Suggested Topics within your search.
Suggested Topics within your search.
-
441
Optimalisasi Presensi Sekolah Berbasis QR Code dengan Metode Rapid Application Development
Published 2025-07-01“…Through a series of trials and evaluations, this study aims to prove that the integration of RAD with QR Code technology can improve the effectiveness of attendance recording compared to conventional methods. …”
Get full text
Article -
442
Uplink and downlink performance analysis of a structured coded NOMA in Cognitive Radio Networks
Published 2025-07-01“…This study examines the uplink and downlink communication in a structured coded nonorthogonal multiple access (NOMA) in the context of cognitive radio networks (CRNs). …”
Get full text
Article -
443
Diagnostic and therapeutic role of non-coding RNAs regulating programmed cell death in melanoma
Published 2024-12-01“…They primarily consist of circular RNAs (circ RNAs), lncRNAs, and microRNAs (miRNAs). Moreover, non-coding RNAs have the ability to modulate tumor cell autophagy, pyroptosis, and ferroptosis at the transcriptional or post-transcriptional stage, as well as function as oncogenes and tumor suppressor genes, which can have considerable effects on the incidence and growth of tumors. …”
Get full text
Article -
444
Energy assessment of BIPV system in code-compliant residential building in cooling-dominated climates.
Published 2025-01-01“…This study investigates the effects of climate and geographical location on the building integrated photovoltaics (BIPV). …”
Get full text
Article -
445
A ‘NEW NORMAL’ OF CODE-SWITCHING: COVID-19, THE INDONESIAN MEDIA AND LANGUAGE CHANGE
Published 2021-06-01“…To study this phenomenon, we examine the lexical effects of COVID-19 on the Indonesian language, through analysis of two well-known Indonesian national newspapers – Kompas and Suara Pembaruan, for the month of May 2020. …”
Get full text
Article -
446
Reconstructing unreadable QR codes: a deep learning based super resolution strategy
Published 2025-04-01“…These findings show that super-resolution models can effectively improve the readability of degraded or low-resolution QR codes.…”
Get full text
Article -
447
A Super-Resolution-Based Feature Map Compression for Machine-Oriented Video Coding
Published 2023-01-01“…In this paper, we propose an effective feature compression method equipped with a super-resolution (SR) module for features. …”
Get full text
Article -
448
A Comparative Evaluation of Machine Learning Methods for Predicting Student Outcomes in Coding Courses
Published 2025-06-01“…We introduce a novel “Hybrid approach” that synthesizes students’ historical academic records and their in-class behavioral data, provided by instructors, to predict student performance in initial coding courses. Utilizing a range of machine learning (ML) algorithms, our research applies multi-classification, data augmentation, and binary classification techniques to evaluate student outcomes effectively. …”
Get full text
Article -
449
Reversible data hiding algorithm in encrypted images based on prediction error and bitplane coding
Published 2023-12-01“…With the increasing use of cloud backup methods for storing important files, the demand for privacy protection has also grown.Reversible data hiding in encrypted images (RDHEI) is an important technology in the field of information security that allows embedding secret information in encrypted images while ensuring error-free extraction of the secret information and lossless recovery of the original plaintext image.This technology not only enhances image security but also enables efficient transmission of sensitive information over networks.Its application in cloud environments for user privacy protection has attracted significant attention from researchers.A reversible data hiding method in encrypted images based on prediction error and bitplane coding was proposed to improve the embedding rate of existing RDHEI algorithms.Different encoding methods were employed by the algorithm depending on the distribution of the bitplanes, resulting in the creation of additional space in the image.The image was rearranged to allocate the freed-up space to the lower-order planes.Following this, a random matrix was generated using a key to encrypt the image, ensuring image security.Finally, the information was embedded into the reserved space.The information can be extracted and the image recovered by the receiver using different keys.The proposed algorithm achieves a higher embedding rate compared to five state-of-the-art RDHEI algorithms.The average embedding rates on BOWS-2, BOSSBase, and UCID datasets are 3.769 bit/pixel, 3.874 bit/pixel, and 3.148 bit/pixel respectively, which represent an improvement of 12.5%, 6.9% and 8.6% compared to the best-performing algorithms in the same category.Experimental results demonstrate that the proposed algorithm effectively utilizes the redundancy of images and significantly improves the embedding rate.…”
Get full text
Article -
450
Purifying selection in deeply conserved human enhancers is more consistent than in coding sequences.
