Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Multiple Code Theory.

Articles de revues sur le sujet « Multiple Code Theory »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Multiple Code Theory ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.

1

Wang, Hong, Xiangyang Liu, Yunhong Xie, and Xiaotao Xu. "Random Multi-access Scheme Based on Group Testing Theory for Massive Machine-type Communication." Journal of Physics: Conference Series 2525, no. 1 (2023): 012027. http://dx.doi.org/10.1088/1742-6596/2525/1/012027.

Texte intégral
Résumé :
Abstract Considering emerging massive machine-type communication with very few devices simultaneously transmitting short messages, random multiple access has currently become a research hot spot since the traditional multiple access protocol struggles to work properly. Inspired by the superimposed code, a channel assignment scheme based on non-adaptive group testing theory is proposed to allow multiple users to share a single channel at the same time. A superimposed code with threshold value d, which can recover the original code through the Boolean sum of up to d codes, is constructed by stud
Styles APA, Harvard, Vancouver, ISO, etc.
2

Bucci, Wilma. "Symptoms and symbols: A multiple code theory of Somatization." Psychoanalytic Inquiry 17, no. 2 (1997): 151–72. http://dx.doi.org/10.1080/07351699709534117.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Shokrollahi, A., B. Hassibi, B. M. Hochwald, and W. Sweldens. "Representation theory for high-rate multiple-antenna code design." IEEE Transactions on Information Theory 47, no. 6 (2001): 2335–67. http://dx.doi.org/10.1109/18.945251.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Bucci, Wilma. "Dissociation from the Perspective of Multiple Code Theory, Part I." Contemporary Psychoanalysis 43, no. 2 (2007): 165–84. http://dx.doi.org/10.1080/00107530.2007.10745903.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Bucci, Wilma. "Dissociation from the Perspective of Multiple Code Theory—Part II." Contemporary Psychoanalysis 43, no. 3 (2007): 305–26. http://dx.doi.org/10.1080/00107530.2007.10745912.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Bornstein, Robert F. "Review of Psychoanalysis and cognitive science: A multiple code theory." Psychoanalytic Psychology 15, no. 4 (1998): 569–75. http://dx.doi.org/10.1037/h0092769.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Chen, Shangdi, and Dawei Zhao. "Construction of Multi-receiver Multi-fold Authentication Codes from Singular Symplectic Geometry over Finite Fields." Algebra Colloquium 20, no. 04 (2013): 701–10. http://dx.doi.org/10.1142/s1005386713000679.

Texte intégral
Résumé :
As an extension of the basic model of MRA-codes, multi-receiver multi-fold authentication codes can use a single key distribution phase for multiple message transmission. A multi-receiver multi-fold authentication code is constructed from the singular symplectic geometry over finite fields in this paper. The parameters and probabilities of success in impersonation and substitution attacks by malicious groups of receivers of this code are computed.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Kesselring, Markus S., Fernando Pastawski, Jens Eisert, and Benjamin J. Brown. "The boundaries and twist defects of the color code and their applications to topological quantum computation." Quantum 2 (October 19, 2018): 101. http://dx.doi.org/10.22331/q-2018-10-19-101.

Texte intégral
Résumé :
The color code is both an interesting example of an exactly solved topologically ordered phase of matter and also among the most promising candidate models to realize fault-tolerant quantum computation with minimal resource overhead. The contributions of this work are threefold. First of all, we build upon the abstract theory of boundaries and domain walls of topological phases of matter to comprehensively catalog the objects realizable in color codes. Together with our classification we also provide lattice representations of these objects which include three new types of boundaries as well a
Styles APA, Harvard, Vancouver, ISO, etc.
9

Khurana, Rupali, and Ekta Narwal. "Analysis of code-based digital signature schemes." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (2023): 5534–41. https://doi.org/10.11591/ijece.v13i5.pp5534-5541.

Texte intégral
Résumé :
Digital signatures are in high demand because they allow authentication and non-repudiation. Existing digital signature systems, such as digital signature algorithm (DSA), elliptic curve digital signature algorithm (ECDSA), and others, are based on number theory problems such as discrete logarithmic problems and integer factorization problems. These recently used digital signatures are not secure with quantum computers. To protect against quantum computer attacks, many researchers propose digital signature schemes based on error-correcting codes such as linear, Goppa, polar, and so on. We stud
Styles APA, Harvard, Vancouver, ISO, etc.
10

Yan, Xiren, and Qiyi Wang. "Coding of Shared Track Gray Encoder." Journal of Dynamic Systems, Measurement, and Control 122, no. 3 (1999): 573–76. http://dx.doi.org/10.1115/1.1286628.

