Showing 261 - 280 results of 7,621 for search 'effect coding', query time: 0.14s Refine Results
  1. 261

    Droit romain et Code Noir. Quelques réflexions a posteriori by Frédéric Charlin

    Published 2021-06-01
    “…How do the administrators apprehend the slave’s legal status ? Does the Code noir follow local rules or Roman precedents to supervise practice, according to some expected effects on the settlers’s property ? …”
    Get full text
    Article
  2. 262

    A Multicast Algorithm for Wireless Sensor Networks Based on Network Coding by Zhi-jie Han, Ru-chuan Wang, Fu Xiao

    Published 2014-01-01
    “…We depart from the traditional wisdom that the multicast topology from source to receivers needs to be a tree and propose a novel and distributed algorithm to construct a 2-redundant multicast graph (a directed acyclic graph) as the multicast topology, on which network coding is applied. We conduct both analytical and simulation-based studies to evaluate the effectiveness and performance of our algorithm.…”
    Get full text
    Article
  3. 263

    FDR coding and decoding algorithm for reliable transmission in underwater acoustic network by Lijuan WANG, Xiujuan DU, Chong LI

    Published 2020-04-01
    “…By analyzing the shortcomings of RLT coding and decoding algorithm,a filtering dimension reduction (FDR) algorithm was proposed,which eliminated the waiting time of the traditional decoding algorithm and achieves fast decoding.In addition,XOR operation between encoded packages effectively increased the number of one-degree encoded packages,and improved decoding probability while reducing transmission delay.An optimized degree distribution function for FDR decoding algorithm was proposed,which increased the proportion of two-degree,three-degree and four-degree encoded packages,further increased the probability of one-degree packet,so that speeded up the decoding progress.Simulation results with NS3 show that the decoding success probability of FDR algorithms higher than RLT algorithm.…”
    Get full text
    Article
  4. 264
  5. 265

    Novel antenna selection algorithm for STBC and VBLAST hybrid coding systems by LI Ren, JIANG Yong-quan, LI Xiao-yan, ZHANG En-zhan

    Published 2009-01-01
    “…On the criterion of maximal antenna-subset capacity, the proposed antenna selection algorithm selects those antennas with less contribution to the system capacity to send multilayer STBC signals, so that the system capacity loss by STBC coding can be reduced. Both theoretical analysis and simulation results indicate that the proposed antenna selection algorithm increases the capacity of the STBC and VBLAST hybrid system effectively, and improves the BER remarkably comparing with a VBLAST encoding MIMO system.…”
    Get full text
    Article
  6. 266

    Homomorphic signature schemes for single-source and multi-source network coding by Huifang YU, Wen LI

    Published 2019-11-01
    “…To solve the problems of pollution attacks of single-source and multi-source network coding,two homomorphic signature schemes for network coding were proposed.In homomorphic signature for single-source network,the message hash value was signed on the elliptic curve,then the message,hash value and the signature of hash value were output,and the receiving node could verify the signature,the elliptic curve signature based on homomorphism could resist intra/inter-generation pollution attacks.Homomorphic signature from pairings for multi-source network coding could resist pollution attacks,and the introduction of timestamp made it be capable to resist replay attacks.In the random oracle model,it proves that two schemes are all secure under the selective attacks.Analysis shows that two schemes can effectively improve the verification efficiency.…”
    Get full text
    Article
  7. 267

    Research on Code-Division Multiple-Access of DS-SS/EBPSK Modulation by Peng Zhang, Lenan Wu

    Published 2015-01-01
    “…In order to realize multiple-access communication of direct sequence spread spectrum extended binary phase shift keying(DS-SS/EBPSK)modulation, a realization method based on code-division was researched. Firstly, based on the analysis of DS-SS/EBPSK modulation signal, the effective spread spectrum sequence which can be used for dispreading and code division multiple-access was obtained by formulizing the DS-SS/EBPSK modulation process. …”
    Get full text
    Article
  8. 268

    Teaching by Practice: Shaping Secure Coding Mentalities through Cybersecurity CTFs by Jazmin Collins, Vitaly Ford

    Published 2023-01-01
    “…We have found this system to be moderately effective at framing and improving the secure coding mentalities of our students.…”
    Get full text
    Article
  9. 269

    Achiral light-controlled coding metasurfaces with multi-channel electromagnetic control by Yuxi Li, Ruichao Zhu, Sai Sui, Yajuan Han, Aixia Wang, Yuxiang Jia, Shaojie Wang, Cunqian Feng, Shaobo Qu, Jiafu Wang

    Published 2025-04-01
    “…Programmable digital coding metasurfaces (PDCMs) can manipulate electromagnetic waves with high degrees of freedom, significantly enriching metasurface designs. …”
    Get full text
    Article
  10. 270

