To see the other types of publications on this topic, follow the link: Double coding.

Journal articles on the topic 'Double coding'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Double coding.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sasaki, M. "Toward implementation of coding for quantum sources and channels." Quantum Information and Computation 4, no. 6&7 (2004): 526–36. http://dx.doi.org/10.26421/qic4.6-7-11.

Full text
Abstract:
We review our experiment on quantum source and channel codings, the most fundamental operations in quantum info-communications. For both codings, entangling letter states is essential. Our model is based on the polarization-location coding, and a quasi-single photon linear optics implementation to entangle the polarization and location degrees of freedom. Using single-photon events in a subset of possible cases, we simulate quantum coding-decoding operations for nonorthogonal states under the quasi-pure state condition. In the quantum channel coding, we double the spatial bandwidth (number of
APA, Harvard, Vancouver, ISO, and other styles
2

He, Zhoushanyue, and Matthias Schonlau. "Automatic Coding of Text Answers to Open-Ended Questions: Should You Double Code the Training Data?" Social Science Computer Review 38, no. 6 (2019): 754–65. http://dx.doi.org/10.1177/0894439319846622.

Full text
Abstract:
Open-ended questions in surveys are often manually coded into one of several classes (or categories). When the data are too large to manually code all texts, a statistical (or machine) learning model must be trained on a manually coded subset of texts. Uncoded texts are then coded automatically using the trained model. The quality of automatic coding depends on the trained statistical model, and the model relies on manually coded data on which it is trained. While survey scientists are acutely aware that the manual coding is not always accurate, it is not clear how double coding affects the cl
APA, Harvard, Vancouver, ISO, and other styles
3

WANG, WAN-YING, CHUAN WANG, and GUI-LU LONG. "DOUBLING THE CAPACITY OF QUANTUM KEY DISTRIBUTION BY USING BOTH POLARIZATION AND DIFFERENTIAL PHASE SHIFT." International Journal of Quantum Information 07, no. 02 (2009): 529–37. http://dx.doi.org/10.1142/s0219749909005304.

Full text
Abstract:
Using differential phase shift and photon polarization, we propose two quantum key distribution schemes, i.e. a double-coding BB84 protocol and a double-coding BBM92 protocol. The information capacity of these protocols is twice of the original protocols and their security is ensured by the use of detection time slots, random choice of bases and quantum entanglement. These double-coding protocols are feasible with present technology.
APA, Harvard, Vancouver, ISO, and other styles
4

Čebotarjovs, Mihails. "Double Coding in John Banville’s ‘Mefisto’ (1999)." Baltic Journal of English Language, Literature and Culture 13 (May 15, 2023): 35–47. http://dx.doi.org/10.22364/bjellc.13.2023.03.

Full text
Abstract:
The present paper examines how John Banville creates a peculiar version of the Faust legend in his novel Mefisto (1999) through the use of double coding. The term is frequently used in postmodern art, especially in literary theory and architecture. The idea consists of the possibility of sending two opposite or even multiple messages at once. Mefisto presents a fertile ground for the analysis of the way double coding might operate in a work of postmodernist fiction. Moreover, it has been one of the most challenging contemporary interpretations of the Faust legend for critics and, therefore, th
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Rui, and Di Xiao. "Double Image Encryption Scheme Based on Compressive Sensing and Double Random Phase Encoding." Mathematics 10, no. 8 (2022): 1242. http://dx.doi.org/10.3390/math10081242.

Full text
Abstract:
In order to overcome the shortcomings of the standard compressive sensing (CS) encryption framework, a novel fusion application scheme of CS and optical transformation technology is proposed. The proposed scheme, making full use of the feature of CS to achieve compression and encryption simultaneously, compresses and encrypts two images into one image, which not only reduces storage space and transmission bandwidth, but also improves the security performance of encryption. In the proposed scheme, the two original images are first sampled with CS, and then double random phase coding is performe
APA, Harvard, Vancouver, ISO, and other styles
6

Lada, Nataliia, and Yuliia Rudnytska. "IMPLEMENTATION OF A METHOD FOR SYNTHESIZING GROUPS OF SYMMETRIC DOUBLE-OPERAND OPERATIONS OF CRYPTOGRAPHIC INFORMATION CODING FOR BLOCK ENCRYPTION SYSTEMS." Innovative Technologies and Scientific Solutions for Industries, no. 2 (20) (June 30, 2022): 35–43. http://dx.doi.org/10.30837/itssi.2022.20.035.