Texte intégral
Résumé :
A conventional absolute encoder consists of multiple tracks and therefore has a large size. Based on the theory of shared control, a new kind of absolute encoder called the shared track Gray encoder is proposed. This encoder has only one track, and the code has the characteristics of Gray code. In this paper, first the working principle of the encoder is introduced and the existence condition of the codes for the shared track Gray encoder is derived. Then the search procedure for the codes using self-developed assembler programs is given. Finally, the pattern of the encoder is presented. Since
Styles APA, Harvard, Vancouver, ISO, etc.
11

Li, Na. "Decoding Anti-Identity: A Barthesian Analysis of Cultural Trauma in Philip Roth’s The Human Stain." International Journal of Education and Humanities 4, no. 4 (2024): 501–11. http://dx.doi.org/10.58557/(ijeh).v4i4.272.

Texte intégral
Résumé :
This study addresses the cultural and psychological trauma experienced by the protagonist, Coleman Silk, in Philip Roth’s The Human Stain (2000), particularly as an African-American navigating a white-dominated society during the Clinton era. The novel explores issues of racial discrimination, political correctness, and a prevailing spirit of persecution in American society, leading to Coleman’s eventual loss of self-identity and his tragic search for it. This study aims to analyze the anti-identity motif within Roth’s novel by applying Roland Barthes’ code theory. By decoding the various narr
Styles APA, Harvard, Vancouver, ISO, etc.
12

Tran, Vinh T., Nagaraj C. Shivaramaiah, Thuan D. Nguyen, Joon W. Cheong, Eamonn P. Glennon, and Andrew G. Dempster. "Generalised Theory on the Effects of Sampling Frequency on GNSS Code Tracking." Journal of Navigation 71, no. 2 (2017): 257–80. http://dx.doi.org/10.1017/s0373463317000741.

Texte intégral
Résumé :
Synchronisation of the received Pseudorandom (PRN) code and its locally generated replica is fundamental when estimating user position in Global Navigation Satellite System (GNSS) receivers. It has been observed through experiments that user position accuracy decreases if sampling frequency is an integer multiple of the nominal code rate. This paper provides an accuracy analysis based on the number of samples and the residual code phase of each code chip. The outcomes reveal that the distribution of residual code phases in the code phase range [0, 1/ns), where ns is the number of samples per c
Styles APA, Harvard, Vancouver, ISO, etc.
13

Kong, Siran. "Analysis of the Encoding and Decoding Process of Polar Code." Highlights in Science, Engineering and Technology 53 (June 30, 2023): 144–52. http://dx.doi.org/10.54097/hset.v53i.9702.

Texte intégral
Résumé :
This paper briefly introduces the history of channel coding from the hamming code to the newest polar code. Then it introduces that the polar code is the only one that can reach the Shannon limit. With such a crucial technique, this study set it as the core research target of this article. After pointing out the target and the content of the polar code, this paper explains the core principle, which is the channel polarization theory. It also contains channel polarization's two components, the channel combining and splitting theory. In the main part, this paper explains the encoding and decodin
Styles APA, Harvard, Vancouver, ISO, etc.
14

Lim, Sung Hoon, Chen Feng, Adriano Pastore, Bobak Nazer, and Michael Gastpar. "Towards an Algebraic Network Information Theory: Simultaneous Joint Typicality Decoding." IEEE Transactions on Information Theory 66, no. 10 (2020): 6242–55. https://doi.org/10.1109/TIT.2020.3009634.

Texte intégral
Résumé :
Algebraic network information theory is an emerging facet of network information theory, studying the achievable rates of random code ensembles that have algebraic structure, such as random linear codes. A distinguishing feature is that linear combinations of codewords can sometimes be decoded more efficiently than codewords themselves. The present work further develops this framework by studying the simultaneous decoding of multiple messages. Specifically, consider a receiver in a multi-user network that wishes to decode several messages. Simultaneous joint typicality decoding is one of the m
Styles APA, Harvard, Vancouver, ISO, etc.
15

Isbell, Daniel S. "Developing Flexible Musicianship: Insights from Code-Switchers." Music Educators Journal 110, no. 1 (2023): 54–59. http://dx.doi.org/10.1177/00274321231199474.

