Journal articles on the topic 'Code Unknown'

To see the other types of publications on this topic, follow the link: Code Unknown.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Code Unknown.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Waldby, Catherine. "Code Unknown." Social Studies of Science 31, no. 5 (October 2001): 779–91. http://dx.doi.org/10.1177/030631201031005005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kruh, Louis. "SLIDING CODE DEVICE OF UNKNOWN ORIGIN." Cryptologia 16, no. 1 (January 1992): 86–88. http://dx.doi.org/10.1080/0161-119291866793.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lai, Yingxu, and Zhenghui Liu. "Unknown Malicious Code Detection Based on Bayesian." Procedia Engineering 15 (2011): 3836–42. http://dx.doi.org/10.1016/j.proeng.2011.08.718.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Carrier, Kevin, and Jean-Pierre Tillich. "Identifying an unknown code by partial Gaussian elimination." Designs, Codes and Cryptography 87, no. 2-3 (December 21, 2018): 685–713. http://dx.doi.org/10.1007/s10623-018-00593-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tsai, Wen-Hsuan, and Peng-Hsiang Kao. "Secret Codes of Political Propaganda: The Unknown System of Writing Teams." China Quarterly 214 (May 13, 2013): 394–410. http://dx.doi.org/10.1017/s0305741013000362.

Full text
Abstract:
AbstractWithin the Chinese Communist Party (CCP), some Party units have established a largely unknown network of writing teams which propagate the policies or perspectives of a particular unit by publishing feature articles in Party journals. These writing teams often make use of a pseudonym in the form of a person's name, leading outsiders to believe that the work is written by a journalist. In fact, the pseudonyms of the Party unit writing teams function as a form of secret code. Through this code, inner Party members can recognize which unit's views an article reflects. In order to reveal exactly which units the codes represent, we have collated the names of over 20 writing teams. In addition, we provide an introduction to the functioning of the writing teams and the manner in which articles are produced. Finally, we propose that the CCP's mechanism of “propaganda codes” is gradually undergoing the process of institutionalization.
APA, Harvard, Vancouver, ISO, and other styles
6

Interlando, J. Carmelo. "Decoding the Ternary (23, 11, 9) Quadratic Residue Code." Research Letters in Communications 2009 (2009): 1–3. http://dx.doi.org/10.1155/2009/107432.

Full text
Abstract:
The algebraic decoding of binary quadratic residue codes can be performed using the Peterson or the Berlekamp-Massey algorithm once certain unknown syndromes are determined or eliminated. The technique of determining unknown syndromes is applied to the nonbinary case to decode the expurgated ternary quadratic residue code of length 23.
APA, Harvard, Vancouver, ISO, and other styles
7

Hartanto, Ari Dwi, and Al Sutjijana. "Binary Cyclic Pearson Codes." Jurnal Matematika MANTIK 7, no. 1 (March 18, 2021): 1–8. http://dx.doi.org/10.15642/mantik.2021.7.1.1-8.

Full text
Abstract:
The phenomena of unknown gain or offset on communication systems and modern storages such as optical data storage and non-volatile memory (flash) becomes a serious problem. This problem can be handled by Pearson distance applied to the detector because it offers immunity to gain and offset mismatch. This distance can only be used for a specific set of codewords, called Pearson codes. An interesting example of Pearson code can be found in T-constrained code class. In this paper, we present binary 2-constrained codes with cyclic property. The construction of this code is adopted from cyclic codes, but it cannot be considered as cyclic codes.
APA, Harvard, Vancouver, ISO, and other styles
8

Higgott, Oscar, Matthew Wilson, James Hefford, James Dborin, Farhan Hanif, Simon Burton, and Dan E. Browne. "Optimal local unitary encoding circuits for the surface code." Quantum 5 (August 5, 2021): 517. http://dx.doi.org/10.22331/q-2021-08-05-517.

Full text
Abstract:
The surface code is a leading candidate quantum error correcting code, owing to its high threshold, and compatibility with existing experimental architectures. Bravyi et al. (2006) showed that encoding a state in the surface code using local unitary operations requires time at least linear in the lattice size L, however the most efficient known method for encoding an unknown state, introduced by Dennis et al. (2002), has O(L2) time complexity. Here, we present an optimal local unitary encoding circuit for the planar surface code that uses exactly 2L time steps to encode an unknown state in a distance L planar code. We further show how an O(L) complexity local unitary encoder for the toric code can be found by enforcing locality in the O(log⁡L)-depth non-local renormalisation encoder. We relate these techniques by providing an O(L) local unitary circuit to convert between a toric code and a planar code, and also provide optimal encoders for the rectangular, rotated and 3D surface codes. Furthermore, we show how our encoding circuit for the planar code can be used to prepare fermionic states in the compact mapping, a recently introduced fermion to qubit mapping that has a stabiliser structure similar to that of the surface code and is particularly efficient for simulating the Fermi-Hubbard model.
APA, Harvard, Vancouver, ISO, and other styles
9

