Showing 281 - 300 results of 7,621 for search 'effect coding', query time: 0.14s Refine Results
  1. 281

    Non-coding RNAs participate in interactions between senescence and gastrointestinal cancers by Zhao-Zhe Liu, Fa-He Ji, Ying Piao

    Published 2025-01-01
    “…The currently accepted theory suggests that cellular senescence and cancer occurrence exhibit “double-edged sword” effects. Cellular senescence is related to cancer via four “meta-hallmarks” i.e., genomic instability, epigenetic alterations, chronic inflammation, and dysbiosis, along with two “antagonistic hallmarks” i.e., telomere attrition and stem cell exhaustion. …”
    Get full text
    Article
  2. 282

    Creating Entangled Logical Qubits in the Heavy-Hex Lattice with Topological Codes by Bence Hetényi, James R. Wootton

    Published 2024-12-01
    “…Instead, in order to emulate the denser connectivity required to implement well-known quantum error-correcting codes, many qubits remain effectively unused. In this work, we show how this bug can be turned into a feature. …”
    Get full text
    Article
  3. 283

    A Systematic Survey on Large Language Models for Static Code Analysis by Hekar A. Mohammed Salih, Qusay I. Alsarhan

    Published 2025-06-01
    “…Thus, it opens the doors for developers and researchers to employ LLMs for affordable and effective static code analysis to improve software development process. …”
    Get full text
    Article
  4. 284

    Evaluating Python Static Code Analysis Tools Using FAIR Principles by Hassan Bapeer Hassan, Qusay Idrees Sarhan, Arpad Beszedes

    Published 2024-01-01
    “…The quality of modern software relies heavily on the effective use of static code analysis tools. To improve their usefulness, these tools should be evaluated using a framework that prioritizes collaboration, user-friendliness, and long-term sustainability. …”
    Get full text
    Article
  5. 285

    PROPERTIES OF GROUPS G OF DOUBLE ERRORS AND ITS INVARIANTS IN BCH CODES by V. A. Lipnitskij, A. V. Serada

    Published 2018-08-01
    “…The effectiveness of such approach was demonstrated by norm of syndrome theory that was developed by Belarusian school of noiseless coding at the turn of the XX and XXI century. …”
    Get full text
    Article
  6. 286

    Side information-driven image coding for hybrid machine–human vision by Zhongpeng Zhang, Ying Liu, Wen-Hsiao Peng

    Published 2025-01-01
    “…We propose a side information-driven image coding for hybrid machine–human vision (SICMH) framework, not only for machine vision tasks, but also for human vision-oriented image reconstruction. …”
    Get full text
    Article
  7. 287
  8. 288

    Hybrid Window Decoding for Joint Source Channel Anytime Coding System by Li Deng, Zhiping Shi, Yixin Wang, Xiaoxi Yu, Yong Liang Guan, Zhiping Xu

    Published 2024-11-01
    “…Joint source channel anytime coding (JSCAC) is a kind of joint source channel coding (JSCC) systems based on the causal spatially coupled coding and joint expanding window decoding (JEWD) techniques. …”
    Get full text
    Article
  9. 289

    Malicious code within model detection method based on model similarity by Degang WANG, Yi SUN, Chuanxin ZHOU, Qi GAO, Fan YANG

    Published 2023-08-01
    “…The privacy of user data in federated learning is mainly protected by exchanging model parameters instead of source data.However, federated learning still encounters many security challenges.Extensive research has been conducted to enhance model privacy and detect malicious model attacks.Nevertheless, the issue of risk-spreading through malicious code propagation during the frequent exchange of model data in the federated learning process has received limited attention.To address this issue, a method for detecting malicious code within models, based on model similarity, was proposed.By analyzing the iterative process of local and global models in federated learning, a model distance calculation method was introduced to quantify the similarity between models.Subsequently, the presence of a model carrying malicious code is detected based on the similarity between client models.Experimental results demonstrate the effectiveness of the proposed detection method.For a 178MB model containing 0.375MB embedded malicious code in a training set that is independent and identically distributed, the detection method achieves a true rate of 82.9% and a false positive rate of 1.8%.With 0.75MB of malicious code embedded in the model, the detection method achieves a true rate of 96.6% and a false positive rate of 0.38%.In the case of a non-independent and non-identically distributed training set, the accuracy of the detection method improves as the rate of malicious code embedding and the number of federated learning training rounds increase.Even when the malicious code is encrypted, the accuracy of the proposed detection method still achieves over 90%.In a multi-attacker scenario, the detection method maintains an accuracy of approximately 90% regardless of whether the number of attackers is known or unknown.…”
    Get full text
    Article
  10. 290