Texte intégral
Résumé :
Much like an effective speaker, a flexible musician is competent across multiple settings. The sociolinguistic theory of code-switching can be a useful tool to better understand how musicians acquire a set of skills and knowledge to support music-making in a range of activities in and outside of school and throughout society. In this article, readers learn about the specific skills and knowledge musical code-switchers rely on the most when moving among a diverse range of musical events. This article includes examples of how code-switching experiences can improve music classes, lessons, and reh
Styles APA, Harvard, Vancouver, ISO, etc.
16

CHEN, S., W. T. TSAI, and X. P. CHEN. "SAMEA: OBJECT-ORIENTED SOFTWARE MAINTENANCE ENVIRONMENT FOR ASSEMBLY PROGRAMS." International Journal of Software Engineering and Knowledge Engineering 02, no. 02 (1992): 197–226. http://dx.doi.org/10.1142/s0218194092000105.

Texte intégral
Résumé :
This paper presents a software maintenance environment for assembly programs, SAMEA. It presents an object-oriented database support for displaying, understanding, modifying and configuring assembly programs for software maintenance. Understanding of assembly programs is based on the theory of explicit representation of various structural and functionality elements of code and multiple relationships among them. Modification of program is based on an object-oriented incremental editor and a set of rules to check the correctness of instruction format. The characteristics of SAMEA are: integratio
Styles APA, Harvard, Vancouver, ISO, etc.
17

EMMART, NIALL, and CHARLES WEEMS. "SEARCH-BASED AUTOMATIC CODE GENERATION FOR MULTIPRECISION MODULAR EXPONENTIATION ON MULTIPLE GENERATIONS OF GPU." Parallel Processing Letters 23, no. 04 (2013): 1340009. http://dx.doi.org/10.1142/s0129626413400094.

Texte intégral
Résumé :
Multiprecision modular exponentiation has a variety of uses, including cryptography, prime testing and computational number theory. It is also a very costly operation to compute. GPU parallelism can be used to accelerate these computations, but to use the GPU efficiently, a problem must involve many simultaneous exponentiation operations. Handling a large number of TLS/SSL encrypted sessions in a data center is an important problem that fits this profile. We are developing a framework that enables generation of highly efficient implementations of exponentiation operations for different NVIDIA
Styles APA, Harvard, Vancouver, ISO, etc.
18

Ni'amah, Khoirun. "Broadband Channel Based on Polar Codes At 2.3 GHz Frequency for 5G Networks in Digitalization Era." JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING 6, no. 1 (2022): 247–57. http://dx.doi.org/10.31289/jite.v6i1.7310.

Texte intégral
Résumé :
This research using a polar code-based broadband channel that is affected by human blockage using one of the 5G cellular network frequencies at 2.3 GHz, 99 MHz bandwidth, 128 blocks of Fast Fourier Transform (FFT) with Cyclic prefix-Orthogonal Frequency Division Multiplexing ( CP-OFDM) and Binary Shift Keying (BPSK) modulation. The use of high frequencies causes the technology to be sensitive to the surrounding environment and attenuation such as human blockage. Broadband channel modeling on a 5G network is presented in a representative Power Delay Profile (PDP) with the influence of human blo
Styles APA, Harvard, Vancouver, ISO, etc.
19

Fan, Jihao, Yonghui Li, Min-Hsiu Hsieh, and Hanwu Chen. "On quantum tensor product codes." Quantum Information and Computation 17, no. 13&14 (2017): 1105–22. http://dx.doi.org/10.26421/qic17.13-14-3.

Texte intégral
Résumé :
We present a general framework for the construction of quantum tensor product codes (QTPC). In a classical tensor product code (TPC), its parity check matrix is constructed via the tensor product of parity check matrices of the two component codes. We show that by adding some constraints on the component codes, several classes of dual-containing TPCs can be obtained. By selecting different types of component codes, the proposed method enables the construction of a large family of QTPCs and they can provide a wide variety of quantum error control abilities. In particular, if one of the componen
Styles APA, Harvard, Vancouver, ISO, etc.
20

KAMEYAMA, Michitaka, and Saneaki TAMAKI. "Code Assignment Algorithm for Highly Parallel Multiple-Valued k-Ary Operation Circuits Using Partition Theory." Interdisciplinary Information Sciences 3, no. 1 (1997): 13–24. http://dx.doi.org/10.4036/iis.1997.13.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
21

