Suggested Topics within your search.
Suggested Topics within your search.
-
161
Robust Steganographic Method with Code-Controlled Information Embedding
Published 2021-11-01“…In view of the fact that most images are compressed when transmitted through telecommunica-tion systems and telecommunication systems in the energetics, from the point of view of the practical use of steganographic algorithms in real information security systems, such as their property, the ability to effectively resist a compression attack, is of great interest. …”
Get full text
Article -
162
Combinations of Verbal and Non-Verbal Message Codes on Reddit
Published 2024-12-01“…It shapes new views and beliefs, as well as increases the effectiveness of communication.…”
Article -
163
Automation of reversible steganographic coding with nonlinear discrete optimisation
Published 2022-12-01“…A fundamental element of reversible steganography is predictive analytics, for which powerful neural network models have been effectively deployed. Another core element is reversible steganographic coding. …”
Get full text
Article -
164
ANALYSIS OF FOREIGN EXPERIENCE OF INTRODUCTION OF THE SCHOOL DRESS CODE
Published 2016-12-01“…The correlation between the wording of the requirements of the dress code and the effectiveness of its implementation from the point of view of minimization of internal stresses in the school team is defined.Practical significance. …”
Get full text
Article -
165
Optimising the paradigms of human AI collaborative clinical coding
Published 2024-12-01“…Abstract Automated clinical coding (ACC) has emerged as a promising alternative to manual coding. …”
Get full text
Article -
166
The influence of the transducer bandwidth on the efficient Golay codes compression
Published 2014-01-01“…This paper investigates the influence of the effective bandwidth of the transducer on the behaviour of the encoding/compression technique and its potential influence on the axial resolution. …”
Get full text
Article -
167
LDPC-Coded Modulation Performance Analysis and System Design
Published 2020-01-01“…This motivates the novel analytical work of this article, which derives overall error-rate and threshold performances through considering separately the effects of the channel on the coded and uncoded bits. …”
Get full text
Article -
168
Analysing Quality Metrics and Automated Scoring of Code Reviews
Published 2024-11-01“…The suitability of these metrics is also discussed with regards to the creation of a scoring framework and development of an automated code review analysis tool. We conclude that the software written is an effective method of comparing practices and cultures across projects and can provide benefits by promoting a positive review culture within an organisation. …”
Get full text
Article -
169
Developing an ICD-10 Coding Assistant: Pilot Study Using RoBERTa and GPT-4 for Term Extraction and Description-Based Code Selection
Published 2025-02-01“…ResultsThe fine-tuned Robustly Optimized BERT Pretraining Approach achieved an overall F1F1F1 ConclusionsWhile lead term extraction showed promising results, the subsequent RAG-based code assignment using GPT-4 and code descriptions was less effective. …”
Get full text
Article -
170
Effect of the transverse reinforcement spacing in nodal zones on the seismic behavior factor of RC frames according to Algerian design code RPA99/version2003
Published 2025-06-01“…The objective is to determine which spacing provides an R value in accordance with the Algerian seismic design code (RPA99/version 2003). To evaluate this effect, nonlinear pushover analysis is performed for each configuration. …”
Get full text
Article -
171
A Review: The Effect of Emotional Intelligence, Spiritual Intelligence, Love of Money and Ethical Sensitivity on Students’ Ethical Perceptions Regarding the Code of Ethics for the Accountant Profession
Published 2024-01-01“…The present study analyzes the effect of emotional intelligence, spiritual intelligence, love of money, and ethical sensitivity on students’ ethical perceptions regarding the code of ethics of the accounting profession. …”
Get full text
Article -
172
-
173
-
174
A study on the effects of hidden safety when assessing existing structures
Published 2022-08-01Get full text
Article -
175
Coding and non-coding RNA expression in NSC34 cells following TDP-43 depletion and mutant TDP-43 M337V expression
Published 2025-07-01“…Additionally, the inclusion of non-coding RNAs facilitates the construction of gene regulatory networks, providing insights into the interplay between coding and non-coding RNAs in gene expression regulation under TDP-43 loss-of-function or pathogenic mutation conditions.…”
Get full text
Article -
176
Cross-code comparison of the edge codes SOLPS-ITER, SOLEDGE2D and UEDGE in modelling a high-power neon-seeded scenario in the DTT
Published 2025-01-01“…The particular set of EIRENE atomic-molecular reactions adopted is found to stiffly restrict the achievable code solutions, which results in the predicted effective charge Z _eff changing from ${\sim}5$ to ${\sim}8$ at the outer mid-plane separatrix. …”
Get full text
Article -
177
Effect of lincRNA-EPS on the microglial inflammatory response induced by P.g-LPS: An experimental study
Published 2025-08-01“…[Objective:] To investigate whether long intergenic non-coding RNA-EPS (lincRNA-EPS) affects microglial inflammatory response induced by Porphyromonas gingivalis lipopolysaccharides (P.g-LPS). …”
Get full text
Article -
178
-
179
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
180
Settlement between the offender and the victim according to the criminal code of Serbia
Published 2011-01-01“…The Criminal Code of the Republic of Serbia from 2005 (which went into effect on January 1st, 2006) has envisaged a particular basis for remittance of punishment which had been unknown in our criminal law. …”
Get full text
Article