To see the other types of publications on this topic, follow the link: Multiple Code Theory.

Journal articles on the topic 'Multiple Code Theory'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Multiple Code Theory.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Wang, Hong, Xiangyang Liu, Yunhong Xie, and Xiaotao Xu. "Random Multi-access Scheme Based on Group Testing Theory for Massive Machine-type Communication." Journal of Physics: Conference Series 2525, no. 1 (2023): 012027. http://dx.doi.org/10.1088/1742-6596/2525/1/012027.

Full text
Abstract:
Abstract Considering emerging massive machine-type communication with very few devices simultaneously transmitting short messages, random multiple access has currently become a research hot spot since the traditional multiple access protocol struggles to work properly. Inspired by the superimposed code, a channel assignment scheme based on non-adaptive group testing theory is proposed to allow multiple users to share a single channel at the same time. A superimposed code with threshold value d, which can recover the original code through the Boolean sum of up to d codes, is constructed by stud
APA, Harvard, Vancouver, ISO, and other styles
2

Bucci, Wilma. "Symptoms and symbols: A multiple code theory of Somatization." Psychoanalytic Inquiry 17, no. 2 (1997): 151–72. http://dx.doi.org/10.1080/07351699709534117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shokrollahi, A., B. Hassibi, B. M. Hochwald, and W. Sweldens. "Representation theory for high-rate multiple-antenna code design." IEEE Transactions on Information Theory 47, no. 6 (2001): 2335–67. http://dx.doi.org/10.1109/18.945251.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bucci, Wilma. "Dissociation from the Perspective of Multiple Code Theory, Part I." Contemporary Psychoanalysis 43, no. 2 (2007): 165–84. http://dx.doi.org/10.1080/00107530.2007.10745903.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bucci, Wilma. "Dissociation from the Perspective of Multiple Code Theory—Part II." Contemporary Psychoanalysis 43, no. 3 (2007): 305–26. http://dx.doi.org/10.1080/00107530.2007.10745912.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bornstein, Robert F. "Review of Psychoanalysis and cognitive science: A multiple code theory." Psychoanalytic Psychology 15, no. 4 (1998): 569–75. http://dx.doi.org/10.1037/h0092769.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Shangdi, and Dawei Zhao. "Construction of Multi-receiver Multi-fold Authentication Codes from Singular Symplectic Geometry over Finite Fields." Algebra Colloquium 20, no. 04 (2013): 701–10. http://dx.doi.org/10.1142/s1005386713000679.

Full text
Abstract:
As an extension of the basic model of MRA-codes, multi-receiver multi-fold authentication codes can use a single key distribution phase for multiple message transmission. A multi-receiver multi-fold authentication code is constructed from the singular symplectic geometry over finite fields in this paper. The parameters and probabilities of success in impersonation and substitution attacks by malicious groups of receivers of this code are computed.
APA, Harvard, Vancouver, ISO, and other styles
8

Kesselring, Markus S., Fernando Pastawski, Jens Eisert, and Benjamin J. Brown. "The boundaries and twist defects of the color code and their applications to topological quantum computation." Quantum 2 (October 19, 2018): 101. http://dx.doi.org/10.22331/q-2018-10-19-101.

Full text
Abstract:
The color code is both an interesting example of an exactly solved topologically ordered phase of matter and also among the most promising candidate models to realize fault-tolerant quantum computation with minimal resource overhead. The contributions of this work are threefold. First of all, we build upon the abstract theory of boundaries and domain walls of topological phases of matter to comprehensively catalog the objects realizable in color codes. Together with our classification we also provide lattice representations of these objects which include three new types of boundaries as well a
APA, Harvard, Vancouver, ISO, and other styles
9

Khurana, Rupali, and Ekta Narwal. "Analysis of code-based digital signature schemes." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (2023): 5534–41. https://doi.org/10.11591/ijece.v13i5.pp5534-5541.

Full text
Abstract:
Digital signatures are in high demand because they allow authentication and non-repudiation. Existing digital signature systems, such as digital signature algorithm (DSA), elliptic curve digital signature algorithm (ECDSA), and others, are based on number theory problems such as discrete logarithmic problems and integer factorization problems. These recently used digital signatures are not secure with quantum computers. To protect against quantum computer attacks, many researchers propose digital signature schemes based on error-correcting codes such as linear, Goppa, polar, and so on. We stud
APA, Harvard, Vancouver, ISO, and other styles
10

Yan, Xiren, and Qiyi Wang. "Coding of Shared Track Gray Encoder." Journal of Dynamic Systems, Measurement, and Control 122, no. 3 (1999): 573–76. http://dx.doi.org/10.1115/1.1286628.