Di Trani, Michela, Rachele Mariani, Alessia Renzi, Paul Samuel Greenman, and Luigi Solano. "Alexithymia according to Bucci's multiple code theory: A preliminary investigation with healthy and hypertensive individuals." Psychology and Psychotherapy: Theory, Research and Practice 91, no. 2 (2017): 232–47. http://dx.doi.org/10.1111/papt.12158.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
22

Solano, Luigi. "Some thoughts between body and mind in the light of Wilma Bucci’s multiple code theory." International Journal of Psychoanalysis 91, no. 6 (2010): 1445–64. http://dx.doi.org/10.1111/j.1745-8315.2010.00359.x.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
23

Wang, Letian, Ziyu Meng, Fei Dong, Xiao Yang, Xiaoming Xi, and Xiushan Nie. "Attention-Oriented Deep Multi-Task Hash Learning." Electronics 12, no. 5 (2023): 1226. http://dx.doi.org/10.3390/electronics12051226.

Texte intégral
Résumé :
Hashing has wide applications in image retrieval at large scales due to being an efficient approach to approximate nearest neighbor calculation. It can squeeze complex high-dimensional arrays via binarization while maintaining the semantic properties of the original samples. Currently, most existing hashing methods always predetermine the stable length of hash code before training the model. It is inevitable for these methods to increase the computing time, as the code length converts, caused by the task requirements changing. A single hash code fails to reflect the semantic relevance. Toward
Styles APA, Harvard, Vancouver, ISO, etc.
24

Khurana, Rupali, and Ekta Narwal. "Analysis of code-based digital signature schemes." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (2023): 5534. http://dx.doi.org/10.11591/ijece.v13i5.pp5534-5541.

Texte intégral
Résumé :
<span lang="EN-US">Digital signatures are in high demand because they allow authentication and non-repudiation. Existing digital signature systems, such as digital signature algorithm (DSA), elliptic curve digital signature algorithm (ECDSA), and others, are based on number theory problems such as discrete logarithmic problems and integer factorization problems. These recently used digital signatures are not secure with quantum computers. To protect against quantum computer attacks, many researchers propose digital signature schemes based on error-correcting codes such as linear, Goppa,
Styles APA, Harvard, Vancouver, ISO, etc.
25

Shinohara, Katsuyuki, and Toshi Minami. "Encoding of line drawings with multiple hexagonal grid chain code." Systems and Computers in Japan 17, no. 12 (1986): 1–10. http://dx.doi.org/10.1002/scj.4690171201.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
26

Galetti, Erica, David Halliday, and Andrew Curtis. "A simple and exact acoustic wavefield modeling code for data processing, imaging, and interferometry applications." GEOPHYSICS 78, no. 6 (2013): F17—F27. http://dx.doi.org/10.1190/geo2012-0443.1.

Texte intégral
Résumé :
Improvements in industrial seismic, seismological, acoustic, or interferometric theory and applications often result in quite subtle changes in sound quality, seismic images, or information which are nevertheless crucial for improved interpretation or experience. When evaluating new theories and algorithms using synthetic data, an important aspect of related research is therefore that numerical errors due to wavefield modeling are reduced to a minimum. We present a new MATLAB code based on the Foldy method that models theoretically exact, direct, and scattered parts of a wavefield. Its main ad
Styles APA, Harvard, Vancouver, ISO, etc.
27

Refira, Spania. "Code-Mixing Used by Jerome Polin and Livy Renata in the Jerome Goes to School Vlogs." k@ta kita 12, no. 2 (2024): 208–15. http://dx.doi.org/10.9744/katakita.12.2.208-215.

Texte intégral
Résumé :
This study analyzes Jerome Polin’s and Livy Renata’s use of code-mixing in a Jerome Goes to School vlog. Muysken’s (2000) code-mixing theory is used as the primary framework, supported by Holmes’ (2013) social factors theory. A qualitative approach is employed, complemented by numerical data. The findings reveal six similarities and five differences in Jerome Polin’s and Livy Renata’s code-mixing practices. Similarities include the use of all three types of code-mixing (insertion, alternation, and congruent lexicalization), with insertion being the most common and congruent lexicalization the
Styles APA, Harvard, Vancouver, ISO, etc.
28

Catrina, Mae S. Tulinao, and C. Bool Nelson. "Enhancing Customer Outcomes in Retail Pharmacy: The Effect of QR Code Implementation Assessed Through Service Quality Theory and Multiple Regression Analysis." Journal of Economics, Finance And Management Studies 08, no. 05 (2025): 3387–94. https://doi.org/10.5281/zenodo.15561272.