Full text
Abstract:
The object of the study is the processes of building groups of symmetric double-operand operations of cryptographic coding of information. The subject of the study are features of the implementation of a generalized method of synthesis groups of symmetric two-operand operations of cryptographic coding information for "lightweight cryptography". The purpose of this work is to investigate the process of building and implementing a method of synthesis of groups of symmetric multibit double-operand operations of information cryptographic coding to provide automation for finding ways to increase th
APA, Harvard, Vancouver, ISO, and other styles
7

Huang, Shouhan. "Comparative Analysis of SEC DED, EVEN-ODD, and Pyramid Codes for Distributed Storage Systems: A MATLAB-Based Study." ITM Web of Conferences 73 (2025): 03021. https://doi.org/10.1051/itmconf/20257303021.

Full text
Abstract:
This study presents a comparative analysis of three erasure coding schemes—Single Error Correction Double Error Detection (SEC DED), EVEN-ODD, and Pyramid codes—within distributed storage systems, utilizing MATLAB for simulation. The research focuses on key metrics such as storage overhead, recovery time, and fault tolerance to elucidate the performance characteristics and practical applicability of each scheme. Single Error Correction Double Error Detection coding balances recovery speed and fault tolerance but incurs higher storage overhead due to its double-parity structure. EVEN-ODD coding
APA, Harvard, Vancouver, ISO, and other styles
8

Minde, Tor B. "Double mode long term prediction in speech coding." Journal of the Acoustical Society of America 101, no. 6 (1997): 3236. http://dx.doi.org/10.1121/1.418285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pettigrew, Simone. "Symbolic double‐coding: the case of Australian pubs." Qualitative Market Research: An International Journal 9, no. 2 (2006): 157–69. http://dx.doi.org/10.1108/13522750610658793.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dong, Yanfei, Kai Niu, Jincheng Dai, Sen Wang, and Yifei Yuan. "Joint Source and Channel Coding Using Double Polar Codes." IEEE Communications Letters 25, no. 9 (2021): 2810–14. http://dx.doi.org/10.1109/lcomm.2021.3088941.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Berti, E., F. Chiaraluce, N. E. Evans, and J. J. McKee. "Reduction of Walsh-transformed electrocardiograms by double logarithmic coding." IEEE Transactions on Biomedical Engineering 47, no. 11 (2000): 1543–47. http://dx.doi.org/10.1109/10.880108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Mitchell, M. R., R. E. Link, Chokri Chemak, Mohamed Salim Bouhlel, and Jean Christophe Lapayre. "Double Watermarking and Turbo Coding for Robust Image Watermarking." Journal of Testing and Evaluation 36, no. 4 (2008): 101051. http://dx.doi.org/10.1520/jte101051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Lala, P. K., P. Thenappan, and M. T. Anwar. "Single error correcting and double error detecting coding scheme." Electronics Letters 41, no. 13 (2005): 758. http://dx.doi.org/10.1049/el:20050614.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Dong, Yanfei, and Kai Niu. "Double Polar Codes for Joint Source and Channel Coding." Electronics 11, no. 21 (2022): 3557. http://dx.doi.org/10.3390/electronics11213557.

