS) signals is proposed based on the above theories.Simulations under additive white Gaussian noise show that the probability of spreading code and scrambling code being both correctly estimated can reach 99% when the signal with a quarter of the cycle length of the long PN code is used only and the signal-to-noise ratio is greater than 4dB.…”
    Get full text
    Article
  15. 15
  16. 16

    Adaptive channel decoding method for polar codes by YE Maolin, TAN Xiaoqing, XU Liqing, LÜ Shanxiang

    Published 2022-09-01
    “…The polar code is a channel coding technology which can reach the Shannon limit in theory and has the advantage of low coding and decoding complexity. …”
    Get full text
    Article
  17. 17

    The Criminal Code of Mongolia. The General Part. Crime by V. M. Stepashin

    Published 2024-09-01
    “…In a number of positions, the Criminal Code of Mongolia is recognized as more progressive than the Criminal Code of the Russian Federation. …”
    Get full text
    Article
  18. 18

    Uplink and downlink performance analysis of a structured coded NOMA in Cognitive Radio Networks by Wael Abd-Alaziz, Safaa N. Awny, Bilal A. Jebur

    Published 2025-07-01
    “…This study examines the uplink and downlink communication in a structured coded nonorthogonal multiple access (NOMA) in the context of cognitive radio networks (CRNs). …”
    Get full text
    Article
  19. 19

    Low-Overhead Magic State Distillation with Color Codes by Seok-Hyung Lee, Felix Thomsen, Nicholas Fazio, Benjamin J. Brown, Stephen D. Bartlett

    Published 2025-07-01
    “…Our second scheme achieves significantly lower infidelities (e.g., approximately 2×10^{−16} at p=10^{−3}), surpassing the capabilities of both cultivation and single-level distillation. Notably, to reach a given target infidelity, our schemes require approximately 2 orders of magnitude fewer resources than the previous best magic-state-distillation schemes for color codes.…”
    Get full text
    Article
  20. 20

    Building and coding (physical - skill) for advanced players with handball by Dr. Qahtan Fadhil Mohammed

    Published 2020-11-01
    “…The SPSS statistical program was used to statistically process the data, and they concludedResearcher to build vehicle tests for some types of precision skill shooting hand reel four tests of their number, and the researcher recommends the use of the final composite tests reached …”
    Get full text
    Article