Showing 481 - 500 results of 7,621 for search 'effect coding', query time: 0.14s Refine Results
  1. 481

    5G Indoor/Outdoor Field Trial of Deep Joint Source-Channel Coding Method by Daisuke Hisano, Keigo Matsumoto, Yoshiaki Inoue, Yuko Hara, Kazuki Maruta, Yu Nakayama, Hiroshi Tatsukawa, Yuji Kawai, Yoshinori Shinohara, Hiroki Ikeda

    Published 2025-01-01
    “…This paper presents the first outdoor field trials of deep joint source-channel coding (DeepJSCC) for image transmission over a 5G system. …”
    Get full text
    Article
  2. 482

    QR Code Based Scrapbook Learning Media to Improve Class IV Student Learning Outcomes by Dewa Gede Rai Mahendra, I Gusti Ayu Tri Agustiana

    Published 2024-08-01
    “…Based on this, research was carried out which aimed to analyze the effectiveness of QR code-based scrapbook learning media to improve the learning outcomes of class IV students. …”
    Get full text
    Article
  3. 483

    THE USE OF CODING-BASED LEARNING MATERIAL (CBLM) IN PROMOTING CRITICAL READING SKILS: CHALLENGES AND BENEFITS by Yuyun Ilantri, Sri Setyarini, Siti Rojab Rodliyah

    Published 2025-01-01
    “…The study aims to investigate the effectiveness of Coding-Based Learning Material (CBLM) using Scratch 3.0 in enhancing critical reading skills in a General English Program at a university language center in Bandung. …”
    Get full text
    Article
  4. 484

    A Modified Horse Herd Optimization Algorithm and Its Application in the Program Source Code Clustering by Bahman Arasteh, Peri Gunes, Asgarali Bouyer, Farhad Soleimanian Gharehchopogh, Hamed Alipour Banaei, Reza Ghanbarzadeh

    Published 2023-01-01
    “…Generating a structural model based on the program source code is an effective way of reducing overall software maintenance costs. …”
    Get full text
    Article
  5. 485

    Improving efficiency in hospital pharmacy systems: the case for color-coded zones for rapidly dispensed medications by Ammar Abdulrahman Jairoun, Sabaa Saleh Al-Hemyari, Moyad Shahwan, Faris El-Dahiyat, Abeer M. Al-Ghananeem

    Published 2025-12-01
    “…This evidence-based system will go a long way in helping hospitals meet the ever-increasing demands. While colour-coded zoning schemes offer a practical and cost-effective way to enhance pharmacy efficiency and medication safety, their effectiveness depends on careful implementation, standardisation, and integration with digital tools. …”
    Get full text
    Article
  6. 486

    Tomography Method of Cemented Sand Based on Constant Gradient Coded 1D T2 Spectrum by WU Turong, CHEN Jinding, ZHANG Qun, ZHAO Xichun, GUO Minling, CHENG Fanggui

    Published 2024-04-01
    “…The traditional T2 method (frequency coding/phase coding) without gradient field is in low efficiency. …”
    Get full text
    Article
  7. 487

    Implementation of a Web-Based Waste Collection Data System Using QR Code Scanning by Ibrahim Aji Fajar Romadhon, Arif Nur Rohman, Yoga Pristyanto

    Published 2025-01-01
    “…Various initiatives have been implemented to improve waste management, yet challenges persist, such as limited temporary disposal sites, irregular waste collection schedules, and the absence of an effective and efficient system to assist waste collection officers in recording and tracking waste collection for each household.This study aims to develop a web-based Waste Collection Data System using QR Code Scanning, employing the waterfall method, which consists of the following stages: requirement analysis, design, development, testing, and maintenance. …”
    Get full text
    Article
  8. 488
  9. 489

    Generation of particle self-shielded neutron cross-sections for the Monte-Carlo code TRIPOLI-4® by Noguere Gilles, Leconte Pierre, Bernard David, Pottier Mathilde, Paradela Carlos, Kopecky Stefan, Schillebeeckx Peter

    Published 2024-01-01
    “…Self-shielding effects of micrometric particles randomly distributed in nuclear materials were the subject of extensive studies. …”
    Get full text
    Article
  10. 490

    Vagus nerve stimulation as a predictive coding modulator that enhances feedforward over feedback transmission by Shinichi Kumagai, Shinichi Kumagai, Tomoyo Isoguchi Shiramatsu, Kensuke Kawai, Hirokazu Takahashi