Full text
Abstract:
In this paper, we design a joint source and channel coding (JSCC) framework combining the source polar coding and the channel polar coding. The source is first compressed using a polar code (PC), and source check decoding is employed to construct an error set containing the index of all source decoding errors. Then, the proposed JSCC system employs another PC or systematic PC (SPC) to protect the compressed source and the error set against noise, which is called double PC (D-PC) or systematic double PC (SD-PC), respectively. For a D-PC JSCC system, we prove a necessary condition for the optima
APA, Harvard, Vancouver, ISO, and other styles
15

Xiang, Hao. "The improved quantum genetic algorithm with its application in fault diagnosis." Journal of Physics: Conference Series 2640, no. 1 (2023): 012002. http://dx.doi.org/10.1088/1742-6596/2640/1/012002.

Full text
Abstract:
Abstract In this paper, by analyzing the characteristics of the simulated annealing algorithm (SA) and the real double-chain coding target gradient quantum genetic algorithm (DCQGA), the real double-chain coding target gradient quantum genetic simulated annealing algorithm (DCQGSAA) is proposed. Because the performance of LSSVR is extraordinarily sensitive to its key parameters, the proposed algorithm is used to optimize these parameters, then a hybrid non-parametric prediction model is put forward. This model is used in fault prediction of liquid rocket engine thrust. The simulation results s
APA, Harvard, Vancouver, ISO, and other styles
16

Wei, Hongling, Fuyi Cui, Weigang Guo, and Yinglai Wu. "Transmission electromagnetic beam splitter based on double-sided all dielectric microstructure." Laser Physics 32, no. 4 (2022): 046202. http://dx.doi.org/10.1088/1555-6611/ac5803.

Full text
Abstract:
Abstract We propose a transmission type dual beam splitter based on all-dielectric encoded metasurface. In order to improve the efficiency of the device, we propose to construct the coding metasurface using double-sided all-dielectric cylindrical cell structure. Based on the electromagnetic dipole resonance characteristics of the all-dielectric resonator, two all-dielectric elements with transmission phase difference π were obtained, and 1-bit coded metasurface was constructed to achieve beam splitting characteristics of incident waves. Based on the finite integral method, we numerically simul
APA, Harvard, Vancouver, ISO, and other styles
17

Tayeb, Laskri Mohamed, and Chebah Ouafa. "Local directional double ternary coding pattern for facial expression recognition." International Journal of Computational Vision and Robotics 1, no. 1 (2022): 1. http://dx.doi.org/10.1504/ijcvr.2022.10046572.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Hwang, Yu-Min, Kyung-Ho Kim, and Jin-Young Kim. "Performance of Double Binary Turbo Coding for LED-ID Systems." Journal of Korea Information and Communications Society 38C, no. 11 (2013): 1078–83. http://dx.doi.org/10.7840/kics.2013.38c.11.1078.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Ruttan, Cindy C., and Barry W. Glickman. "Coding variants in human double-strand break DNA repair genes." Mutation Research/Fundamental and Molecular Mechanisms of Mutagenesis 509, no. 1-2 (2002): 175–200. http://dx.doi.org/10.1016/s0027-5107(02)00218-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Konecny, Jaromir, Michael Eckert, Michael Schöniger, and G. Ludwig Hofacker. "Neutral adaptation of the genetic code to double-strand coding." Journal of Molecular Evolution 36, no. 5 (1993): 407–16. http://dx.doi.org/10.1007/bf02406718.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Ouafa, Chebah, and Laskri Mohamed Tayeb. "Local directional double ternary coding pattern for facial expression recognition." International Journal of Computational Vision and Robotics 13, no. 3 (2023): 259. http://dx.doi.org/10.1504/ijcvr.2023.130646.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Lee, Seung-Mee, Seok-Ju Chun, and Sean-Joo Kim. "Double Feedback-based Coding Education Program for Visually Impaired Students." Journal of Korean Institute of Information Technology 22, no. 4 (2024): 139–49. http://dx.doi.org/10.14801/jkiit.2024.22.4.139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Ahmed, Sarwat A., and Asaad Mubdir Jassim Al-Hindawi. "Double-Staged Syndrome Coding Scheme for Improving Information Transmission Security over the Wiretap Channel." Journal of Engineering 29, no. 2 (2023): 112–36. http://dx.doi.org/10.31026/j.eng.2023.02.08.

