Journal articles on the topic 'Code Unknown'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Code Unknown.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Waldby, Catherine. "Code Unknown." Social Studies of Science 31, no. 5 (October 2001): 779–91. http://dx.doi.org/10.1177/030631201031005005.
Full textKruh, Louis. "SLIDING CODE DEVICE OF UNKNOWN ORIGIN." Cryptologia 16, no. 1 (January 1992): 86–88. http://dx.doi.org/10.1080/0161-119291866793.
Full textLai, Yingxu, and Zhenghui Liu. "Unknown Malicious Code Detection Based on Bayesian." Procedia Engineering 15 (2011): 3836–42. http://dx.doi.org/10.1016/j.proeng.2011.08.718.
Full textCarrier, Kevin, and Jean-Pierre Tillich. "Identifying an unknown code by partial Gaussian elimination." Designs, Codes and Cryptography 87, no. 2-3 (December 21, 2018): 685–713. http://dx.doi.org/10.1007/s10623-018-00593-7.
Full textTsai, Wen-Hsuan, and Peng-Hsiang Kao. "Secret Codes of Political Propaganda: The Unknown System of Writing Teams." China Quarterly 214 (May 13, 2013): 394–410. http://dx.doi.org/10.1017/s0305741013000362.
Full textInterlando, J. Carmelo. "Decoding the Ternary (23, 11, 9) Quadratic Residue Code." Research Letters in Communications 2009 (2009): 1–3. http://dx.doi.org/10.1155/2009/107432.
Full textHartanto, Ari Dwi, and Al Sutjijana. "Binary Cyclic Pearson Codes." Jurnal Matematika MANTIK 7, no. 1 (March 18, 2021): 1–8. http://dx.doi.org/10.15642/mantik.2021.7.1.1-8.
Full textHiggott, Oscar, Matthew Wilson, James Hefford, James Dborin, Farhan Hanif, Simon Burton, and Dan E. Browne. "Optimal local unitary encoding circuits for the surface code." Quantum 5 (August 5, 2021): 517. http://dx.doi.org/10.22331/q-2021-08-05-517.
Full textFang-Biau Ueng, Jun-Da Chen, and Shang-Chun Tsai. "Adaptive DS-CDMA Receiver with Code Tracking in Phase Unknown Environments." IEEE Transactions on Wireless Communications 7, no. 4 (April 2008): 1227–35. http://dx.doi.org/10.1109/twc.2008.060803.
Full textAHMED, PERVEZ, and C. Y. SUEN. "COMPUTER RECOGNITION OF TOTALLY UNCONSTRAINED HANDWRITTEN ZIP CODES." International Journal of Pattern Recognition and Artificial Intelligence 01, no. 01 (April 1987): 1–15. http://dx.doi.org/10.1142/s0218001487000023.
Full textMohan Liu, Mohan Liu, Xiaoming Tang Mohan Liu, and Hanming Fei Xiaoming Tang. "Design of Malicious Code Detection System Based on Binary Code Slicing." 電腦學刊 33, no. 3 (June 2022): 225–38. http://dx.doi.org/10.53106/199115992022063303018.
Full textChoi, Hyunwoo, and Yongdae Kim. "Large-Scale Analysis of Remote Code Injection Attacks in Android Apps." Security and Communication Networks 2018 (April 17, 2018): 1–17. http://dx.doi.org/10.1155/2018/2489214.
Full textHreha, Kimberly, Kenneth Ottenbacher, Joshua Ehrlich, and Heather Whitson. "Use of the New ICD-10 Vision Codes Among Medicare Beneficiaries With Stroke." Innovation in Aging 4, Supplement_1 (December 1, 2020): 223–24. http://dx.doi.org/10.1093/geroni/igaa057.721.
Full textEllis, Brian E. "Postal code for a plant MAPK." Biochemical Journal 446, no. 2 (August 14, 2012): e5-e7. http://dx.doi.org/10.1042/bj20121003.