Full text
Abstract:
A conventional absolute encoder consists of multiple tracks and therefore has a large size. Based on the theory of shared control, a new kind of absolute encoder called the shared track Gray encoder is proposed. This encoder has only one track, and the code has the characteristics of Gray code. In this paper, first the working principle of the encoder is introduced and the existence condition of the codes for the shared track Gray encoder is derived. Then the search procedure for the codes using self-developed assembler programs is given. Finally, the pattern of the encoder is presented. Since
APA, Harvard, Vancouver, ISO, and other styles
11

Li, Na. "Decoding Anti-Identity: A Barthesian Analysis of Cultural Trauma in Philip Roth’s The Human Stain." International Journal of Education and Humanities 4, no. 4 (2024): 501–11. http://dx.doi.org/10.58557/(ijeh).v4i4.272.

Full text
Abstract:
This study addresses the cultural and psychological trauma experienced by the protagonist, Coleman Silk, in Philip Roth’s The Human Stain (2000), particularly as an African-American navigating a white-dominated society during the Clinton era. The novel explores issues of racial discrimination, political correctness, and a prevailing spirit of persecution in American society, leading to Coleman’s eventual loss of self-identity and his tragic search for it. This study aims to analyze the anti-identity motif within Roth’s novel by applying Roland Barthes’ code theory. By decoding the various narr
APA, Harvard, Vancouver, ISO, and other styles
12

Tran, Vinh T., Nagaraj C. Shivaramaiah, Thuan D. Nguyen, Joon W. Cheong, Eamonn P. Glennon, and Andrew G. Dempster. "Generalised Theory on the Effects of Sampling Frequency on GNSS Code Tracking." Journal of Navigation 71, no. 2 (2017): 257–80. http://dx.doi.org/10.1017/s0373463317000741.

Full text
Abstract:
Synchronisation of the received Pseudorandom (PRN) code and its locally generated replica is fundamental when estimating user position in Global Navigation Satellite System (GNSS) receivers. It has been observed through experiments that user position accuracy decreases if sampling frequency is an integer multiple of the nominal code rate. This paper provides an accuracy analysis based on the number of samples and the residual code phase of each code chip. The outcomes reveal that the distribution of residual code phases in the code phase range [0, 1/ns), where ns is the number of samples per c
APA, Harvard, Vancouver, ISO, and other styles
13

Kong, Siran. "Analysis of the Encoding and Decoding Process of Polar Code." Highlights in Science, Engineering and Technology 53 (June 30, 2023): 144–52. http://dx.doi.org/10.54097/hset.v53i.9702.

Full text
Abstract:
This paper briefly introduces the history of channel coding from the hamming code to the newest polar code. Then it introduces that the polar code is the only one that can reach the Shannon limit. With such a crucial technique, this study set it as the core research target of this article. After pointing out the target and the content of the polar code, this paper explains the core principle, which is the channel polarization theory. It also contains channel polarization's two components, the channel combining and splitting theory. In the main part, this paper explains the encoding and decodin
APA, Harvard, Vancouver, ISO, and other styles
14

Lim, Sung Hoon, Chen Feng, Adriano Pastore, Bobak Nazer, and Michael Gastpar. "Towards an Algebraic Network Information Theory: Simultaneous Joint Typicality Decoding." IEEE Transactions on Information Theory 66, no. 10 (2020): 6242–55. https://doi.org/10.1109/TIT.2020.3009634.

Full text
Abstract:
Algebraic network information theory is an emerging facet of network information theory, studying the achievable rates of random code ensembles that have algebraic structure, such as random linear codes. A distinguishing feature is that linear combinations of codewords can sometimes be decoded more efficiently than codewords themselves. The present work further develops this framework by studying the simultaneous decoding of multiple messages. Specifically, consider a receiver in a multi-user network that wishes to decode several messages. Simultaneous joint typicality decoding is one of the m
APA, Harvard, Vancouver, ISO, and other styles
15

Isbell, Daniel S. "Developing Flexible Musicianship: Insights from Code-Switchers." Music Educators Journal 110, no. 1 (2023): 54–59. http://dx.doi.org/10.1177/00274321231199474.

