Showing 1,121 - 1,140 results of 7,621 for search 'effect coding', query time: 0.12s Refine Results
  1. 1121

    Cross-Modal Hashing Retrieval Based on Density Clustering by Xiaojun Qi, Xianhua Zeng, Hongmei Tang

    Published 2025-01-01
    “…Cross-modal hashing retrieval methods have attracted much attention for their effectiveness and efficiency. However, most of the existing hashing methods have the problem of how to precisely learn potential correlations between different modalities from binary codes with minimal loss. …”
    Get full text
    Article
  2. 1122
  3. 1123

    Jointly Optimizing Resource Allocation, User Scheduling, and Grouping in SBMA Networks: A PSO Approach by Jianjian Wu, Chanzi Liu, Xindi Wang, Chi-Tsun Cheng, Qingfeng Zhou

    Published 2025-06-01
    “…SBMA leverages flexible user grouping (UG) strategies to effectively manage its unique combination of sparse code constraints and interference alignment requirements, thereby facilitating the fulfillment of diverse Quality of Service (QoS) demands. …”
    Get full text
    Article
  4. 1124

    Battered Woman Syndrome: Prospect of Situating It Within Criminal Law in India by A. Deb

    Published 2021-12-01
    “…This paper also challenges the effectiveness of the existing defences under the Indian Penal Code, 1860 in accommodating the cases of battered women, and highlights the need for the introduction of a new justificatory defence as a plausible solution.…”
    Get full text
    Article
  5. 1125

    Design of Development Environment for Embedded Control Software Based on Simulink by DAI Jisheng, CHEN Junbo, LI Cheng, LI Yi

    Published 2014-01-01
    “…Based on the development environment, using the model-based design concept, it effectively solves such problems as low efficiency and long cycle in the traditional method.…”
    Get full text
    Article
  6. 1126

    Normative acts in the system of national tax security provision by K. V. Maslov

    Published 2022-01-01
    “…The article characterizes the role of Russian Constitution, federal laws and bylaws in ensuring tax security.The purpose of the article is to identify legal norms that ensure the tax security of the state, and to confirm the hypothesis that such norms hat such norms are effective in systemic interaction.The methodology. …”
    Get full text
    Article
  7. 1127

    Generating political priority for breastfeeding and the adoption of Kenya’s 2012 BMS act: the importance of women’s leadership by Maryanne Wamahiu, Phillip Baker, Tim Dorlach

    Published 2025-05-01
    “…Support for the adoption of this landmark law was led by effective female political leaders, including public health minister Beth Mugo, the ministry’s nutrition division head Terrie Wefwafwa, and members of the Kenya Women’s Parliamentary Association. …”
    Get full text
    Article
  8. 1128

    Test method for static parameter of unipolar ADC by Zhu Qing, Wei Kai, Tao Qingping

    Published 2024-02-01
    “…This paper proposes a normalized processing platform scheme based on code density histogram. According to the test requirements, the test excitation amplitude that meets the requirements is selected to verify the effectiveness of the normalized scheme.The experimental results show that normalization reduces the influence of sinusoidal amplitude change on the code density histogram method and improves the stability of the code density histogram method.…”
    Get full text
    Article
  9. 1129

    Calculations of the nuclide composition of spent nuclear fuel RBMK-1000 for verification computer module SCALE-6 by V. V. Soloviov, E. O. Lebedev

    Published 2013-12-01
    “…The discrepancy with the experimental data on isotopes 235U, 239Pu, 241Pu, which are major contributors to the effective neutron multiplication factor, does not exceed 22 %. …”
    Get full text
    Article
  10. 1130

    A verification method for DMA controller based on AHB bus by Luo Yiniu, Ma Bingchang

    Published 2025-01-01
    “…The code coverage of two verification platforms was collected separately. …”
    Get full text
    Article
  11. 1131
  12. 1132

