Suggested Topics within your search.
Suggested Topics within your search.
-
121
Automated Fixed-Point Precision Optimization for FPGA Synthesis
Published 2025-01-01“…In this article, we introduce an original precision tuning technique for synthesizing fixed-point programs from floating-point code, specifically targeting platforms. …”
Get full text
Article -
122
Magnetoacoustic Wave Dynamics and a Magnetic Null-Point
Published 2023-11-01“…The analytic results are accompanied by numerical plots using the PLUTO code. The results indicate that finite plasma- β conditions decrease the plasma density at the magnetic null-point. …”
Get full text
Article -
123
Prehospital ultrasound from a neurological point of view
Published 2024-01-01“…The use of "Point-of-Care Ultrasound" (POCUS) has been shown to be useful in the prehospital conditions of various emergencies. …”
Get full text
Article -
124
-
125
A Test Data Compression Scheme Based on Irrational Numbers Stored Coding
Published 2014-01-01“…The algorithm of converting floating-point number to irrational number precisely is given. …”
Get full text
Article -
126
Actualisation of the vestimentary code in the context of the soviet fashion discourse of the 1960s (axiological aspect)
Published 2023-04-01“…As a phenomenon of everyday life, fashion is understandable to every individual, and from the point of view of the theoretical representation of its status, fashion symbolises the totality of sociocultural and historical processes, acting as one of the culture codes. …”
Get full text
Article -
127
A THEORETICAL ANALYSIS OF THE SUBROGATION, AS PER THE AMENDMENTS BROUGHT BY THE CIVIL CODE OF 2009
Published 2013-05-01“…Our main purpose is to outline the latest amendments brought to the institution under discussion by the Civil Code of 2009 and, in this respect, we will analyse the subrogation from a theoretical point of view, with some references to the existent Romanian jurisprudence.…”
Get full text
Article -
128
Security protocol code analysis method combining model learning and symbolic execution
Published 2021-10-01“…Symbolic execution can comprehensively analyze program execution space in theory, but it is not feasible in practice for large programs like security protocols, due to the explosion of path space and the limitation of difficulty in solving path constraints.According to the characteristics of security protocol program, a method to guide the symbolic execution of security protocol code by using protocol state machine information obtained from model learning was proposed.At the same time, by separating cryptographic logic from protocol interaction logic, the problem that path constraints cannot be solved caused by the complexity of cryptographic logic is avoided.The feasibility of the method is demonstrated by the practice on the SSH open source project Dropbear.Compared with Dropbear's test suite, the proposed method has advantages in code coverage and error point discovery.…”
Get full text
Article -
129
CONSIDERATIONS ON THE PROCEDURE OF REDUCED VALUE APPLICATION IN THE REGULATION OF THE NEW CODE OF CIVIL PROCEDURE
Published 2014-11-01“…The work approaches the aspects related to the reduced value application procedure, from the point of view of the provisions of art. 1025-1032 from the Code of civil procedure in force, and the aspects referring to the area of application, the competent law court, opening and settlement of the procedure.…”
Get full text
Article -
130
Stopping Sets of Algebraic Geometry Codes over Hyperelliptic Curves of Genus Two
Published 2024-11-01“…We completely classify the stopping sets of the one-point algebraic geometric codes <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>C</mi><mo>=</mo><msub><mi>C</mi><mo>Ω</mo></msub><mrow><mo>(</mo><mi>D</mi><mo>,</mo><mi>m</mi><msub><mi>P</mi><mo>∞</mo></msub><mo>)</mo></mrow></mrow></semantics></math></inline-formula> defined by a hyperelliptic curve of genus 2 with <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>m</mi><mo>≤</mo><mn>4</mn></mrow></semantics></math></inline-formula>. …”
Get full text
Article -
131
Efficient Dual Domain Decoding of Linear Block Codes Using Genetic Algorithms
Published 2012-01-01“…The results show that the proposed algorithm gives large gains over the Chase-2 decoding algorithm and reach the performance of the OSD-3 for some quadratic residue (QR) codes. Further, we define a new crossover operator that exploits the domain specific information and compare it with uniform and two point crossover. …”
Get full text
Article -
132
New Insight on the Application of Binary Coded Chiliad (BCC) Encoding for Decimal Arithmetic
Published 2021-06-01“…The densely packed decimal (DPD) encoding for secondary and primary storage of three binary coded decimal (BCD) digits is included in the IEEE 754-2019 standard for decimal floating-point arithmetic. …”
Get full text
Article -
133
Estimation of differential code bias and ionospheric TEC based on the SUMT correction method
Published 2025-03-01“…To correct anomalies in vertical total electron content (VTEC) values at grid points, a sequential unconstrained minimization technique (SUMT) correction method was proposed. …”
Get full text
Article -
134
Complicated crosstalk between HMGA and non-coding RNAs modulates hallmarks of cancer
Published 2025-03-01“…It is involved in multiple hallmarks of tumors and affects the occurrence and progression of tumors. Nowadays, many non-coding RNAs (ncRNAs), such as miRNA, lncRNA, and circRNA, have been found to play a crucial role in HMGA1 regulation. …”
Get full text
Article -
135
Source-detector effective solid angle calculation using MCNP6 code
Published 2021-04-01“…Mathematical models were developed using the MCNP6 code in order to evaluate the proposed measurement geometry. …”
Get full text
Article -
136
-
137
Creating Balance on Bandwidth Consumption using Network Coding in Wireless Sensor Networks
Published 2024-02-01“…In recent years, Network Coding (NC) has been used to increase performance and efficiency in Wireless Sensor Networks (WSNs). …”
Get full text
Article -
138
Pharmacomodulation of G-quadruplexes in long non-coding RNAs dysregulated in colorectal cancer
Published 2025-08-01“…Abstract Background Non-coding RNAs (ncRNAs) in human cells constitute a substantial portion of the transcriptome but do not lead to protein synthesis. …”
Get full text
Article -
139
Color QR Codes for Smartphone-Based Analysis of Free Chlorine in Drinking Water
Published 2025-05-01“…However, traditional methods for measuring FC levels often require specialized equipment and laboratory settings, limiting their accessibility and practicality for on-site or point-of-use monitoring. QR Codes are powerful machine-readable patterns that are used worldwide to encode information (i.e., URLs or IDs), but their computer vision features allow QR Codes to act as carriers of other features for several applications. …”
Get full text
Article -
140
The eusocial non-code: Unveiling the impact of noncoding RNAs on Hymenoptera eusocial evolution
Published 2025-04-01Get full text
Article