Full text
Abstract:
Much like an effective speaker, a flexible musician is competent across multiple settings. The sociolinguistic theory of code-switching can be a useful tool to better understand how musicians acquire a set of skills and knowledge to support music-making in a range of activities in and outside of school and throughout society. In this article, readers learn about the specific skills and knowledge musical code-switchers rely on the most when moving among a diverse range of musical events. This article includes examples of how code-switching experiences can improve music classes, lessons, and reh
APA, Harvard, Vancouver, ISO, and other styles
16

CHEN, S., W. T. TSAI, and X. P. CHEN. "SAMEA: OBJECT-ORIENTED SOFTWARE MAINTENANCE ENVIRONMENT FOR ASSEMBLY PROGRAMS." International Journal of Software Engineering and Knowledge Engineering 02, no. 02 (1992): 197–226. http://dx.doi.org/10.1142/s0218194092000105.

Full text
Abstract:
This paper presents a software maintenance environment for assembly programs, SAMEA. It presents an object-oriented database support for displaying, understanding, modifying and configuring assembly programs for software maintenance. Understanding of assembly programs is based on the theory of explicit representation of various structural and functionality elements of code and multiple relationships among them. Modification of program is based on an object-oriented incremental editor and a set of rules to check the correctness of instruction format. The characteristics of SAMEA are: integratio
APA, Harvard, Vancouver, ISO, and other styles
17

EMMART, NIALL, and CHARLES WEEMS. "SEARCH-BASED AUTOMATIC CODE GENERATION FOR MULTIPRECISION MODULAR EXPONENTIATION ON MULTIPLE GENERATIONS OF GPU." Parallel Processing Letters 23, no. 04 (2013): 1340009. http://dx.doi.org/10.1142/s0129626413400094.

Full text
Abstract:
Multiprecision modular exponentiation has a variety of uses, including cryptography, prime testing and computational number theory. It is also a very costly operation to compute. GPU parallelism can be used to accelerate these computations, but to use the GPU efficiently, a problem must involve many simultaneous exponentiation operations. Handling a large number of TLS/SSL encrypted sessions in a data center is an important problem that fits this profile. We are developing a framework that enables generation of highly efficient implementations of exponentiation operations for different NVIDIA
APA, Harvard, Vancouver, ISO, and other styles
18

Ni'amah, Khoirun. "Broadband Channel Based on Polar Codes At 2.3 GHz Frequency for 5G Networks in Digitalization Era." JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING 6, no. 1 (2022): 247–57. http://dx.doi.org/10.31289/jite.v6i1.7310.

Full text
Abstract:
This research using a polar code-based broadband channel that is affected by human blockage using one of the 5G cellular network frequencies at 2.3 GHz, 99 MHz bandwidth, 128 blocks of Fast Fourier Transform (FFT) with Cyclic prefix-Orthogonal Frequency Division Multiplexing ( CP-OFDM) and Binary Shift Keying (BPSK) modulation. The use of high frequencies causes the technology to be sensitive to the surrounding environment and attenuation such as human blockage. Broadband channel modeling on a 5G network is presented in a representative Power Delay Profile (PDP) with the influence of human blo
APA, Harvard, Vancouver, ISO, and other styles
19

Fan, Jihao, Yonghui Li, Min-Hsiu Hsieh, and Hanwu Chen. "On quantum tensor product codes." Quantum Information and Computation 17, no. 13&14 (2017): 1105–22. http://dx.doi.org/10.26421/qic17.13-14-3.