Full text
Abstract:
This paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmissi
APA, Harvard, Vancouver, ISO, and other styles
24

Davis, Summer, and Joanne Yi. "Double tap, double trouble: Instagram, teachers, and profit." E-Learning and Digital Media 19, no. 3 (2022): 320–39. http://dx.doi.org/10.1177/20427530211064706.

Full text
Abstract:
This qualitative study explores the performance of teacher agency amidst national financial and professional deficits in education and sheds light on the growing utilization of Instagram in elementary school contexts. To better understand teachers’ use of this social media platform, we examined the Instagram accounts of 12 highly popular and influential pre-K–6 teachers (i.e., teacher influencers). Data sources comprised over 600 visual and textual posts, which included images, captions, hashtags, and emojis, produced over 3 months in the spring of 2019. Using qualitative coding procedures tha
APA, Harvard, Vancouver, ISO, and other styles
25

Mariol, Marina, Corentin Jacques, Marie-Anne Schelstraete, and Bruno Rossion. "The Speed of Orthographic Processing during Lexical Decision: Electrophysiological Evidence for Independent Coding of Letter Identity and Letter Position in Visual Word Recognition." Journal of Cognitive Neuroscience 20, no. 7 (2008): 1283–99. http://dx.doi.org/10.1162/jocn.2008.20088.

Full text
Abstract:
Adults can decide rapidly if a string of letters is a word or not. However, the exact time course of this discrimination is still an open question. Here we sought to track the time course of this discrimination and to determine how orthographic information—letter position and letter identity—is computed during reading. We used a go/no-go lexical decision task while recording event-related potentials (ERPs). Subjects were presented with single words (go trials) and pseudowords (no-go trials), which varied in orthographic conformation, presenting either a double consonant frequently doubled (i.e
APA, Harvard, Vancouver, ISO, and other styles
26

Du, Haigui, Shihua Zhou, WeiQi Yan, and Sijie Wang. "Study on DNA Storage Encoding Based IAOA under Innovation Constraints." Current Issues in Molecular Biology 45, no. 4 (2023): 3573–90. http://dx.doi.org/10.3390/cimb45040233.

Full text
Abstract:
With the informationization of social processes, the amount of related data has greatly increased, making traditional storage media unable to meet the current requirements for data storage. Due to its advantages of a high storage capacity and persistence, deoxyribonucleic acid (DNA) has been considered the most prospective storage media to solve the data storage problem. Synthesis is an important process for DNA storage, and low-quality DNA coding can increase errors during sequencing, which can affect the storage efficiency. To reduce errors caused by the poor stability of DNA sequences durin
APA, Harvard, Vancouver, ISO, and other styles
27

Thapar, Roopa. "Regulation of DNA Double-Strand Break Repair by Non-Coding RNAs." Molecules 23, no. 11 (2018): 2789. http://dx.doi.org/10.3390/molecules23112789.

Full text
Abstract:
DNA double-strand breaks (DSBs) are deleterious lesions that are generated in response to ionizing radiation or replication fork collapse that can lead to genomic instability and cancer. Eukaryotes have evolved two major pathways, namely homologous recombination (HR) and non-homologous end joining (NHEJ) to repair DSBs. Whereas the roles of protein-DNA interactions in HR and NHEJ have been fairly well defined, the functions of small and long non-coding RNAs and RNA-DNA hybrids in the DNA damage response is just beginning to be elucidated. This review summarizes recent discoveries on the identi
APA, Harvard, Vancouver, ISO, and other styles
28

Lee, Yun Gu, Gihyun Na, and Junseok Byun. "Detection of Double-Compressed Videos Using Descriptors of Video Encoders." Sensors 22, no. 23 (2022): 9291. http://dx.doi.org/10.3390/s22239291.