    Non-coding RNAs in intracerebral hemorrhage: Roles, mechanisms, and therapeutic implications by Shijie Mao, Shi Tang, Qi Wang, Ling Shen, Ying Bai

    Published 2025-08-01
    “…Non-coding RNAs (ncRNAs) have been shown to be promising biomarkers in numerous central nervous system (CNS) diseases. …”
    Get full text
    Article
  11. 271

    Layered HARQ Design for LDPC-Based Multi-Level Coded Modulation by Yuejun Wei, Yue Chen, Chunqi Chen, Bin Xia, Liandong Wang

    Published 2025-06-01
    “…Multi-level coded modulation (MLCM) enhances data transmission by allocating error correction more effectively to bits with higher error probabilities, thus optimizing redundancy and improving performance. …”
    Get full text
    Article
  12. 272

    Code-mixing between Arabic and English among Jordanians on social media by Asma Mohammad Hussein Aburqayiq, Abdel Rahman Mitib Altakhaineh, Anas Hashem Alsariera

    Published 2025-12-01
    “…The study recommends incorporating code-mixing awareness into educational programs and encourages further research to explore the long-term effects of code-mixing on language development.…”
    Get full text
    Article
  13. 273

    Algorithm for Image Retrieval Based on Edge Gradient Orientation Statistical Code by Jiexian Zeng, Yonggang Zhao, Weiye Li, Xiang Fu

    Published 2014-01-01
    “…Considering that the edge gradient direction histograms and edge direction autocorrelogram do not have the rotation invariance, we put forward the image retrieval algorithm which is based on edge gradient orientation statistical code (hereinafter referred to as EGOSC) by sharing the application of the statistics method in the edge direction of the chain code in eight neighborhoods to the statistics of the edge gradient direction. …”
    Get full text
    Article
  14. 274

    An Adaptive Diagnosis Method of Bearing Fault Based on EMD and Tile Coding by CHEN Xin'an, WANG Junping, ZHANG Huiyuan, SHEN Yunbo, KUANG Shi, ZHU Wenlong

    Published 2023-08-01
    “…Secondly, feature extraction of the filtered signal was conducted using spectral coding based on tile coding. The coding results were input into the K-nearest neighbors (KNN) classifier as features. …”
    Get full text
    Article
  15. 275

    Pronominal choice: Indonesian diglossic code-switching on the Kick Andy show by Stuart Mannix Foster, Alistair Welsh

    Published 2023-05-01
    “…Factors such as social standing, age, gender and cultural background influence pronominal choice but also reflect language alternation between standardised formal and informal Indonesian, a phenomenon known as diglossic code-switching. To study this, we examine the effects of pronominal choice by speakers on an episode of the popular Indonesian television talk show, Kick Andy. …”
    Get full text
    Article
  16. 276

    Structure-Enhanced Prompt Learning for Graph-Based Code Vulnerability Detection by Wei Chang, Chunyang Ye, Hui Zhou

    Published 2025-05-01
    “…Recent advances in prompt learning have opened new avenues for enhancing natural language understanding in domain-specific tasks, including code vulnerability detection. Motivated by the limitations of conventional binary classification methods in capturing complex code semantics, we propose a novel framework that integrates a two-stage prompt optimization mechanism with hierarchical representation learning. …”
    Get full text
    Article
  17. 277
  18. 278

    Detect Windows Code Injection by Cross-validating Stack and VAD Information by ZHAI Jiqiang, HAN Xu, WANG Jiaqian, SUN Haixu, YANG Hailu

    Published 2024-04-01
    “…The test results show that the method can effectively locate Windows 32/64 bit injected code attacks even if the VAD node is modified by malware.…”
    Get full text
    Article
  19. 279

    The role of long non-coding RNA NORAD in digestive system tumors by Yussel Pérez-Navarro, Yarely M. Salinas-Vera, Cesar López-Camarillo, Elisa Elvira Figueroa-Angulo, María Elizbeth Alvarez-Sánchez

    Published 2025-02-01
    “…Thus, the mechanisms underlying the effects of NORAD are complex and involve multiple signaling pathways. …”
    Get full text
    Article
  20. 280

    An Optical Multicast Routing with Minimal Network Coding Operations in WDM Networks by Huanlin Liu, Qinren Shen, Yong Chen

    Published 2014-01-01
    “…Comparing with the other multicast routing based on network coding, simulation results show that the proposed multicast routing algorithm can effectively reduce the times of network coding operations, can improve the probability of reaching multicast maximal capacity, and can keep the less multicast routing link cost for optical WDM networks.…”
    Get full text
    Article