Full text
Abstract:
We present a general framework for the construction of quantum tensor product codes (QTPC). In a classical tensor product code (TPC), its parity check matrix is constructed via the tensor product of parity check matrices of the two component codes. We show that by adding some constraints on the component codes, several classes of dual-containing TPCs can be obtained. By selecting different types of component codes, the proposed method enables the construction of a large family of QTPCs and they can provide a wide variety of quantum error control abilities. In particular, if one of the componen
APA, Harvard, Vancouver, ISO, and other styles
20

KAMEYAMA, Michitaka, and Saneaki TAMAKI. "Code Assignment Algorithm for Highly Parallel Multiple-Valued k-Ary Operation Circuits Using Partition Theory." Interdisciplinary Information Sciences 3, no. 1 (1997): 13–24. http://dx.doi.org/10.4036/iis.1997.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Di Trani, Michela, Rachele Mariani, Alessia Renzi, Paul Samuel Greenman, and Luigi Solano. "Alexithymia according to Bucci's multiple code theory: A preliminary investigation with healthy and hypertensive individuals." Psychology and Psychotherapy: Theory, Research and Practice 91, no. 2 (2017): 232–47. http://dx.doi.org/10.1111/papt.12158.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Solano, Luigi. "Some thoughts between body and mind in the light of Wilma Bucci’s multiple code theory." International Journal of Psychoanalysis 91, no. 6 (2010): 1445–64. http://dx.doi.org/10.1111/j.1745-8315.2010.00359.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Wang, Letian, Ziyu Meng, Fei Dong, Xiao Yang, Xiaoming Xi, and Xiushan Nie. "Attention-Oriented Deep Multi-Task Hash Learning." Electronics 12, no. 5 (2023): 1226. http://dx.doi.org/10.3390/electronics12051226.

Full text
Abstract:
Hashing has wide applications in image retrieval at large scales due to being an efficient approach to approximate nearest neighbor calculation. It can squeeze complex high-dimensional arrays via binarization while maintaining the semantic properties of the original samples. Currently, most existing hashing methods always predetermine the stable length of hash code before training the model. It is inevitable for these methods to increase the computing time, as the code length converts, caused by the task requirements changing. A single hash code fails to reflect the semantic relevance. Toward
APA, Harvard, Vancouver, ISO, and other styles
24

Khurana, Rupali, and Ekta Narwal. "Analysis of code-based digital signature schemes." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (2023): 5534. http://dx.doi.org/10.11591/ijece.v13i5.pp5534-5541.

Full text
Abstract:
<span lang="EN-US">Digital signatures are in high demand because they allow authentication and non-repudiation. Existing digital signature systems, such as digital signature algorithm (DSA), elliptic curve digital signature algorithm (ECDSA), and others, are based on number theory problems such as discrete logarithmic problems and integer factorization problems. These recently used digital signatures are not secure with quantum computers. To protect against quantum computer attacks, many researchers propose digital signature schemes based on error-correcting codes such as linear, Goppa,
APA, Harvard, Vancouver, ISO, and other styles
25

Shinohara, Katsuyuki, and Toshi Minami. "Encoding of line drawings with multiple hexagonal grid chain code." Systems and Computers in Japan 17, no. 12 (1986): 1–10. http://dx.doi.org/10.1002/scj.4690171201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Galetti, Erica, David Halliday, and Andrew Curtis. "A simple and exact acoustic wavefield modeling code for data processing, imaging, and interferometry applications." GEOPHYSICS 78, no. 6 (2013): F17—F27. http://dx.doi.org/10.1190/geo2012-0443.1.

Full text
Abstract:
Improvements in industrial seismic, seismological, acoustic, or interferometric theory and applications often result in quite subtle changes in sound quality, seismic images, or information which are nevertheless crucial for improved interpretation or experience. When evaluating new theories and algorithms using synthetic data, an important aspect of related research is therefore that numerical errors due to wavefield modeling are reduced to a minimum. We present a new MATLAB code based on the Foldy method that models theoretically exact, direct, and scattered parts of a wavefield. Its main ad
APA, Harvard, Vancouver, ISO, and other styles
27

Refira, Spania. "Code-Mixing Used by Jerome Polin and Livy Renata in the Jerome Goes to School Vlogs." k@ta kita 12, no. 2 (2024): 208–15. http://dx.doi.org/10.9744/katakita.12.2.208-215.

Full text
Abstract:
This study analyzes Jerome Polin’s and Livy Renata’s use of code-mixing in a Jerome Goes to School vlog. Muysken’s (2000) code-mixing theory is used as the primary framework, supported by Holmes’ (2013) social factors theory. A qualitative approach is employed, complemented by numerical data. The findings reveal six similarities and five differences in Jerome Polin’s and Livy Renata’s code-mixing practices. Similarities include the use of all three types of code-mixing (insertion, alternation, and congruent lexicalization), with insertion being the most common and congruent lexicalization the
APA, Harvard, Vancouver, ISO, and other styles
28

Catrina, Mae S. Tulinao, and C. Bool Nelson. "Enhancing Customer Outcomes in Retail Pharmacy: The Effect of QR Code Implementation Assessed Through Service Quality Theory and Multiple Regression Analysis." Journal of Economics, Finance And Management Studies 08, no. 05 (2025): 3387–94. https://doi.org/10.5281/zenodo.15561272.