Full textTeimouri, Mehdi, and Ahmadreza Hedayat. "Parameter Estimation of Turbo Code Encoder." Advances in Electrical Engineering 2014 (September 18, 2014): 1–6. http://dx.doi.org/10.1155/2014/282108.
Full textMou, Qing, and Ping Wei. "Blind Despreading of Long-code DS-SS Signals with Unknown Carrier Offset." Journal of Electronics & Information Technology 32, no. 8 (August 27, 2010): 1797–801. http://dx.doi.org/10.3724/sp.j.1146.2009.01210.
Full textEskandari, Mojtaba, and Sattar Hashemi. "ECFGM: enriched control flow graph miner for unknown vicious infected code detection." Journal in Computer Virology 8, no. 3 (June 19, 2012): 99–108. http://dx.doi.org/10.1007/s11416-012-0169-9.
Full textJun Zheng and B. D. Rao. "LDPC-coded MIMO systems with unknown block fading channels: soft MIMO detector design, channel estimation, and code optimization." IEEE Transactions on Signal Processing 54, no. 4 (April 2006): 1504–18. http://dx.doi.org/10.1109/tsp.2006.870565.
Full textNaresh E. and Vijaya Kumar B.P. "Innovative Approaches in Pair Programming to Enhance the Quality of Software Development." International Journal of Information Communication Technologies and Human Development 10, no. 2 (April 2018): 42–53. http://dx.doi.org/10.4018/ijicthd.2018040104.
Full textHwang, Chanwoong, Hyosik Kim, Hooki Lee, and Taejin Lee. "Effective DGA-Domain Detection and Classification with TextCNN and Additional Features." Electronics 9, no. 7 (June 30, 2020): 1070. http://dx.doi.org/10.3390/electronics9071070.
Full textJung, Dong-Seob, Sang-Joon Lee, and Ieck-Chae Euom. "ImageDetox: Method for the Neutralization of Malicious Code Hidden in Image Files." Symmetry 12, no. 10 (September 30, 2020): 1621. http://dx.doi.org/10.3390/sym12101621.
Full textChowdhury, Nargis. "Classroom Code Switching of English Language Teachers at Tertiary Level: A Bangladeshi Perspective." Stamford Journal of English 7 (April 6, 2013): 40–61. http://dx.doi.org/10.3329/sje.v7i0.14462.
Full textBao, Min, Jake Cornwall-Scoones, Estefania Sanchez-Vasquez, Dong-Yuan Chen, Joachim De Jonghe, Shahriar Shadkhoo, Florian Hollfelder, Matt Thomson, David M. Glover, and Magdalena Zernicka-Goetz. "Stem cell-derived synthetic embryos self-assemble by exploiting cadherin codes and cortical tension." Nature Cell Biology 24, no. 9 (September 2022): 1341–49. http://dx.doi.org/10.1038/s41556-022-00984-y.
Full textEzeh, Nnenna Gertrude, Ifeoma Ann Umeh, and Esther Chikaodi Anyanwu. "Code Switching and Code Mixing in Teaching and Learning of English as a Second Language: Building on Knowledge." English Language Teaching 15, no. 9 (August 25, 2022): 106. http://dx.doi.org/10.5539/elt.v15n9p106.
Full textAngelini, Paolo. "The Code of Dušan 1349–1354." Tijdschrift voor Rechtsgeschiedenis / Revue d'Histoire du Droit / The Legal History Review 80, no. 1-2 (2012): 77–93. http://dx.doi.org/10.1163/157181912x626920.
Full textWen, Y. K. "Building Reliability and Code Calibration." Earthquake Spectra 11, no. 2 (May 1995): 269–96. http://dx.doi.org/10.1193/1.1585815.
Full textEfanov, D. V., and M. V. Zueva. "Modified Hamming Codes in Computing Devices Technical Diagnostic Systems." Informacionnye Tehnologii 29, no. 1 (January 19, 2023): 12–22. http://dx.doi.org/10.17587/it.29.12-22.
