Suggested Topics within your search.
Suggested Topics within your search.
- Economic Policy 1
- Economic policy 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Environmental Economics 1
- Environmental economics 1
- Industrial Organization 1
- Industrial organization 1
- Moral and ethical aspects 1
- Professional ethics 1
- Public relations 1
- Public relations personnel 1
-
101
L’historien, le code et l’ordonnance
Published 2012-08-01“…The Ordonnance was indeed immediately ridiculed by libels, to the point that it is now generally known under the derisive nickname “Code Michau”. …”
Get full text
Article -
102
Phase coded waveforms for integrated sensing and communication systems
Published 2024-12-01Get full text
Article -
103
Source Quantization and Coding over Noisy Channel Analysis
Published 2024-11-01“…Recently, lossy source coding based on linear block code has been designed using the duality principle, i.e., the channel decoding algorithm is employed to realize the lossy source coding. …”
Get full text
Article -
104
Program semantic analysis model for code reuse detection
Published 2024-12-01“…Program similarity analysis had a wide range of applications in areas such as code plagiarism and property protection, but it generally suffered from problems such as excessive computational overhead, a code similarity analysis method based on fuzzy matching and statistical inference was proposed. …”
Get full text
Article -
105
Automation of reversible steganographic coding with nonlinear discrete optimisation
Published 2022-12-01“…Another core element is reversible steganographic coding. Contemporary coding is based primarily on heuristics, which offers a shortcut towards sufficient, but not necessarily optimal, capacity–distortion performance. …”
Get full text
Article -
106
Analysing Quality Metrics and Automated Scoring of Code Reviews
Published 2024-11-01“…While it is generally agreed that code reviews are beneficial and result in higher-quality software, there has been little work investigating best practices and approaches, exploring which factors impact code review quality. …”
Get full text
Article -
107
THE FUNDAMENTAL PRINCIPLES OF EFFECTIVE STATE SOCIAL-ECONOMICAL POLICY (Part 3)
Published 2018-06-01Subjects: Get full text
Article -
108
LEGAL ENTITIES AS THE MAIN PARTICIPANTS IN BUSINESS ACTIVITY IN RUSSIA AND CHINA
Published 2019-11-01Subjects: Get full text
Article -
109
An Alternative Approach to Future Diagnosis: Can Generalized Anxiety Disorder Be Distinguished From Major Depressive Disorder, Healthy People by Differentially Expressed lncRNAs in...
Published 2025-04-01“…It is also beneficial for personalized treatment of GAD.Keywords: long non-coding RNAs, differential diagnosis, peripheral blood mononuclear cell, biomarker, receiver operating characteristic…”
Get full text
Article -
110
Detecting Signatures of Criticality Using Divergence Rate
Published 2025-04-01Subjects: Get full text
Article -
111
Cross-code comparison of the edge codes SOLPS-ITER, SOLEDGE2D and UEDGE in modelling a high-power neon-seeded scenario in the DTT
Published 2025-01-01“…This higher-power scenario is generally characterised by substantial disagreement between the three codes, up to 78%–178% in peak heat fluxes. …”
Get full text
Article -
112
-
113
Role of non-coding RNA-regulated ferroptosis in colorectal cancer
Published 2025-07-01Get full text
Article -
114
A modo de conclusiones: el Liber Iudiciorum y la aplicación del Derecho en los siglos vi a xi
Published 2011-11-01Subjects: Get full text
Article -
115
Machine learning message-passing for the scalable decoding of QLDPC codes
Published 2025-05-01“…Extrapolated Astra achieves better LER than BPOSD for BB codes. Astra(+OSD) achieves orders of magnitude lower logical error rates for BB codes compared to BP(+OSD).…”
Get full text
Article -
116
Research on malicious code variants detection based on texture fingerprint
Published 2014-08-01“…Afterwards, the index structure for fingerprint texture is built on the statistical analy-sis of general texture fingerprints of malicious code samples. …”
Get full text
Article -
117
Assessment of Prediction Capabilities of COCOSYS and CFX Code for Simplified Containment
Published 2016-01-01“…For this purpose, the actual capability of CFX tool and COCOSYS code is assessed in prototypical geometries for simplified physical process-plume (due to a heat source) under adiabatic and convection boundary condition, respectively. …”
Get full text
Article -
118
On the Construction of Self-Complementary Codes and their Application in the Problem of Information Hiding
Published 2022-09-01“…The development of an efficient method for obtaining a lower estimate close to d(k, n) is an urgent task, since finding the values of d(k, n) in the general case is a difficult task. The paper proposes four methods for finding lower bounds: based on cyclic codes, based on residual codes, based on the (u-u+v)-construction, and based on the tensor product of codes. …”
Get full text
Article -
119
Prevalence of transcription promoters within archaeal operons and coding sequences
Published 2009-06-01“…Using experimental validation, we illustrate the prevalence of overlapping genomic signals in archaeal transcription, casting doubt on the general perception of rigid boundaries between coding sequences and regulatory elements.…”
Get full text
Article -
120
Mapping of UK Biobank clinical codes: Challenges and possible solutions.
Published 2022-01-01“…We also report challenges identified in mapping Read codes from UK Biobank GP tables to ICD and SNOMED CT.…”
Get full text
Article