Showing 441 - 460 results of 7,621 for search 'effect coding', query time: 0.11s Refine Results
  1. 441

    Optimalisasi Presensi Sekolah Berbasis QR Code dengan Metode Rapid Application Development by Eva Rahmawati, Herlambang Brawijaya, Doni Andriansyah, Elly Mufida

    Published 2025-07-01
    “…Through a series of trials and evaluations, this study aims to prove that the integration of RAD with QR Code technology can improve the effectiveness of attendance recording compared to conventional methods. …”
    Get full text
    Article
  2. 442

    Uplink and downlink performance analysis of a structured coded NOMA in Cognitive Radio Networks by Wael Abd-Alaziz, Safaa N. Awny, Bilal A. Jebur

    Published 2025-07-01
    “…This study examines the uplink and downlink communication in a structured coded nonorthogonal multiple access (NOMA) in the context of cognitive radio networks (CRNs). …”
    Get full text
    Article
  3. 443

    Diagnostic and therapeutic role of non-coding RNAs regulating programmed cell death in melanoma by Zixu Wang, Cong Xie, Xiao Chen

    Published 2024-12-01
    “…They primarily consist of circular RNAs (circ RNAs), lncRNAs, and microRNAs (miRNAs). Moreover, non-coding RNAs have the ability to modulate tumor cell autophagy, pyroptosis, and ferroptosis at the transcriptional or post-transcriptional stage, as well as function as oncogenes and tumor suppressor genes, which can have considerable effects on the incidence and growth of tumors. …”
    Get full text
    Article
  4. 444

    Energy assessment of BIPV system in code-compliant residential building in cooling-dominated climates. by Saleh H Alyami, Noman Ashraf, Fahad M Alyami, Ali Alhamami

    Published 2025-01-01
    “…This study investigates the effects of climate and geographical location on the building integrated photovoltaics (BIPV). …”
    Get full text
    Article
  5. 445

    A ‘NEW NORMAL’ OF CODE-SWITCHING: COVID-19, THE INDONESIAN MEDIA AND LANGUAGE CHANGE by Stuart Mannix Foster, Alistair Welsh

    Published 2021-06-01
    “…To study this phenomenon, we examine the lexical effects of COVID-19 on the Indonesian language, through analysis of two well-known Indonesian national newspapers – Kompas and Suara Pembaruan, for the month of May 2020. …”
    Get full text
    Article
  6. 446

    Reconstructing unreadable QR codes: a deep learning based super resolution strategy by Yasin Sancar

    Published 2025-04-01
    “…These findings show that super-resolution models can effectively improve the readability of degraded or low-resolution QR codes.…”
    Get full text
    Article
  7. 447

    A Super-Resolution-Based Feature Map Compression for Machine-Oriented Video Coding by Jung-Heum Kang, Muhammad Salman Ali, Hye-Won Jeong, Chang-Kyun Choi, Younhee Kim, Se Yoon Jeong, Sung-Ho Bae, Hui Yong Kim

    Published 2023-01-01
    “…In this paper, we propose an effective feature compression method equipped with a super-resolution (SR) module for features. …”
    Get full text
    Article
  8. 448

    A Comparative Evaluation of Machine Learning Methods for Predicting Student Outcomes in Coding Courses by Zakaria Soufiane Hafdi, Said El Kafhali

    Published 2025-06-01
    “…We introduce a novel “Hybrid approach” that synthesizes students’ historical academic records and their in-class behavioral data, provided by instructors, to predict student performance in initial coding courses. Utilizing a range of machine learning (ML) algorithms, our research applies multi-classification, data augmentation, and binary classification techniques to evaluate student outcomes effectively. …”
    Get full text
    Article
  9. 449

    Reversible data hiding algorithm in encrypted images based on prediction error and bitplane coding by Haiyong WANG, Mengning JI

    Published 2023-12-01
    “…With the increasing use of cloud backup methods for storing important files, the demand for privacy protection has also grown.Reversible data hiding in encrypted images (RDHEI) is an important technology in the field of information security that allows embedding secret information in encrypted images while ensuring error-free extraction of the secret information and lossless recovery of the original plaintext image.This technology not only enhances image security but also enables efficient transmission of sensitive information over networks.Its application in cloud environments for user privacy protection has attracted significant attention from researchers.A reversible data hiding method in encrypted images based on prediction error and bitplane coding was proposed to improve the embedding rate of existing RDHEI algorithms.Different encoding methods were employed by the algorithm depending on the distribution of the bitplanes, resulting in the creation of additional space in the image.The image was rearranged to allocate the freed-up space to the lower-order planes.Following this, a random matrix was generated using a key to encrypt the image, ensuring image security.Finally, the information was embedded into the reserved space.The information can be extracted and the image recovered by the receiver using different keys.The proposed algorithm achieves a higher embedding rate compared to five state-of-the-art RDHEI algorithms.The average embedding rates on BOWS-2, BOSSBase, and UCID datasets are 3.769 bit/pixel, 3.874 bit/pixel, and 3.148 bit/pixel respectively, which represent an improvement of 12.5%, 6.9% and 8.6% compared to the best-performing algorithms in the same category.Experimental results demonstrate that the proposed algorithm effectively utilizes the redundancy of images and significantly improves the embedding rate.…”
    Get full text
    Article
  10. 450