    Enhancing Malware Detection via RGB Assembly Visualization and Hybrid Deep Learning Models by Esra Eroğlu Demirkan, Murat Aydos

    Published 2025-06-01
    “…This research contributes to the field by integrating static binary analysis with advanced computer vision techniques, offering a scalable and effective solution for malware detection.…”
    Get full text
    Article
  13. 1133

    Control-flow integrity technology based on the combination of software and hardware by LIANG Hao, HE Benwei, WANG Qingfeng, CHENG Guozhen, MA Hailong

    Published 2024-10-01
    “…Experimental results demonstrated that programs fortified with SHCFI effectively defended against code reuse attacks, exhibiting favorable runtime overhead.…”
    Get full text
    Article
  14. 1134

    ApproximateSecret Sharing in Field of Real Numbers by Jiaqi Wan, Ziyue Wang, Yongqiang Yu, Xuehu Yan

    Published 2025-07-01
    “…The experimental results validate its effectiveness in balancing precision and security across various real-number types.…”
    Get full text
    Article
  15. 1135

    Using Large Language Models for the Interpretation of Building Regulations by Stefan Fuchs, Michael Witbrock, Johannes Dimyadi, Robert Amor

    Published 2024-12-01
    “…As LLMs become more sophisticated, the increased common sense, logical coherence and means to domain adaptation can significantly support ACC, leading to more efficient and effective checking processes.…”
    Get full text
    Article
  16. 1136

    Assessment of a polymeric composite as a radiation attenuator and a restoration mortar for cracking in biological shields by A. T. Gheith, M. A. El-Sarraf, I. E. Hasan, N. L. Helal, R. A. Rizk, Amal A. El-Sawy, A. El-Sayed Abdo

    Published 2020-12-01
    “…Also, the MCNP5 code and MERCSF-N program have been used to compute the parameters theoretically. …”
    Get full text
    Article
  17. 1137

    APPLICATION OF THE LOYAL COOPERATION PRINCIPLE IN PUBLIC ADMINISTRATION by Vasilica NEGRUȚ, Ionela Alina ZORZOANĂ

    Published 2023-06-01
    “…Furthermore, with the appearance of the Administrative Code, in Part III, dedicated to local public administration, among the principles applicable to local public administration, art. 75 para. (1) lit. e), the principle of collaboration. …”
    Get full text
    Article
  18. 1138

    A Model-Driven Approach Employing DSL and Generation Templates to Accelerate the Development of Conversational Agents for Smart Tourism by Charaf Ouaddi, Lamya Benaddi, Adnane Souha, Hamza Abdelmalek, Abdeslam Jakimi, Rachid Saadane

    Published 2025-01-01
    “…Third, we develop a graphical interface that incorporates intuitive icons to simplify the creation of conversational agent models. Fourth, we define code generation templates to translate the graphical models into executable agent source code. …”
    Get full text
    Article
  19. 1139

    Efisiensi Penggunaan QRIS Dengan Merchant Presented Mode Dalam Transaksi Pembayaran Non-Tunai by Aryo Pinandito, Raihan Fikri Brilliansyach

    Published 2024-08-01
    “… Quick Response Code Indonesian Standard (QRIS) merupakan salah satu metode pembayaran non-tunai di Indo-nesia yang memanfaatkan standar kode Quick Response (QR) dengan lebih dari 29,4 juta merchant terdaftar. …”
    Get full text
    Article
  20. 1140

    Research on Random Discrete Ordinates Method Based on Quasi-Monte Carlo Integration Technique by DAI Tao, XU Longfei, LI Baiwen, SHEN Huayun, HU Yuan, MA Ruiyao

    Published 2025-06-01
    “…The first collision source method, widely implemented in SN codes to mitigate ray effects, operates by employing alternative transport methodologies, such as ray tracing, Monte Carlo simulations, or PN expansions, to compute the uncollided flux component most severely impacted by ray effects, thereby reducing numerical distortions. …”
    Article