Full text
Abstract:
This study examines the effects of QR code implementation in retail pharmacy settings, focusing on how digital innovation influences customer satisfaction, trust, and repurchase intention through the lens of service quality theory. Two primary research questions guide the analysis: identifying the factors that affect customer outcomes before and after QR code adoption, and assessing how the relationships between service quality dimensions—service quality, waiting time, and store attributes—and customer outcomes evolve following implementation. Using multiple regression analysis, th
APA, Harvard, Vancouver, ISO, and other styles
29

Tseng, Shin-Pin, Eddy Wijanto, Po-Han Lai, and Hsu-Chih Cheng. "Bipolar Optical Code Division Multiple Access Techniques Using a Dual Electro-Optical Modulator Implemented in Free-Space Optics Communications." Sensors 20, no. 12 (2020): 3583. http://dx.doi.org/10.3390/s20123583.

Full text
Abstract:
This study developed a bipolar optical code division multiple access (Bi-OCDMA) technique based on spectral amplitude coding for the formation and transmission of optical-polarized and coded signals over wireless optical channels. Compared with conventional Bi-OCDMA schemes, the proposed free-space optics communication system that uses a dual electro-optical modulator design improves the transmission rate. In theory, multiple access interference can be removed by using correlation subtraction schemes. The experiment results revealed that the proposed system can be employed to accurately extrac
APA, Harvard, Vancouver, ISO, and other styles
30

Minami, Toshi, and Katsuyuki Shinohara. "Encoding of Line Drawings with a Multiple Grid Chain Code." IEEE Transactions on Pattern Analysis and Machine Intelligence PAMI-8, no. 2 (1986): 269–76. http://dx.doi.org/10.1109/tpami.1986.4767780.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

klinkenberg, David. "The Gnostic Code." European Journal of Historical Research 3, no. 1 (2024): 13–18. http://dx.doi.org/10.47672/ejhr.1796.

Full text
Abstract:
Purpose: The aim of the study was to the gnostic code.
 Materials and Methods: This study adopted a desk methodology. A desk study research design is commonly known as secondary data collection. This is basically collecting data from existing resources preferably because of its low cost advantage as compared to a field research. Our current study looked into already published studies and reports as the data was easily accessed through online journals and libraries.
 Findings: The Gnostic parables excerpted above are sufficient to establish that a code was functioning in these documen
APA, Harvard, Vancouver, ISO, and other styles
32

Li, Wen, Junfei Xu, and Qi Chen. "Knowledge Distillation-Based Multilingual Code Retrieval." Algorithms 15, no. 1 (2022): 25. http://dx.doi.org/10.3390/a15010025.

Full text
Abstract:
Semantic code retrieval is the task of retrieving relevant codes based on natural language queries. Although it is related to other information retrieval tasks, it needs to bridge the gaps between the language used in the code (which is usually syntax-specific and logic-specific) and the natural language which is more suitable for describing ambiguous concepts and ideas. Existing approaches study code retrieval in a natural language for a specific programming language, however it is unwieldy and often requires a large amount of corpus for each language when dealing with multilingual scenarios.
APA, Harvard, Vancouver, ISO, and other styles
33

Sufi, Fahim. "Algorithms in Low-Code-No-Code for Research Applications: A Practical Review." Algorithms 16, no. 2 (2023): 108. http://dx.doi.org/10.3390/a16020108.

Full text
Abstract:
Algorithms have evolved from machine code to low-code-no-code (LCNC) in the past 20 years. Observing the growth of LCNC-based algorithm development, the CEO of GitHub mentioned that the future of coding is no coding at all. This paper systematically reviewed several of the recent studies using mainstream LCNC platforms to understand the area of research, the LCNC platforms used within these studies, and the features of LCNC used for solving individual research questions. We identified 23 research works using LCNC platforms, such as SetXRM, the vf-OS platform, Aure-BPM, CRISP-DM, and Microsoft
APA, Harvard, Vancouver, ISO, and other styles
34

Cleveland, Marisa, and Simon Cleveland. "Exploring Public Relations in the Firm." International Journal of Smart Education and Urban Society 12, no. 4 (2021): 52–62. http://dx.doi.org/10.4018/ijseus.2021100105.