Full textZelinka, Ivan, Oldrich Zmeskal, Leah Windsor, and Zhiqiang Cai. "Unconventional Methods in Voynich Manuscript Analysis." MENDEL 25, no. 1 (June 24, 2019): 1–14. http://dx.doi.org/10.13164/mendel.2019.1.001.
Full textSilvey, Vivien. "Paris, borders and the concept of Europe in Paris, je t’aime and Code Unknown." Alphaville: Journal of Film and Screen Media, no. 1 (August 17, 2011): 21–35. http://dx.doi.org/10.33178/alpha.1.03.
Full textKorobeynikov, A. V. "Synthesis of a packet of pulse with phase manipulation with side lobes level 1/N at incoherent accumulation." Issues of radio electronics 49, no. 5 (July 5, 2020): 28–34. http://dx.doi.org/10.21778/2218-5453-2020-5-28-34.
Full textSchüller, Andreas, Alex W. Slater, Tomás Norambuena, Juan J. Cifuentes, Leonardo I. Almonacid, and Francisco Melo. "Computer-Based Annotation of Putative AraC/XylS-Family Transcription Factors of Known Structure but Unknown Function." Journal of Biomedicine and Biotechnology 2012 (2012): 1–14. http://dx.doi.org/10.1155/2012/103132.
Full textShenhav, Liat, and David Zeevi. "Resource conservation manifests in the genetic code." Science 370, no. 6517 (November 5, 2020): 683–87. http://dx.doi.org/10.1126/science.aaz9642.
Full textMitsutake, Toru, Shin-Ichi Morooka, Yasushi Yamamoto, and Jiro Kimura. "Critical Power Experimental Analysis Using Subchannel Analysis Code. Unknown Parameter Estimation in Spacer Model." Transactions of the Japan Society of Mechanical Engineers Series B 59, no. 565 (1993): 2715–20. http://dx.doi.org/10.1299/kikaib.59.2715.
Full textChen, Jun-Da, Fang-Biau Ueng, and Pi-Feng Lin. "A low-complexity adaptive receiver for DS-CDMA systems in unknown code delay environment." International Journal of Communication Systems 24, no. 2 (January 28, 2011): 225–38. http://dx.doi.org/10.1002/dac.1151.
Full textInui, Shoichiro, Masakazu Okubo, and Masao Nakagawa. "Solution of the near-far problem for spread spectrum interference with unknown spreading code." Electronics and Communications in Japan (Part I: Communications) 80, no. 8 (August 1997): 50–58. http://dx.doi.org/10.1002/(sici)1520-6424(199708)80:8<50::aid-ecja6>3.0.co;2-8.
Full textKerr, Patrick L., and Gavin Bryant. "Use of ICD-10 Codes for Human Trafficking: Analysis of Data From a Large, Multisite Clinical Database in the United States." Public Health Reports 137, no. 1_suppl (July 2022): 83S—90S. http://dx.doi.org/10.1177/00333549221095631.
Full textEfanov, D. V., G. V. Osadchii, and M. V. Zueva. "BERGER CODES IN CONCURRENT ERROR-DETECTION SYSTEMS, IMPLEMENTED ON THE BASIS OF BOOLEAN COMPLEMENT METHOD." Informatika i sistemy upravleniya, no. 1 (2021): 75–89. http://dx.doi.org/10.22250/isu.2021.67.75-89.
Full textSASAKI, Masato, and Shogo HAYASHI. "New Calling System for Unknown Vessel Using a Position Code : Considerations about the Structure of Calling Code Based on the Field Experiments." Journal of Japan Institute of Navigation 97 (1997): 55–63. http://dx.doi.org/10.9749/jin.97.55.
Full textSari, Putu Pande Novita. "The Use Of Code-Mixing By Online Sellers On Facebook Page “Peken Online Buleleng”." Jurnal Pendidikan Bahasa Inggris Indonesia 8, no. 1 (May 14, 2020): 31–43. http://dx.doi.org/10.23887/jpbi.v8i1.3138.