    Published 2025-04-01
    “…Here, we present a novel theoretical framework based on predictive coding that conceptualizes VNS effects through differential modulation of feedforward and feedback neural circuits. …”
    Get full text
    Article
  11. 491

    Q-Pandora Unboxed: Characterizing Resilience of Quantum Error Correction Codes Under Biased Noise by Avimita Chatterjee, Subrata Das, Swaroop Ghosh

    Published 2025-04-01
    “…They exceed the noise threshold of current quantum processors, making them more effective at lower error rates. This study highlights a hierarchy in surface code implementation based on resource demand, consistently observed across both code types. …”
    Get full text
    Article
  12. 492

    The development of advanced network simulators for air transport by using fuzzy models and noise-resistant coding by A. A. Gladkih, L. G. Bolshedvorskaya, An. K. Volkov, Al. K. Volkov

    Published 2019-12-01
    “…The actual problem of choosing an effective concept of noise-resistant coding in the telecommunication component of advanced training complexes is substantiated. …”
    Get full text
    Article
  13. 493

    ANALYTICAL MODEL OF NOISE STABILITY CALCULATION OF SYSTEMS WITH MULTIPOSITIONAL MODULATION AND CODING BY REED-SOLOMON ALGORITHM by E. B. Lipkovich, V. A. Kovshik, A. A. Serchenya

    Published 2020-03-01
    “…The aim of this article is to create analytical models that estimate the continuity and effectiveness of digital radio communication systems using multipositional types of modulation (CAM-M, PM-M, FM-M, AM-M) and block coding according to the Reed–Solomon algorithm (RS) with hard decoding. …”
    Get full text
    Article
  14. 494
  15. 495

    Quantum dialogue protocol based on self-dual quantum low density parity check codes by Fen LIU, Zhenxing HE, Pengao XU, Hongyang MA

    Published 2020-08-01
    “…In quantum channels,particles are usually affected by noise during transmission.A quantum dialogue protocol based on self-dual quantum low density parity check codes was proposed to resist noise attacks.A combination of B construction method and U construction method was used to construct a self-dual quantum low density parity check matrix.The proposed quantum dialogue protocol can resist common external attacks,and there was no information leakage,which improved the efficiency of encoding and decoding.The security of quantum dialogue protocol was studied from the perspective of error correction.Security analysis shows that the protocol has sufficient security and can effectively resist common malicious attacks.…”
    Get full text
    Article
  16. 496

    Binary phase-coded radar waveform optimization based on improved hybrid quantum genetic algorithm by Yu ZHANG, Jing ZHAO, Yanguo JIA, Xiumin SHEN

    Published 2024-01-01
    “…To overcome the problem of single search focus and limited application scope of existing algorithm, a binary phase-coded radar waveform optimization (RWO) based on improved hybrid quantum genetic algorithm (IHQGA) was proposed.IHQGA adopted a novel self-adaptive rotation angle strategy, which dynamically adjusted the rotation angle based on evolutionary process and cosine similarity.The convergence speed, global search capability, and solution quality were improved.Simulation results demonstrate that compared with genetic algorithms, basic quantum genetic algorithms, and hybrid quantum genetic algorithms, IHQGA performs better in terms of solution quality and resource consumption for six benchmark functions that include single-peak, multi-peak, and non-convex optimization problems.Additionally, for binary phase-coded RWO, which verifies the feasibility and effectiveness of IHQGA in WO.…”
    Get full text
    Article
  17. 497
  18. 498

    Rules of Engagement as an Example of a Security Protocol Constituting a “Code of Conduct” in Military Operations by Marcin Marcinko

    Published 2024-12-01
    “…Primarily, they empower commanders to oversee military operations effectively while providing soldiers with clear directives for conduct on the battlefield. …”
    Get full text
    Article
  19. 499

    Rules of Engagement as an Example of a Security Protocol Constituting a “Code of Conduct” in Military Operations by Marcin Marcinko

    Published 2024-12-01
    “…Primarily, they empower commanders to oversee military operations effectively while providing soldiers with clear directives for conduct on the battlefield. …”
    Get full text
    Article
  20. 500

    Sliding Mode Control of Uncertain Switched Systems via Length-Limited Coding Dynamic Quantization by Qinqi Xu, Haijuan Zhao

    Published 2024-11-01
    “…Using Lyapunov functions and the average dwell time method, sufficient conditions are derived to guarantee the reachability of the sliding surface and the exponential ultimate bound (EUB) in the mean square for the closed-loop switched system, even in the presence of coding errors and data loss. The theoretical results are validated through numerical simulations, which demonstrate the effectiveness of the proposed approach.…”
    Get full text
    Article