Texte intégral
Résumé :
This study examines the effects of QR code implementation in retail pharmacy settings, focusing on how digital innovation influences customer satisfaction, trust, and repurchase intention through the lens of service quality theory. Two primary research questions guide the analysis: identifying the factors that affect customer outcomes before and after QR code adoption, and assessing how the relationships between service quality dimensions—service quality, waiting time, and store attributes—and customer outcomes evolve following implementation. Using multiple regression analysis, th
Styles APA, Harvard, Vancouver, ISO, etc.
29

Tseng, Shin-Pin, Eddy Wijanto, Po-Han Lai, and Hsu-Chih Cheng. "Bipolar Optical Code Division Multiple Access Techniques Using a Dual Electro-Optical Modulator Implemented in Free-Space Optics Communications." Sensors 20, no. 12 (2020): 3583. http://dx.doi.org/10.3390/s20123583.

Texte intégral
Résumé :
This study developed a bipolar optical code division multiple access (Bi-OCDMA) technique based on spectral amplitude coding for the formation and transmission of optical-polarized and coded signals over wireless optical channels. Compared with conventional Bi-OCDMA schemes, the proposed free-space optics communication system that uses a dual electro-optical modulator design improves the transmission rate. In theory, multiple access interference can be removed by using correlation subtraction schemes. The experiment results revealed that the proposed system can be employed to accurately extrac
Styles APA, Harvard, Vancouver, ISO, etc.
30

Minami, Toshi, and Katsuyuki Shinohara. "Encoding of Line Drawings with a Multiple Grid Chain Code." IEEE Transactions on Pattern Analysis and Machine Intelligence PAMI-8, no. 2 (1986): 269–76. http://dx.doi.org/10.1109/tpami.1986.4767780.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
31

klinkenberg, David. "The Gnostic Code." European Journal of Historical Research 3, no. 1 (2024): 13–18. http://dx.doi.org/10.47672/ejhr.1796.

Texte intégral
Résumé :
Purpose: The aim of the study was to the gnostic code.
 Materials and Methods: This study adopted a desk methodology. A desk study research design is commonly known as secondary data collection. This is basically collecting data from existing resources preferably because of its low cost advantage as compared to a field research. Our current study looked into already published studies and reports as the data was easily accessed through online journals and libraries.
 Findings: The Gnostic parables excerpted above are sufficient to establish that a code was functioning in these documen
Styles APA, Harvard, Vancouver, ISO, etc.
32

Li, Wen, Junfei Xu, and Qi Chen. "Knowledge Distillation-Based Multilingual Code Retrieval." Algorithms 15, no. 1 (2022): 25. http://dx.doi.org/10.3390/a15010025.

Texte intégral
Résumé :
Semantic code retrieval is the task of retrieving relevant codes based on natural language queries. Although it is related to other information retrieval tasks, it needs to bridge the gaps between the language used in the code (which is usually syntax-specific and logic-specific) and the natural language which is more suitable for describing ambiguous concepts and ideas. Existing approaches study code retrieval in a natural language for a specific programming language, however it is unwieldy and often requires a large amount of corpus for each language when dealing with multilingual scenarios.
Styles APA, Harvard, Vancouver, ISO, etc.
33

Sufi, Fahim. "Algorithms in Low-Code-No-Code for Research Applications: A Practical Review." Algorithms 16, no. 2 (2023): 108. http://dx.doi.org/10.3390/a16020108.

Texte intégral
Résumé :
Algorithms have evolved from machine code to low-code-no-code (LCNC) in the past 20 years. Observing the growth of LCNC-based algorithm development, the CEO of GitHub mentioned that the future of coding is no coding at all. This paper systematically reviewed several of the recent studies using mainstream LCNC platforms to understand the area of research, the LCNC platforms used within these studies, and the features of LCNC used for solving individual research questions. We identified 23 research works using LCNC platforms, such as SetXRM, the vf-OS platform, Aure-BPM, CRISP-DM, and Microsoft
Styles APA, Harvard, Vancouver, ISO, etc.
34

Cleveland, Marisa, and Simon Cleveland. "Exploring Public Relations in the Firm." International Journal of Smart Education and Urban Society 12, no. 4 (2021): 52–62. http://dx.doi.org/10.4018/ijseus.2021100105.