Full text
Abstract:
In digital forensics, video becomes important evidence in an accident or a crime. However, video editing programs are easily available in the market, and even non-experts can delete or modify a section of an evidence video that contains adverse evidence. The tampered video is compressed again and stored. Therefore, detecting a double-compressed video is one of the important methods in the field of digital video tampering detection. In this paper, we present a new approach to detecting a double-compressed video using the proposed descriptors of video encoders. The implementation of real-time vi
APA, Harvard, Vancouver, ISO, and other styles
29

Pavlov, A. A., A. N. Tsar’kov, A. Yu Romanenko, Yu A. Romanenko, M. I. Makeev, and F. A. Pavlov. "METHODICAL APPARATUS FOR ENSURING THE CORRECTION OF SINGLE ERRORS AND DETECTION OF DOUBLE ERRORS IN STORAGE DEVICES." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 213 (March 2022): 51–56. http://dx.doi.org/10.14489/vkit.2022.03.pp.051-056.

Full text
Abstract:
The analysis of errors that occur during the operation of static storage devices (SD) is carried out. The conclusion is drawn that single and double errors are most likely to occur in memory devices (single errors appear with a probability of up to 80 %, double errors up to 20 – 25 %, and errors of other multiplicity account for up to 2 %). Methods for protecting storage devices from single and double errors are considered. It has been established that at present, for the correction of single errors and the detection of double errors, a modified Hamming code is widely used, which uses for this
APA, Harvard, Vancouver, ISO, and other styles
30

Ammar, Syed Mohammad, Norshamsuri Ali, Mohamad Naufal Saad, et al. "Development of New Spectral Amplitude Coding OCDMA Code by Using Polarization Encoding Technique." Applied Sciences 13, no. 5 (2023): 2829. http://dx.doi.org/10.3390/app13052829.

Full text
Abstract:
OCDMA is an optical access technology that has a lot of potential because it can be asynchronously accessed and provides a higher level of security. The authors presented a new DW family code, a flexible double weight (FDW) code, and a novel polarization encoding approach in this paper. The new code is applicable to both odd- and even-weighted codes. The novel polarization encoding approach may be used for numerous wavelengths that overlap. Based on analytic principles, a comparison of two widely used spectrum amplitude-coding SAC-based OCDMA codes, notably modified frequency hopping (MFH), Ha
APA, Harvard, Vancouver, ISO, and other styles
31

Donaldson, James. "TOPICS, DOUBLE CODING AND FORM FUNCTIONALITY IN THOMAS ADÈS'S PIANO QUINTET." Tempo 75, no. 298 (2021): 41–51. http://dx.doi.org/10.1017/s0040298221000383.

Full text
Abstract:
AbstractThis article interrogates the formal and expressive roles of the opening horn-call topic in Thomas Adès's Piano Quintet (2001). Although William Caplin describes the relationship of topics to form as ‘rather tenuous’, he notes that some topics have a ‘likely’ formal relation.1 Within this, he includes the rising horn call as an initiating function. Drawing upon Charles Jencks’ influential concept of double coding, which describes a sign's ‘attempt to communicate with both the public and a concerned minority’,2 I show how the Piano Quintet's horn-call opening satisfies, on one level, th
APA, Harvard, Vancouver, ISO, and other styles
32

Xu, Qiang, Dongmei Xu, Hao Wang, Zhongjie Mi, Zhe Wang, and Hong Yan. "Detecting double H.266/VVC compression with the same coding parameters." Neurocomputing 514 (December 2022): 231–44. http://dx.doi.org/10.1016/j.neucom.2022.09.153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

N.I., Ilinska. "JOHN FOWLES’ NOVEL “THE COLLECTOR” IN THE PARADIGM OF “DOUBLE CODING”." South archive (philological sciences), no. 86 (June 29, 2021): 45–52. http://dx.doi.org/10.32999/ksu2663-2691/2021-86-7.