    Purifying selection in deeply conserved human enhancers is more consistent than in coding sequences. by Dilrini R De Silva, Richard Nichols, Greg Elgar

    Published 2014-01-01
    “…Comparison of polymorphism at synonymous and non-synonymous sites in protein-coding DNA can provide evidence for selective constraint. …”
    Get full text
    Article
  11. 451

    Achieving High Efficiency and High Throughput in Erasure Code-Based Distributed Storage for Blockchain by So-Hyun Park, So-Yeon Kim, So-Hui Kim, Il-Gu Lee

    Published 2025-03-01
    “…Distributed storage techniques utilizing erasure code (EC) have been investigated to address this issue. …”
    Get full text
    Article
  12. 452

    On-Chip Low-Power Gray Code Generation Based on Opto-Mechanical Microring Resonators by Li Liu, Yue Yang, Jin Yue, Shasha Liao

    Published 2020-01-01
    “…We propose and experimentally demonstrate on-chip energy-efficient Gray code generation based on a scalable and compact optical encoder. …”
    Get full text
    Article
  13. 453

    A deep learning‐based approach for software vulnerability detection using code metrics by Fazli Subhan, Xiaoxue Wu, Lili Bo, Xiaobing Sun, Muhammad Rahman

    Published 2022-10-01
    “…Abstract Vulnerabilities can have devastating effects on information security, affecting the economy, social stability, and national security. …”
    Get full text
    Article
  14. 454

    Joint use of frequency-time division and antinoise coding in radio communication systems with FHSS by A. A. Paramonov, Van Zung Hoang

    Published 2021-08-01
    “…Dependence of the bit error probability on the signal-to-noise ratio is calculated for the joint use of frequency division of information subsymbols and noise combating codes. It is shown that due to effective use of the frequency-energy resource of a radio line, considering the use of correction codes, a quite high noise immunity of RCS under the influence of deliberate interference can be assured. …”
    Get full text
    Article
  15. 455

    Long non-coding RNA TMEM51-AS1 inhibits colorectal cancer progression by Dongping Wu, Qing Xia, Xinming Su, Yunan Mao, Jiwei Mao, Qiannan Ding, Jianjiang Liu, Wangyan Zhong, Xiaoyu Zhang, Hanbing Li, Shiwei Duan

    Published 2025-05-01
    “…Abstract Colorectal cancer (CRC) is the third most common cause of death worldwide and has high mortality and a poor prognosis. Long non-coding RNAs (lncRNAs) are non-coding RNAs longer than 200 nucleotides that play roles in cancer through multiple mechanisms. …”
    Get full text
    Article
  16. 456

    Aqua-MC as a simple open access code for uncountable runs of AquaCrop by Vahid Adabi, Hadi Ramezani Etedali, Asghar Azizian, Faraz Gorginpaveh, Ali Salem, Ahmed Elbeltagi

    Published 2025-07-01
    “…To demonstrate its effectiveness, Aqua-MC was applied to wheat yield modeling in Qazvin, Iran, where parameter uncertainty was assessed using 3000 Monte Carlo simulations. …”
    Get full text
    Article
  17. 457

    Nursing Students’ views on Code of Ethics, Commitment to the Ethic of, Academic Dishonesty and Neutralization behaviors by Nasrin Mokhtari Lakeh, Mehran Nafar, Atefe Ghanbari Khanghah, Ehsan Kazemnezhad Leili

    Published 2014-10-01
    “…Conclusion: Attitude toward nursing codes of ethics is the strongest predictor for commitment to ethic of caring therefore teaching students these codes can have an important role in providing ethical care to patients.…”
    Get full text
    Article
  18. 458

    Using Large Language Models for Aerospace Code Generation: Methods, Benchmarks, and Potential Values by Rui He, Liang Zhang, Mengyao Lyu, Liangqing Lyu, Changbin Xue

    Published 2025-05-01
    “…The research further demonstrates that Retrieval Augmented Generation (RAG) technology can effectively enhance LLMs’ code generation capabilities. …”
    Get full text
    Article
  19. 459

    Learning to Score: A Coding System for Constructed Response Items via Interactive Clustering by Lingjing Luo, Hang Yang, Zhiwu Li, Witold Pedrycz

    Published 2024-09-01
    “…The coded cluster and score pairs will be validated to ensure inter-rater reliability. …”
    Get full text
    Article
  20. 460

    ANALYSIS AND MINIMIZATION OF THE RISKS OF HARMFUL DEPENDENCIES IN THE PROCESS OF CONTINUOUS INTEGRATION AND IMPLEMENTATION OF SOFTWARE CODE by Danil N. Alekseev, Renat M. Khamitov

    Published 2024-10-01
    “…Analyze dependency chain attacks and identify effective risk management methods to ensure high security of continuous integration and deployment processes to improve software development practices by identifying and eliminating potential vulnerabilities and stability issues, which provides safer and more reliable software delivery pipelines, reducing the likelihood of failures and disruptions in production environments. …”
    Get full text
    Article