-
1
A Complementary Gray Code Like Double N-Step Phase Shift Method Without Gray Code Fringe Images
Published 2023-01-01Subjects: Get full text
Article -
2
Short Blocklength Nonbinary Raptor-Like LDPC Coding Systems Design and Simulation
Published 2025-01-01“…This paper explores an efficient rate-adaptive error correction coding scheme with a nonbinary (NB) <inline-formula> <tex-math notation="LaTeX">$\mathrm {GF}(2^{q})$ </tex-math></inline-formula> extension of Raptor-like (RL) quasi-cyclic (QC) subclass of Low-Density Parity-Check (LDPC) codes. …”
Get full text
Article -
3
GC-Like LDPC Code Construction and its NN-Aided Decoder Implementation
Published 2024-01-01“…Different from existing model-driven methodologies only suitable for short codes, a Globally-Coupled Like (GC-like) LDPC code construction is presented to enable efficient training with simplified neural networks for longer LDPC codes. …”
Get full text
Article -
4
Low-overhead defect-adaptive surface code with bandage-like super-stabilizers
Published 2025-05-01“…Unlike previous approaches, this adapter leverages newly proposed bandage-like super-stabilizers to save more qubits when defects are clustered, thus enhancing the code distance and reducing super-stabilizer weight. …”
Get full text
Article -
5
Integrating LLM-based code optimization with human-like exclusionary reasoning for computational education
Published 2025-06-01Get full text
Article -
6
-
7
-
8
Pasithea-1: An Energy-Efficient Sequential Reconfigurable Array With CPU-Like Programmability
Published 2025-01-01“…This work presents Pasithea-1, a coarse-grained reconfigurable array (CGRA) that combines energy efficiency with CPU-like programmability. Its extensible instruction set uses sequential control flow in code fragments of up to 64 RISC-like instructions, which encode control and dataflow graphs in adjacency lists. …”
Get full text
Article -
9
-
10
SynergyScore: Leveraging Pretrained Language Models for Effective Evaluation of Code-Switched Sentences
Published 2025-01-01Subjects: Get full text
Article -
11
Bioinformatic Prediction of Novel microRNAs Encoded in Krüppel-like Factor 4 Gene
Published 2024-02-01“…MicroRNAs are small non-coding RNAs that can regulate gene expression that affects various cellular processes. …”
Get full text
Article -
12
-
13
Damage Evolution and Failure Precursor of Rock-like Material Under Uniaxial Compression Based on Strain Rate Field Statistics
Published 2025-01-01Subjects: “…rock-like material…”
Get full text
Article -
14
The impact of the nucleosome code on protein-coding sequence evolution in yeast.
Published 2008-11-01“…Here, we ask whether the way DNA works also imposes constraints on coding sequence evolution. We identify nucleosome positioning as a likely candidate to set up such a DNA-level selective regime and use high-resolution microarray data in yeast to compare the evolution of coding sequence bound to or free from nucleosomes. …”
Get full text
Article -
15
N<sup>6</sup>-Adenosine Methylation in RNA and a Reduced m<sub>3</sub>G/TMG Level in Non-Coding RNAs Appear at Microirradiation-Induced DNA Lesions
Published 2020-02-01“…In a subset of irradiated cells, only the METTL16 enzyme, responsible for m<sup>6</sup>A in non-coding RNAs as well as for splicing regulation, was recruited to microirradiated sites. …”
Get full text
Article -
16
Iterative interference cancellation based on decoding algorithm of space-time block coding in frequency-selective fading
Published 2006-01-01Subjects: “…space-time block coding…”
Get full text
Article -
17
Iterative interference cancellation based on decoding algorithm of space-time block coding in frequency-selective fading
Published 2006-01-01Subjects: “…space-time block coding;iterative interference cancellation;maximum ratio combining;maximum likeli-hood sequence estimation;frequency-selective fading…”
Get full text
Article -
18
Evaluating and Securing Text-Based Java Code through Static Code Analysis
Published 2020-06-01“…After combining the texts for an average rate, the total number of security bugs that were likely to appear was roughly 10% percent. This encompasses security bugs such as malicious code vulnerabilities and security vulnerabilities related to exposing or manipulating data in these programs.…”
Get full text
Article -
19
-
20
Infrastructure as Code for Cybersecurity Training
Published 2023-10-01“…An approach closely related to virtualization and containerization as the code's underlying infrastructure helps lay down this burden. …”
Get full text
Article