Full text
Abstract:
While postmodern theory has been explored within multiple domains, its application to the domain of public relations is somewhat scant. As a result, constructs, such as power, crisis communication, and code of ethics within the communication profession in the firm require further examination. This study investigates the current postmodernist perspective within organization theory and expands the body of knowledge on postmodernism and public relations through the application of seminal audit literature analysis.
APA, Harvard, Vancouver, ISO, and other styles
35

Tan, Wen Jun, Wai Teng Tang, Rick Siow Mong Goh, Stephen John Turner, and Weng-Fai Wong. "A Code Generation Framework for Targeting Optimized Library Calls for Multiple Platforms." IEEE Transactions on Parallel and Distributed Systems 26, no. 7 (2015): 1789–99. http://dx.doi.org/10.1109/tpds.2014.2329494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Marquardt, Kyle L., and Daniel Pemstein. "IRT Models for Expert-Coded Panel Data." Political Analysis 26, no. 4 (2018): 431–56. http://dx.doi.org/10.1017/pan.2018.28.

Full text
Abstract:
Data sets quantifying phenomena of social-scientific interest often use multiple experts to code latent concepts. While it remains standard practice to report the average score across experts, experts likely vary in both their expertise and their interpretation of question scales. As a result, the mean may be an inaccurate statistic. Item-response theory (IRT) models provide an intuitive method for taking these forms of expert disagreement into account when aggregating ordinal ratings produced by experts, but they have rarely been applied to cross-national expert-coded panel data. We investiga
APA, Harvard, Vancouver, ISO, and other styles
37

Ilic, Radovan, Vesna Jokic-Spasic, Petar Belicev, and Milos Dragovic. "The Monte Carlo srna code as the engine in istar proton dose planning software for the tesla accelerator installation." Nuclear Technology and Radiation Protection 19, no. 2 (2004): 30–35. http://dx.doi.org/10.2298/ntrp0402030i.

Full text
Abstract:
This paper describes the application of SRNA Monte Carlo package for proton transport simulations in complex geometry and different material composition. SRNA package was developed for 3D dose distribution calculation in proton therapy and dosimetry and it was based on the theory of multiple scattering. The compound nuclei decay was simulated by our own and the Russian MSDM models using ICRU 63 data. The developed package consists of two codes SRNA-2KG, which simulates proton transport in the combinatorial geometry and SRNA-VOX, which uses the voxelized geometry using the CT data and conversio
APA, Harvard, Vancouver, ISO, and other styles
38

Sinulingga, Eka Via Angga. "CODE MIXING USED IN TASYA FARASYA BEAUTY VLOGS." Prosodi 17, no. 2 (2023): 248–59. http://dx.doi.org/10.21107/prosodi.v17i2.21390.

Full text
Abstract:
This study entitled “Code Mixing Used In Tasya Farasya Beauty Vlogs”. Beauty vloggers often share information about the cosmetic products they use or review beauty and make-up products. Sometimes they mix several languages in their videos, such as mixing English with Indonesian. Language has a very important role in our life. We use language for communicating and people nowadays speak in multiple languages. According to the phenomenon above, this research focuses on code mixing in one of Tasya Farasya's beauty vlogs on her YouTube channel, level of code mixing and to find the reasons why Tasya
APA, Harvard, Vancouver, ISO, and other styles
39

Zhou, Fangming, Lulu Zhao, Limin Li, et al. "GNSS Signal Acquisition Algorithm Based on Two-Stage Compression of Code-Frequency Domain." Applied Sciences 12, no. 12 (2022): 6255. http://dx.doi.org/10.3390/app12126255.