    Refining Software Clustering: The Impact of Code Co-Changes on Architectural Reconstruction by Adelina Diana Stana, Ioana Sora

    Published 2025-01-01
    “…These code co-changes can be analyzed and filtered to uncover logical dependencies, which complement structural or lexical dependencies. …”
    Get full text
    Article
  11. 291

    Convolutional sparse coding network for sparse seismic time-frequency representation by Qiansheng Wei, Zishuai Li, Haonan Feng, Yueying Jiang, Yang Yang, Zhiguo Wang

    Published 2025-06-01
    “…To address this issue, we propose an interpretable convolutional sparse coding (CSC) network to achieve high TF resolution. …”
    Get full text
    Article
  12. 292

    Three-Dimensional Adaptive Modulation and Coding for DDO-OFDM Transmission System by Xi Chen, Zhenhua Feng, Ming Tang, Borui Li, Huibin Zhou, Songnian Fu, Deming Liu

    Published 2017-01-01
    “…To evaluate the performance of the proposed algorithm, we tailor the system parameters of direct detection optical OFDM (DDO-OFDM) to investigate the difference of effective data rate (EDR) between fixed schemes and proposed adaptive modulation and coding (AMC) schemes. …”
    Get full text
    Article
  13. 293

    Non-Coding RNAs in Diagnostic Pathology of High-Grade Central Osteosarcoma by Albert Roessner, Sabine Franke, Julian Schreier, Sarah R. Ullmann, Franziska S. Karras

    Published 2025-05-01
    “…Adjunct immunohistochemical approaches have demonstrated significant effectiveness in regard to cancer diagnostics, generally. …”
    Get full text
    Article
  14. 294

    Roles of Non-Coding RNA in Anthracycline Cardiotoxicity: A Narrative Review by Xiao S, Li Y, Li B, Wang H, Wang K, Yang S

    Published 2025-07-01
    “…This review encapsulates the recent advancements in the field of non-coding RNA research in AIC, highlighting the prospect of non-coding RNAs as potential biomarkers and therapeutic targets for the condition. …”
    Get full text
    Article
  15. 295

    Short-Block Polar-Coded Reverse and Direct Reconciliation in CV-QKD by Dingzhao Wang, Xin Liu, Chao Xu, Soon Xin Ng, Lajos Hanzo

    Published 2025-01-01
    “…Simulation results validate the effectiveness of our approach, demonstrating that Polar codes consistently outperform LDPC codes in quantum transmission scenarios having short block lengths under 512 bits. …”
    Get full text
    Article
  16. 296

    Sparse coding-based multiframe superresolution for efficient synchrotron radiation microspectroscopy by Yasuhiko Igarashi, Naoka Nagamura, Masahiro Sekine, Hirokazu Fukidome, Hideitsu Hino, Masato Okada

    Published 2025-07-01
    “…This study presents a multiframe superresolution method using sparse coding to enhance synchrotron radiation microspectroscopy images. …”
    Get full text
    Article
  17. 297

    Cultural Codes of Society: Scientific and Practical Significance in Modern African Studies by MOSEIKO Aida Nikolaevna

    Published 2021-12-01
    “…The relevance of the topic of cultural codes is considered in two aspects: from the point of view of contribution to the scientific development of the problems of cultural codes as an interdisciplinary problem and from the point of view of solving the practical task of increasing the effectiveness of the system of Russian-African relations based on mutual understanding and mutual respect of partners. …”
    Get full text
    Article
  18. 298

    The Necessity of Using MRI as an Imaging Modality in Acute Code Stroke in Indonesia by Hidayat R, Fisher M, Rima SPP, Wiyarta E, Fathi GC, Mustika AP, Irfannadhira AC, Pangeran D, Mesiano T, Kurniawan M, Rasyid A, Harris S

    Published 2025-04-01
    “…Positive outcomes in thrombolysis patients using this protocol highlight its effectiveness. However, prolonged time-to-MRI indicates the need for further improvement. …”
    Get full text
    Article
  19. 299
  20. 300

    Research on differential Pattern time delay shift coding underwater acoustic communication by Jing-wei YIN, Xiao ZHANG, Xue-li SHENG, Chao SUN

    Published 2012-06-01
    “…A differential Pattern time delay shift coding(DPDS)method with a non-fixed code width based on the traditional Pattern time delay shift coding was proposed.The information is carried by the time delay between adjacent code element,the different linear frequency modulation(LFM)signal is used for adjacent code division.The DPDS system has an ability anti inter-symbol interference(ISI)and the Doppler effects.The computer simulation and lake tests prove that the DPDS system can improve the communication rate,inhibit the ISI caused by the multi-path channel and anti the Doppler effects.It is proved that the system has an effectiveness and robustness.…”
    Get full text
    Article