Texte intégral
Résumé :
While postmodern theory has been explored within multiple domains, its application to the domain of public relations is somewhat scant. As a result, constructs, such as power, crisis communication, and code of ethics within the communication profession in the firm require further examination. This study investigates the current postmodernist perspective within organization theory and expands the body of knowledge on postmodernism and public relations through the application of seminal audit literature analysis.
Styles APA, Harvard, Vancouver, ISO, etc.
35

Tan, Wen Jun, Wai Teng Tang, Rick Siow Mong Goh, Stephen John Turner, and Weng-Fai Wong. "A Code Generation Framework for Targeting Optimized Library Calls for Multiple Platforms." IEEE Transactions on Parallel and Distributed Systems 26, no. 7 (2015): 1789–99. http://dx.doi.org/10.1109/tpds.2014.2329494.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
36

Marquardt, Kyle L., and Daniel Pemstein. "IRT Models for Expert-Coded Panel Data." Political Analysis 26, no. 4 (2018): 431–56. http://dx.doi.org/10.1017/pan.2018.28.

Texte intégral
Résumé :
Data sets quantifying phenomena of social-scientific interest often use multiple experts to code latent concepts. While it remains standard practice to report the average score across experts, experts likely vary in both their expertise and their interpretation of question scales. As a result, the mean may be an inaccurate statistic. Item-response theory (IRT) models provide an intuitive method for taking these forms of expert disagreement into account when aggregating ordinal ratings produced by experts, but they have rarely been applied to cross-national expert-coded panel data. We investiga
Styles APA, Harvard, Vancouver, ISO, etc.
37

Ilic, Radovan, Vesna Jokic-Spasic, Petar Belicev, and Milos Dragovic. "The Monte Carlo srna code as the engine in istar proton dose planning software for the tesla accelerator installation." Nuclear Technology and Radiation Protection 19, no. 2 (2004): 30–35. http://dx.doi.org/10.2298/ntrp0402030i.

Texte intégral
Résumé :
This paper describes the application of SRNA Monte Carlo package for proton transport simulations in complex geometry and different material composition. SRNA package was developed for 3D dose distribution calculation in proton therapy and dosimetry and it was based on the theory of multiple scattering. The compound nuclei decay was simulated by our own and the Russian MSDM models using ICRU 63 data. The developed package consists of two codes SRNA-2KG, which simulates proton transport in the combinatorial geometry and SRNA-VOX, which uses the voxelized geometry using the CT data and conversio
Styles APA, Harvard, Vancouver, ISO, etc.
38

Sinulingga, Eka Via Angga. "CODE MIXING USED IN TASYA FARASYA BEAUTY VLOGS." Prosodi 17, no. 2 (2023): 248–59. http://dx.doi.org/10.21107/prosodi.v17i2.21390.

Texte intégral
Résumé :
This study entitled “Code Mixing Used In Tasya Farasya Beauty Vlogs”. Beauty vloggers often share information about the cosmetic products they use or review beauty and make-up products. Sometimes they mix several languages in their videos, such as mixing English with Indonesian. Language has a very important role in our life. We use language for communicating and people nowadays speak in multiple languages. According to the phenomenon above, this research focuses on code mixing in one of Tasya Farasya's beauty vlogs on her YouTube channel, level of code mixing and to find the reasons why Tasya
Styles APA, Harvard, Vancouver, ISO, etc.
39

Zhou, Fangming, Lulu Zhao, Limin Li, et al. "GNSS Signal Acquisition Algorithm Based on Two-Stage Compression of Code-Frequency Domain." Applied Sciences 12, no. 12 (2022): 6255. http://dx.doi.org/10.3390/app12126255.

Texte intégral
Résumé :
The recently-emerging compressed sensing (CS) theory makes GNSS signal processing at a sub-Nyquist rate possible if it has a sparse representation in certain domain. The previously proposed code-domain compression acquisition algorithms have high computational complexity and low acquisition accuracy under high dynamic conditions. In this paper, a GNSS signal acquisition algorithm based on two-stage compression of the code-frequency domain is proposed. The algorithm maps the incoming signal of the same interval to multiple carrier frequency bins and overlaps the mapped signal that belongs to th
Styles APA, Harvard, Vancouver, ISO, etc.
40

Moses, D. M., and H. G. L. Prion. "A three-dimensional model for bolted connections in wood." Canadian Journal of Civil Engineering 30, no. 3 (2003): 555–67. http://dx.doi.org/10.1139/l03-009.