Full textKhan, Nayeem, Johari Abdullah, and Adnan Shahid Khan. "Defending Malicious Script Attacks Using Machine Learning Classifiers." Wireless Communications and Mobile Computing 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/5360472.
Full textHofweber, Julia, Theodoros Marinis, and Jeanine Treffers-Daller. "Effects of dense code-switching on executive control." Linguistic Approaches to Bilingualism 6, no. 5 (June 24, 2016): 648–68. http://dx.doi.org/10.1075/lab.15052.hof.
Full textNo, Albert. "Nonasymptotic Upper Bounds on Binary Single Deletion Codes via Mixed Integer Linear Programming." Entropy 21, no. 12 (December 6, 2019): 1202. http://dx.doi.org/10.3390/e21121202.
Full textLuk, Hiu Mei, Emma Allanson, Wai-Kit Ming, and Wing Cheong Leung. "Improving Diagnostic Classification of Stillbirths and Neonatal Deaths Using ICD-PM (International Classification of Diseases for Perinatal Mortality) Codes: Validation Study." JMIR Medical Informatics 8, no. 8 (August 3, 2020): e20071. http://dx.doi.org/10.2196/20071.
Full textZhang, Pengwei, Yong Li, Hsin-Chiu Chang, Hongqing Liu, and Trieu-Kien Truong. "Fast Decoding of the (47, 24, 11) Quadratic Residue Code Without Determining the Unknown Syndromes." IEEE Communications Letters 19, no. 8 (August 2015): 1279–82. http://dx.doi.org/10.1109/lcomm.2015.2440263.
Full textLuo, Chunlan, Yi Wu, Hsin-chiu Chang, Zheng Yang, and Song Xing. "Algebraic decoding of the (41, 21, 9) quadratic residue code without determining the unknown syndromes." Physical Communication 42 (October 2020): 101135. http://dx.doi.org/10.1016/j.phycom.2020.101135.
Full textRitter, Fabian, and Sebastian Hack. "AnICA: analyzing inconsistencies in microarchitectural code analyzers." Proceedings of the ACM on Programming Languages 6, OOPSLA2 (October 31, 2022): 1–29. http://dx.doi.org/10.1145/3563288.
Full textMahfoud, Asmaa, Abu Bakar Sultan, Abdul Azim Abd, Norhayati Mohd Ali, and Novia Admodisastro. "Code Obfuscation. Where is it Heading?" International Journal of Engineering & Technology 7, no. 4.1 (September 12, 2018): 22. http://dx.doi.org/10.14419/ijet.v7i4.1.19485.
Full textEfanov, D. V., G. V. Osadchiy, and M. V. Zueva. "THE CHARACTERISTICS OF ERROR DETECTION BY CODES WITH THE SUMMATION OF SINGLE INFORMATION BITS IN THE RING OF RESIDUES, ACCORDING TO A GIVEN MODULUS ARE ANALYZED, WHICH ARE MANIFESTED IN THE SYNTHESIS OF BUILT-IN CONTROL CIRCUITS USING THE BOOLEAN COMPLEMENT METHOD." Automation on Transport 7, no. 2 (June 2021): 284–314. http://dx.doi.org/10.20295/2412-9186-2021-7-2-284-314.
Full textYugang Ma, K. H. Li, A. C. Kot, and Getian Ye. "A blind code timing estimator and its implementation for DS-CDMA signals in unknown colored noise." IEEE Transactions on Vehicular Technology 51, no. 6 (November 2002): 1600–1607. http://dx.doi.org/10.1109/tvt.2002.802986.
Full textLi, Yong, Gaoming Chen, Hsin-Chiu Chang, Qianbin Chen, and Trieu-Kien Truong. "An Improved Decoding Algorithm of the (71, 36, 11) Quadratic Residue Code Without Determining Unknown Syndromes." IEEE Transactions on Communications 63, no. 12 (December 2015): 4607–14. http://dx.doi.org/10.1109/tcomm.2015.2481894.
Full text