Full text
Abstract:
The recently-emerging compressed sensing (CS) theory makes GNSS signal processing at a sub-Nyquist rate possible if it has a sparse representation in certain domain. The previously proposed code-domain compression acquisition algorithms have high computational complexity and low acquisition accuracy under high dynamic conditions. In this paper, a GNSS signal acquisition algorithm based on two-stage compression of the code-frequency domain is proposed. The algorithm maps the incoming signal of the same interval to multiple carrier frequency bins and overlaps the mapped signal that belongs to th
APA, Harvard, Vancouver, ISO, and other styles
40

Moses, D. M., and H. G. L. Prion. "A three-dimensional model for bolted connections in wood." Canadian Journal of Civil Engineering 30, no. 3 (2003): 555–67. http://dx.doi.org/10.1139/l03-009.

Full text
Abstract:
Recent criticism of the bolted connection requirements in the Canadian wood design code CSA Standard O86 indicates that the code lacks consideration of the different modes of failure, particularly as they relate to multiple-bolt connections. A finite element model is proposed to predict load–displacement behaviour, stress distributions, ultimate strength, and mode of failure in single- and multiple-bolt connections. The three-dimensional (3-D) model uses anisotropic plasticity for the wood member and elastoplasticity for the bolt. The Weibull weakest link theory is used to predict failure at g
APA, Harvard, Vancouver, ISO, and other styles
41

Henrici, Dirk, and Lars Wischhof. "Towalink: An open and flexible site networking solution." Telfor Journal 16, no. 1 (2024): 2–7. http://dx.doi.org/10.5937/telfor2401002h.

Full text
Abstract:
Securely and reliably connecting multiple operating sites using existing Internet access lines is a common requirement for companies as well as individuals. Towalink is a new open and flexible solution for interconnecting multiple network sites reliably and securely. It is built around proven open-source projects and by itself published open-source. We present in theory and based on a practical setup the central management it provides and show how it is following the infrastructure-as-code paradigm.
APA, Harvard, Vancouver, ISO, and other styles
42

Mariani, R., M. Di Trani, A. Negri, and R. Tambelli. "Linguistic analysis of autobiographical narratives in unipolar and bipolar mood disorders in light of multiple code theory." Journal of Affective Disorders 273 (August 2020): 24–31. http://dx.doi.org/10.1016/j.jad.2020.03.170.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Akimova, Natalia. "News Sites Psycholinguistics Code: Collective Authorship." PSYCHOLINGUISTICS 22, no. 1 (2017): 15–26. https://doi.org/10.5281/zenodo.1087458.

Full text
Abstract:
<strong><em>ABSTRACT</em></strong> <em>The article deals with the problem of Internet news authorship</em><em> and its psychological consequences for recipients</em><em>. The theory about collective authorship in the network is proposed. Linguistic markers to discover collective authorship in news sites are identified. There are examples from runet and ukrnet, particularly several news announcements have been analyzed, comments have been provided that explain inconsistency, fragmentary, surplus multiple meaning of these utterances. The <strong>methods</strong> of analysis and synthesis, descri
APA, Harvard, Vancouver, ISO, and other styles
44

PLONSKI, ISIDOR S. "Multiple original spellings, living authors and the Code: The case of Malachius raniansis Mawlood, Hammamurad & Abdulla, 2017 (Coleoptera: Melyridae)." Zootaxa 4927, no. 2 (2021): 297–300. http://dx.doi.org/10.11646/zootaxa.4927.2.11.

Full text
Abstract:
The present communication is primarily nomenclaturial–classical taxonomy is only touched in a side note on a diagnosis. It uses technical terminology coined by Alain Dubois, who is interested in the study of the concepts and theory of biological nomenclature (i.e. the “objective connection between the real world of populations of organisms and the world of language” (Dubois &amp; Ohler 1997)), and who discusses the current ‘International Code for Zoological Nomenclature’ [hereafter just called ‘the Code’] in great detail. The terms are explained where necessary–but see also the glossaries in D
APA, Harvard, Vancouver, ISO, and other styles
45

Verzun, N. A., A. M. Kolbanev, and M. O. Kolbanev. "An Algorithm for Synthesizing Groups of Codes in an RFID Multiple Access System." Proceedings of Telecommunication Universities 10, no. 6 (2024): 68–78. https://doi.org/10.31854/1813-324x-2024-10-6-68-78.