Texte intégral
Résumé :
Recent criticism of the bolted connection requirements in the Canadian wood design code CSA Standard O86 indicates that the code lacks consideration of the different modes of failure, particularly as they relate to multiple-bolt connections. A finite element model is proposed to predict load–displacement behaviour, stress distributions, ultimate strength, and mode of failure in single- and multiple-bolt connections. The three-dimensional (3-D) model uses anisotropic plasticity for the wood member and elastoplasticity for the bolt. The Weibull weakest link theory is used to predict failure at g
Styles APA, Harvard, Vancouver, ISO, etc.
41

Henrici, Dirk, and Lars Wischhof. "Towalink: An open and flexible site networking solution." Telfor Journal 16, no. 1 (2024): 2–7. http://dx.doi.org/10.5937/telfor2401002h.

Texte intégral
Résumé :
Securely and reliably connecting multiple operating sites using existing Internet access lines is a common requirement for companies as well as individuals. Towalink is a new open and flexible solution for interconnecting multiple network sites reliably and securely. It is built around proven open-source projects and by itself published open-source. We present in theory and based on a practical setup the central management it provides and show how it is following the infrastructure-as-code paradigm.
Styles APA, Harvard, Vancouver, ISO, etc.
42

Mariani, R., M. Di Trani, A. Negri, and R. Tambelli. "Linguistic analysis of autobiographical narratives in unipolar and bipolar mood disorders in light of multiple code theory." Journal of Affective Disorders 273 (August 2020): 24–31. http://dx.doi.org/10.1016/j.jad.2020.03.170.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
43

Akimova, Natalia. "News Sites Psycholinguistics Code: Collective Authorship." PSYCHOLINGUISTICS 22, no. 1 (2017): 15–26. https://doi.org/10.5281/zenodo.1087458.

Texte intégral
Résumé :
<strong><em>ABSTRACT</em></strong> <em>The article deals with the problem of Internet news authorship</em><em> and its psychological consequences for recipients</em><em>. The theory about collective authorship in the network is proposed. Linguistic markers to discover collective authorship in news sites are identified. There are examples from runet and ukrnet, particularly several news announcements have been analyzed, comments have been provided that explain inconsistency, fragmentary, surplus multiple meaning of these utterances. The <strong>methods</strong> of analysis and synthesis, descri
Styles APA, Harvard, Vancouver, ISO, etc.
44

PLONSKI, ISIDOR S. "Multiple original spellings, living authors and the Code: The case of Malachius raniansis Mawlood, Hammamurad & Abdulla, 2017 (Coleoptera: Melyridae)." Zootaxa 4927, no. 2 (2021): 297–300. http://dx.doi.org/10.11646/zootaxa.4927.2.11.

Texte intégral
Résumé :
The present communication is primarily nomenclaturial–classical taxonomy is only touched in a side note on a diagnosis. It uses technical terminology coined by Alain Dubois, who is interested in the study of the concepts and theory of biological nomenclature (i.e. the “objective connection between the real world of populations of organisms and the world of language” (Dubois &amp; Ohler 1997)), and who discusses the current ‘International Code for Zoological Nomenclature’ [hereafter just called ‘the Code’] in great detail. The terms are explained where necessary–but see also the glossaries in D
Styles APA, Harvard, Vancouver, ISO, etc.
45

Verzun, N. A., A. M. Kolbanev, and M. O. Kolbanev. "An Algorithm for Synthesizing Groups of Codes in an RFID Multiple Access System." Proceedings of Telecommunication Universities 10, no. 6 (2024): 68–78. https://doi.org/10.31854/1813-324x-2024-10-6-68-78.