Full text
Abstract:
The purpose of the article is to trace the creative dialogue between elite and mass literature in J.Fowles’ novel “The Collector” as a factor in creating genre modifications in the game field of postmodern literature.Methods. The complex methodology is used in the article. Structural-semantic, intertextual methods, mythopoetic approach, methods of close reading are used for the interpretation and analysis of works of art and essays by J.Fowles.Results. The article examines the strategies of the relationship between the mass and elite in J.Fowles’ novel “The Collector” (1963), which gained spec
APA, Harvard, Vancouver, ISO, and other styles
34

Cheng, L., G. G. Siu, and D. S. Chiu. "An improved design for optimum double-coding in Hadamard transform spectroscopy." Measurement Science and Technology 2, no. 12 (1991): 1177–80. http://dx.doi.org/10.1088/0957-0233/2/12/011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Kim, Eun, Seo Il, Jun Heo, and Jin Kim. "Performance of double binary turbo coding for high speed PLC systems." IEEE Transactions on Consumer Electronics 56, no. 3 (2010): 1211–17. http://dx.doi.org/10.1109/tce.2010.5606248.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Wang, Wei, and James F. Buckwalter. "Source Coding and Preemphasis for Double-Edged Pulsewidth Modulation Serial Communication." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 24, no. 2 (2016): 555–66. http://dx.doi.org/10.1109/tvlsi.2015.2409297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Siu, G. G., M. Cheng, and L. Cheng. "A single-dispersion system for optimum double-coding in Hadamard spectroscopy." Journal of Physics D: Applied Physics 29, no. 6 (1996): 1685–87. http://dx.doi.org/10.1088/0022-3727/29/6/041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Zhiqiang Liu, G. B. Giannakis, and B. L. Hughes. "Double differential space-time block coding for time-selective fading channels." IEEE Transactions on Communications 49, no. 9 (2001): 1529–39. http://dx.doi.org/10.1109/26.950340.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Porter, Scott. "Introducing perceptual coding using a double‐blind A/B testing demonstration." Journal of the Acoustical Society of America 124, no. 4 (2008): 2569. http://dx.doi.org/10.1121/1.4783104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Xu, Xiaoli, Yong Zeng, Yong Liang Guan, and Tracey Ho. "An Achievable Region for Double-Unicast Networks With Linear Network Coding." IEEE Transactions on Communications 62, no. 10 (2014): 3621–30. http://dx.doi.org/10.1109/tcomm.2014.2350982.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Jeannot, Rémi, Demin Wang, and Véronique Haese-Coat. "Binary image representation and coding by a double-recursive morphological algorithm." Signal Processing: Image Communication 8, no. 3 (1996): 241–66. http://dx.doi.org/10.1016/0923-5965(95)00045-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

., Saurabh Asija. "AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION." International Journal of Research in Engineering and Technology 04, no. 08 (2015): 343–48. http://dx.doi.org/10.15623/ijret.2015.0408058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Popplewell, A., and J. J. O'Reilly. "Manchester-like coding with single error correction and double error detection." Electronics Letters 29, no. 6 (1993): 524. http://dx.doi.org/10.1049/el:19930350.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Ezekiel, U. R., T. Sun, G. Bozek, and U. Storb. "The composition of coding joints formed in V(D)J recombination is strongly affected by the nucleotide sequence of the coding ends and their relationship to the recombination signal sequences." Molecular and Cellular Biology 17, no. 7 (1997): 4191–97. http://dx.doi.org/10.1128/mcb.17.7.4191.

Full text
Abstract:
V(D)J recombination proceeds in two stages. Precise cleavage at the border of the conserved recombination signal sequences (RSSs) and the coding ends results in flush double-stranded signal ends and coding ends terminating in hairpins. In the second stage, the signal and coding ends are processed into signal and coding joints. Coding ends containing certain nucleotide homopolymers affect the efficiency of V(D)J recombination. In this study, we have tested the effect of small changes in coding-end nucleotide composition on the frequency of coding- and signal joint formation. Furthermore, we hav
APA, Harvard, Vancouver, ISO, and other styles
45

Schlissel, Mark S. "Structure of Nonhairpin Coding-End DNA Breaks in Cells Undergoing V(D)J Recombination." Molecular and Cellular Biology 18, no. 4 (1998): 2029–37. http://dx.doi.org/10.1128/mcb.18.4.2029.