Full text
Abstract:
Relevance. One of the problems that must be solved when creating RFID systems is the reader's multiple access to a group of tags located in a limited space, since the reading signal causes a one-time response of many tags, which leads to collisions (conflicts) of response signals. This problem has not been solved in relation to passive tags without a chip, based on surface acoustic wave technologies, the code of which is laid down during manufacture and cannot be changed during operation. The purpose of the study is to develop algorithms that allow synthesizing such groups of codes that would
APA, Harvard, Vancouver, ISO, and other styles
46

Alalloh, Roisatul Muttaqin. "Code Mixing in Female Teenagers’ Daily Conversation at An English Dormitory." Language Horizon: Journal of Language Studies 11, no. 2 (2023): 50–57. http://dx.doi.org/10.26740/lh.v11n2.p50-57.

Full text
Abstract:
The phenomenon of code-mixing is a common occurrence, particularly among multilingual people. Code mixing refers to combining two or more languages in which lexical and grammatical elements from multiple languages occur in a single sentence. This study deals with code-mixing in the females' English dormitory at the Islamic boarding school Al-yasini Pasuruan. The objectives of this study are to classify the types of code-mixing used, and reveal the factors that cause them to do code mixing. This study used qualitative method for collecting and processing the data, while in the form of words, ph
APA, Harvard, Vancouver, ISO, and other styles
47

Matveev, Nikolay, and Andrey Turlikov. "Review of random multiple access methods for massive machine type communication." Information and Control Systems, no. 6 (January 16, 2020): 54–67. http://dx.doi.org/10.31799/1684-8853-2019-6-54-67.

Full text
Abstract:
Introduction: Intensive research is currently underway in the field of data transmission systems for the Internet of Things in relation to various scenarios of Massive Machine Type Communication. The presence of a large number of devices in such systems necessitates the use the methods of random multiple access to a common communication channel. It is proposed in some works to increase the channel utilization efficiency by the use of error correction coding methods for conflict resolution (Coded Random Access). The vast variety of options for using such communication systems has made it imposs
APA, Harvard, Vancouver, ISO, and other styles
48

Ciriaco, Fernando, Taufik Abrão, and Paul Jean E. Jeszensky. "DS/CDMA Multiuser Detection with Evolutionary Algorithms." JUCS - Journal of Universal Computer Science 12, no. (4) (2006): 450–80. https://doi.org/10.3217/jucs-012-04-0450.

Full text
Abstract:
This work analyses two heuristic algorithms based on the genetic evolution theory applied to direct sequence code division multiple access (DS/CDMA) com­ munication systems. For different phases of an evolutionary algorithm new biological processes are analyzed, specially adapted to the multiuser detection (MuD) problem in multipath fading channels. Monte Carlo simulation results show that the detection based on evolutionary heuristic algorithms is a viable option when compared with the optimum solution (ML ­ maximum likelihood), even for hostile channel conditions and severe system operation.
APA, Harvard, Vancouver, ISO, and other styles
49

Kurniawan, Judhariksawan, Slamet Sampurno, and Maskun. "The Regulations of The Law Concerning Hate Speech Offenses." Journal of Law and Sustainable Development 11, no. 12 (2023): e1816. http://dx.doi.org/10.55908/sdgs.v11i12.1896.

Full text
Abstract:
Objective: This research aims to examine the legal regulations of hate speech crimes in the ITE Law and the Indonesian Criminal Code (KUHP), and further explore the resolution of hate speech conflicts. Theoretical Framework: The theoretical foundations include Legal Certainty theory, Law Enforcement theory, and Legal Convergence theory concerning hate speech conflict resolution following the principle of legal certainty. Method: This study employs a qualitative normative approach (doctrinal) utilizing various legal instruments and indirect observation through conceptual, historical, legal, com
APA, Harvard, Vancouver, ISO, and other styles
50

Miguel de Almeida Areias, Pedro, Timon Rabczuk, and Joaquim Infante Barbosa. "The extended unsymmetric frontal solution for multiple-point constraints." Engineering Computations 31, no. 7 (2014): 1582–607. http://dx.doi.org/10.1108/ec-10-2013-0263.

Full text
Abstract:
Purpose – The purpose of this paper is to discuss the linear solution of equality constrained problems by using the Frontal solution method without explicit assembling. Design/methodology/approach – Re-written frontal solution method with a priori pivot and front sequence. OpenMP parallelization, nearly linear (in elimination and substitution) up to 40 threads. Constraints enforced at the local assembling stage. Findings – When compared with both standard sparse solvers and classical frontal implementations, memory requirements and code size are significantly reduced. Research limitations/impl
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!