Texte intégral
Résumé :
Relevance. One of the problems that must be solved when creating RFID systems is the reader's multiple access to a group of tags located in a limited space, since the reading signal causes a one-time response of many tags, which leads to collisions (conflicts) of response signals. This problem has not been solved in relation to passive tags without a chip, based on surface acoustic wave technologies, the code of which is laid down during manufacture and cannot be changed during operation. The purpose of the study is to develop algorithms that allow synthesizing such groups of codes that would
Styles APA, Harvard, Vancouver, ISO, etc.
46

Alalloh, Roisatul Muttaqin. "Code Mixing in Female Teenagers’ Daily Conversation at An English Dormitory." Language Horizon: Journal of Language Studies 11, no. 2 (2023): 50–57. http://dx.doi.org/10.26740/lh.v11n2.p50-57.

Texte intégral
Résumé :
The phenomenon of code-mixing is a common occurrence, particularly among multilingual people. Code mixing refers to combining two or more languages in which lexical and grammatical elements from multiple languages occur in a single sentence. This study deals with code-mixing in the females' English dormitory at the Islamic boarding school Al-yasini Pasuruan. The objectives of this study are to classify the types of code-mixing used, and reveal the factors that cause them to do code mixing. This study used qualitative method for collecting and processing the data, while in the form of words, ph
Styles APA, Harvard, Vancouver, ISO, etc.
47

Matveev, Nikolay, and Andrey Turlikov. "Review of random multiple access methods for massive machine type communication." Information and Control Systems, no. 6 (January 16, 2020): 54–67. http://dx.doi.org/10.31799/1684-8853-2019-6-54-67.

Texte intégral
Résumé :
Introduction: Intensive research is currently underway in the field of data transmission systems for the Internet of Things in relation to various scenarios of Massive Machine Type Communication. The presence of a large number of devices in such systems necessitates the use the methods of random multiple access to a common communication channel. It is proposed in some works to increase the channel utilization efficiency by the use of error correction coding methods for conflict resolution (Coded Random Access). The vast variety of options for using such communication systems has made it imposs
Styles APA, Harvard, Vancouver, ISO, etc.
48

Ciriaco, Fernando, Taufik Abrão, and Paul Jean E. Jeszensky. "DS/CDMA Multiuser Detection with Evolutionary Algorithms." JUCS - Journal of Universal Computer Science 12, no. (4) (2006): 450–80. https://doi.org/10.3217/jucs-012-04-0450.

Texte intégral
Résumé :
This work analyses two heuristic algorithms based on the genetic evolution theory applied to direct sequence code division multiple access (DS/CDMA) com­ munication systems. For different phases of an evolutionary algorithm new biological processes are analyzed, specially adapted to the multiuser detection (MuD) problem in multipath fading channels. Monte Carlo simulation results show that the detection based on evolutionary heuristic algorithms is a viable option when compared with the optimum solution (ML ­ maximum likelihood), even for hostile channel conditions and severe system operation.
Styles APA, Harvard, Vancouver, ISO, etc.
49

Kurniawan, Judhariksawan, Slamet Sampurno, and Maskun. "The Regulations of The Law Concerning Hate Speech Offenses." Journal of Law and Sustainable Development 11, no. 12 (2023): e1816. http://dx.doi.org/10.55908/sdgs.v11i12.1896.

Texte intégral
Résumé :
Objective: This research aims to examine the legal regulations of hate speech crimes in the ITE Law and the Indonesian Criminal Code (KUHP), and further explore the resolution of hate speech conflicts. Theoretical Framework: The theoretical foundations include Legal Certainty theory, Law Enforcement theory, and Legal Convergence theory concerning hate speech conflict resolution following the principle of legal certainty. Method: This study employs a qualitative normative approach (doctrinal) utilizing various legal instruments and indirect observation through conceptual, historical, legal, com
Styles APA, Harvard, Vancouver, ISO, etc.
50

Miguel de Almeida Areias, Pedro, Timon Rabczuk, and Joaquim Infante Barbosa. "The extended unsymmetric frontal solution for multiple-point constraints." Engineering Computations 31, no. 7 (2014): 1582–607. http://dx.doi.org/10.1108/ec-10-2013-0263.

Texte intégral
Résumé :
Purpose – The purpose of this paper is to discuss the linear solution of equality constrained problems by using the Frontal solution method without explicit assembling. Design/methodology/approach – Re-written frontal solution method with a priori pivot and front sequence. OpenMP parallelization, nearly linear (in elimination and substitution) up to 40 threads. Constraints enforced at the local assembling stage. Findings – When compared with both standard sparse solvers and classical frontal implementations, memory requirements and code size are significantly reduced. Research limitations/impl
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!