Published 2014-01-01“…Comparison of polymorphism at synonymous and non-synonymous sites in protein-coding DNA can provide evidence for selective constraint. …”
Get full text
Article -
451
Achieving High Efficiency and High Throughput in Erasure Code-Based Distributed Storage for Blockchain
Published 2025-03-01“…Distributed storage techniques utilizing erasure code (EC) have been investigated to address this issue. …”
Get full text
Article -
452
On-Chip Low-Power Gray Code Generation Based on Opto-Mechanical Microring Resonators
Published 2020-01-01“…We propose and experimentally demonstrate on-chip energy-efficient Gray code generation based on a scalable and compact optical encoder. …”
Get full text
Article -
453
A deep learning‐based approach for software vulnerability detection using code metrics
Published 2022-10-01“…Abstract Vulnerabilities can have devastating effects on information security, affecting the economy, social stability, and national security. …”
Get full text
Article -
454
Joint use of frequency-time division and antinoise coding in radio communication systems with FHSS
Published 2021-08-01“…Dependence of the bit error probability on the signal-to-noise ratio is calculated for the joint use of frequency division of information subsymbols and noise combating codes. It is shown that due to effective use of the frequency-energy resource of a radio line, considering the use of correction codes, a quite high noise immunity of RCS under the influence of deliberate interference can be assured. …”
Get full text
Article -
455
Long non-coding RNA TMEM51-AS1 inhibits colorectal cancer progression
Published 2025-05-01“…Abstract Colorectal cancer (CRC) is the third most common cause of death worldwide and has high mortality and a poor prognosis. Long non-coding RNAs (lncRNAs) are non-coding RNAs longer than 200 nucleotides that play roles in cancer through multiple mechanisms. …”
Get full text
Article -
456
Aqua-MC as a simple open access code for uncountable runs of AquaCrop
Published 2025-07-01“…To demonstrate its effectiveness, Aqua-MC was applied to wheat yield modeling in Qazvin, Iran, where parameter uncertainty was assessed using 3000 Monte Carlo simulations. …”
Get full text
Article -
457
Nursing Students’ views on Code of Ethics, Commitment to the Ethic of, Academic Dishonesty and Neutralization behaviors
Published 2014-10-01“…Conclusion: Attitude toward nursing codes of ethics is the strongest predictor for commitment to ethic of caring therefore teaching students these codes can have an important role in providing ethical care to patients.…”
Get full text
Article -
458
Using Large Language Models for Aerospace Code Generation: Methods, Benchmarks, and Potential Values
Published 2025-05-01“…The research further demonstrates that Retrieval Augmented Generation (RAG) technology can effectively enhance LLMs’ code generation capabilities. …”
Get full text
Article -
459
Learning to Score: A Coding System for Constructed Response Items via Interactive Clustering
Published 2024-09-01“…The coded cluster and score pairs will be validated to ensure inter-rater reliability. …”
Get full text
Article -
460
ANALYSIS AND MINIMIZATION OF THE RISKS OF HARMFUL DEPENDENCIES IN THE PROCESS OF CONTINUOUS INTEGRATION AND IMPLEMENTATION OF SOFTWARE CODE
Published 2024-10-01“…Analyze dependency chain attacks and identify effective risk management methods to ensure high security of continuous integration and deployment processes to improve software development practices by identifying and eliminating potential vulnerabilities and stability issues, which provides safer and more reliable software delivery pipelines, reducing the likelihood of failures and disruptions in production environments. …”
Get full text
Article