Full text
Abstract:
ABSTRACT The V(D)J recombinase recognizes a pair of immunoglobulin or T-cell receptor gene segments flanked by recombination signal sequences and introduces double-strand breaks, generating two signal ends and two coding ends. Broken coding ends were initially identified as covalently closed hairpin DNA molecules. Before recombination, however, the hairpins must be opened and the ends must be modified by nuclease digestion and N-region addition. We have now analyzed nonhairpin coding ends associated with various immunoglobulin gene segments in cells undergoing V(D)J recombination. We found tha
APA, Harvard, Vancouver, ISO, and other styles
46

Nurcahyanie, Yunia Dwie. "REDUCING THE NUMBER OF PACKAGING IN THE CODING PROCESS AT PACKAGING UNIT USING THE SIX SIGMA METHOD." Tibuana 2, no. 02 (2019): 40–49. http://dx.doi.org/10.36456/tibuana.2.02.1932.40-49.

Full text
Abstract:
Non-dairy creamer is a product made at PT. NDC as a substitute for milk or cream, which is a fat emulsion product. Krimer is packed with a 25kg small bag with an updated coding according to the lot, production time, production date, product name, and packaging date expiration date. Often there is an error in the packaging unit, especially at the coding stage with the wrong non-dairy creamer packaging code that causes packaging defects. The defects in packaging focused on the coding stage, have to be minimized. The research uses the Six Sigma method as a useful tool to increase productivity and
APA, Harvard, Vancouver, ISO, and other styles
47

Zhang Bo, 张波, та 佟玉强 Tong Yuqiang. "基于双随机相位编码的多特征人脸模板保护方法". Laser & Optoelectronics Progress 59, № 18 (2022): 1811005. http://dx.doi.org/10.3788/lop202259.1811005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Zhang Yue, 张越, 蔡怀宇 Cai Huaiyu, 盛婧 Sheng Jing, 汪毅 Wang Yi та 陈晓冬 Chen Xiaodong. "基于双螺旋相位板的单目三维编码成像". Acta Optica Sinica 44, № 9 (2024): 0911003. http://dx.doi.org/10.3788/aos231957.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Khan, Yahya, Ali Algarni, Aisha Fayomi, and Abdullah M. Almarashi. "Disbursal of Text Steganography in the Space of Double-Secure Algorithm." Mathematical Problems in Engineering 2021 (December 29, 2021): 1–9. http://dx.doi.org/10.1155/2021/7336474.

Full text
Abstract:
Hackers reveal sensitive information from encrypted conversations as the globe has become one community. As a result, steganography and cryptography are used together to safeguard sensitive data more effectively than previous approaches and newly developed algorithms. A double-secure algorithm for text steganography (DSTS) is the safest approach compared to the paragraph hiding method (PHM) and capital alphabet shape encoding (CASE) method. In this context, the paragraph hiding method uses ASCII coding, which is not a standard method, and the CASE method has a security issue that if someone un
APA, Harvard, Vancouver, ISO, and other styles
50

Zhang, Min Qing, Xiao Ling Yang, and Gang Wei Su. "A Steganographic Method Based on Double Layers Wet Paper Code in IWT Domain." Applied Mechanics and Materials 239-240 (December 2012): 1225–31. http://dx.doi.org/10.4028/www.scientific.net/amm.239-240.1225.

Full text
Abstract:
Based on wet paper code, integer wavelet and matrix coding, this paper constructs a new steganographic algorithm. Combine with the advantage in integer wavelet domain, which more close to HVS, a part of secret messages are embedded by LSB in high-frequency coefficients after integer wavelet switch, wet paper code is used to change the direction of embedding. Another part of secret messages are embedded by matrix coding in low-frequency coefficients after integer wavelet switch, wet paper code is still used to change the direction of embedding. The performance of the proposed approach shows tha
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!