Showing 161 - 180 results of 7,621 for search 'effect coding', query time: 0.12s Refine Results
  1. 161

    Robust Steganographic Method with Code-Controlled Information Embedding by Kobozeva A.A., Sokolov A.V

    Published 2021-11-01
    “…In view of the fact that most images are compressed when transmitted through telecommunica-tion systems and telecommunication systems in the energetics, from the point of view of the practical use of steganographic algorithms in real information security systems, such as their property, the ability to effectively resist a compression attack, is of great interest. …”
    Get full text
    Article
  2. 162

    Combinations of Verbal and Non-Verbal Message Codes on Reddit by Andrey G. Fomin, Natalia A. Smakotina

    Published 2024-12-01
    “…It shapes new views and beliefs, as well as increases the effectiveness of communication.…”
    Article
  3. 163

    Automation of reversible steganographic coding with nonlinear discrete optimisation by Ching-Chun Chang

    Published 2022-12-01
    “…A fundamental element of reversible steganography is predictive analytics, for which powerful neural network models have been effectively deployed. Another core element is reversible steganographic coding. …”
    Get full text
    Article
  4. 164

    ANALYSIS OF FOREIGN EXPERIENCE OF INTRODUCTION OF THE SCHOOL DRESS CODE by O, I, Denisova

    Published 2016-12-01
    “…The correlation between the wording of the requirements of the dress code and the effectiveness of its implementation from the point of view of minimization of internal stresses in the school team is defined.Practical significance. …”
    Get full text
    Article
  5. 165

    Optimising the paradigms of human AI collaborative clinical coding by Yue Gao, Yuepeng Chen, Minghao Wang, Jinge Wu, Yunsoo Kim, Kaiyin Zhou, Miao Li, Xien Liu, Xiangling Fu, Ji Wu, Honghan Wu

    Published 2024-12-01
    “…Abstract Automated clinical coding (ACC) has emerged as a promising alternative to manual coding. …”
    Get full text
    Article
  6. 166

    The influence of the transducer bandwidth on the efficient Golay codes compression by Ihor Trots, Andrzej Nowicki, Wojciech Secomski, Ryszard Tymkiewicz

    Published 2014-01-01
    “…This paper investigates the influence of the effective bandwidth of the transducer on the behaviour of the encoding/compression technique and its potential influence on the axial resolution. …”
    Get full text
    Article
  7. 167

    LDPC-Coded Modulation Performance Analysis and System Design by Cornelius Tomas Healy, Anas Al Rawi, Charalampos C. Tsimenidis

    Published 2020-01-01
    “…This motivates the novel analytical work of this article, which derives overall error-rate and threshold performances through considering separately the effects of the channel on the coded and uncoded bits. …”
    Get full text
    Article
  8. 168

    Analysing Quality Metrics and Automated Scoring of Code Reviews by Owen Sortwell, David Cutting, Christine McConnellogue

    Published 2024-11-01
    “…The suitability of these metrics is also discussed with regards to the creation of a scoring framework and development of an automated code review analysis tool. We conclude that the software written is an effective method of comparing practices and cultures across projects and can provide benefits by promoting a positive review culture within an organisation. …”
    Get full text
    Article
  9. 169

    Developing an ICD-10 Coding Assistant: Pilot Study Using RoBERTa and GPT-4 for Term Extraction and Description-Based Code Selection by Sander Puts, Catharina M L Zegers, Andre Dekker, Iñigo Bermejo

    Published 2025-02-01
    “…ResultsThe fine-tuned Robustly Optimized BERT Pretraining Approach achieved an overall F1F1F1 ConclusionsWhile lead term extraction showed promising results, the subsequent RAG-based code assignment using GPT-4 and code descriptions was less effective. …”
    Get full text
    Article
  10. 170

    Effect of the transverse reinforcement spacing in nodal zones on the seismic behavior factor of RC frames according to Algerian design code RPA99/version2003 by Amar Louzai, Ahmed Abed

    Published 2025-06-01
    “…The objective is to determine which spacing provides an R value in accordance with the Algerian seismic design code (RPA99/version 2003). To evaluate this effect, nonlinear pushover analysis is performed for each configuration. …”
    Get full text
    Article
  11. 171

    A Review: The Effect of Emotional Intelligence, Spiritual Intelligence, Love of Money and Ethical Sensitivity on Students’ Ethical Perceptions Regarding the Code of Ethics for the Accountant Profession by Susilawati Desi, Diwanti Dyah Pikanthi, Turidho Resma Kurnia, Polanunu Ummul Ulya, Nuryaningrum Aninda

    Published 2024-01-01
    “…The present study analyzes the effect of emotional intelligence, spiritual intelligence, love of money, and ethical sensitivity on students’ ethical perceptions regarding the code of ethics of the accounting profession. …”
    Get full text
    Article
  12. 172
  13. 173
  14. 174
  15. 175

    Coding and non-coding RNA expression in NSC34 cells following TDP-43 depletion and mutant TDP-43 M337V expression by Ismail Gbadamosi, Sandra Binias, Bartłomiej Gielniewski, Ramiro Magno, Isabel Duarte, Ali Jawaid

    Published 2025-07-01
    “…Additionally, the inclusion of non-coding RNAs facilitates the construction of gene regulatory networks, providing insights into the interplay between coding and non-coding RNAs in gene expression regulation under TDP-43 loss-of-function or pathogenic mutation conditions.…”
    Get full text
    Article
  16. 176

    Cross-code comparison of the edge codes SOLPS-ITER, SOLEDGE2D and UEDGE in modelling a high-power neon-seeded scenario in the DTT by M. Moscheni, M. Wigram, H. Wu, C. Meineri, C. Carati, E. De Marchi, M. Greenwald, P. Innocente, B. LaBombard, F. Subba, R. Zanino

    Published 2025-01-01
    “…The particular set of EIRENE atomic-molecular reactions adopted is found to stiffly restrict the achievable code solutions, which results in the predicted effective charge Z _eff changing from ${\sim}5$ to ${\sim}8$ at the outer mid-plane separatrix. …”
    Get full text
    Article
  17. 177

    Effect of lincRNA-EPS on the microglial inflammatory response induced by P.g-LPS: An experimental study by GAO Jianfang, SU Jiansheng

    Published 2025-08-01
    “…[Objective:] To investigate whether long intergenic non-coding RNA-EPS (lincRNA-EPS) affects microglial inflammatory response induced by Porphyromonas gingivalis lipopolysaccharides (P.g-LPS). …”
    Get full text
    Article
  18. 178
  19. 179

    Hard-coded backdoor detection method based on semantic conflict by Anxiang HU, Da XIAO, Shichen GUO, Shengli LIU

    Published 2023-02-01
    “…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
    Get full text
    Article
  20. 180

    Settlement between the offender and the victim according to the criminal code of Serbia by Ćorović Emir

    Published 2011-01-01
    “…The Criminal Code of the Republic of Serbia from 2005 (which went into effect on January 1st, 2006) has envisaged a particular basis for remittance of punishment which had been unknown in our criminal law. …”
    Get full text
    Article