Fang-Biau Ueng, Jun-Da Chen, and Shang-Chun Tsai. "Adaptive DS-CDMA Receiver with Code Tracking in Phase Unknown Environments." IEEE Transactions on Wireless Communications 7, no. 4 (April 2008): 1227–35. http://dx.doi.org/10.1109/twc.2008.060803.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

AHMED, PERVEZ, and C. Y. SUEN. "COMPUTER RECOGNITION OF TOTALLY UNCONSTRAINED HANDWRITTEN ZIP CODES." International Journal of Pattern Recognition and Artificial Intelligence 01, no. 01 (April 1987): 1–15. http://dx.doi.org/10.1142/s0218001487000023.

Full text
Abstract:
This paper deals with the application of automatic sorting of envelopes with totally unconstrained handwritten numeric postal ZIP codes and presents a complete model (including preprocessing, feature extraction and classification modules) of a ZIP code reader/sorter. Different recognition methods, including statistical, structural and combined were developed and their performance on real-life ZIP code samples (8540 numerals) were measured. The statistical recognition method was used as a front-end recognizer and predictor of an unknown character. Based on edge classification, a new technique was implemented to define and extract the structural features. In the combined recognition method, unknown characters were identified either by the statistical or structural method. Its recognition reliability was found to be in the interval (96.29%, 95.94%) with substitution and rejection rates between (3.45%, 3.96%) and (2.36%, 7.01%) respectively.
APA, Harvard, Vancouver, ISO, and other styles
11

Mohan Liu, Mohan Liu, Xiaoming Tang Mohan Liu, and Hanming Fei Xiaoming Tang. "Design of Malicious Code Detection System Based on Binary Code Slicing." 電腦學刊 33, no. 3 (June 2022): 225–38. http://dx.doi.org/10.53106/199115992022063303018.

Full text
Abstract:
<p>Malicious code threatens the safety of computer systems. Researching malicious code design techniques and mastering code behavior patterns are the basic work of network security prevention. With the game of network offense and defense, malicious code shows the characteristics of invisibility, polymorphism, and multi-dismutation. How to correctly and effectively understand malicious code and extract the key malicious features is the main goal of malicious code detection technology. As an important method of program understanding, program slicing is used to analyze the program code by using the idea of &ldquo;decomposition&rdquo;, and then extract the code fragments that the analyst is interested in. In recent years, data mining and machine learning techniques have been applied to the field of malicious code detection. The reason why it has become the focus of research is that it can use data mining to dig out meaningful patterns from a large amount of existing code data. Machine learning can It helps to summarize the identification knowledge of known malicious code, so as to conduct similarity search and help find unknown malicious code. The machine learning heuristic malicious code detection method firstly needs to automatically or manually extract the structure, function and behavior characteristics of the malicious code, so we can first slice the malicious code and then perform the detection. Through the improvement of the classic program slicing algorithm, this paper effectively improves the slicing problem between binary code processes. At the same time, it implements a malicious code detection system. The machine code byte sequence variable-length N-gram is used as the feature extraction method to further prove that the efficiency and accuracy of malicious code detection technology based on data mining and machine learning. </p> <p>&nbsp;</p>
APA, Harvard, Vancouver, ISO, and other styles
12

Choi, Hyunwoo, and Yongdae Kim. "Large-Scale Analysis of Remote Code Injection Attacks in Android Apps." Security and Communication Networks 2018 (April 17, 2018): 1–17. http://dx.doi.org/10.1155/2018/2489214.

Full text
Abstract:
It is pretty well known that insecure code updating procedures for Android allow remote code injection attack. However, other than codes, there are many resources in Android that have to be updated, such as temporary files, images, databases, and configurations (XML and JSON). Security of update procedures for these resources is largely unknown. This paper investigates general conditions for remote code injection attacks on these resources. Using this, we design and implement a static detection tool that automatically identifies apps that meet these conditions. We apply the detection tool to a large dataset comprising 9,054 apps, from three different types of datasets: official market, third-party market, and preinstalled apps. As a result, 97 apps were found to be potentially vulnerable, with 53 confirmed as vulnerable to remote code injection attacks.
APA, Harvard, Vancouver, ISO, and other styles
13

Hreha, Kimberly, Kenneth Ottenbacher, Joshua Ehrlich, and Heather Whitson. "Use of the New ICD-10 Vision Codes Among Medicare Beneficiaries With Stroke." Innovation in Aging 4, Supplement_1 (December 1, 2020): 223–24. http://dx.doi.org/10.1093/geroni/igaa057.721.

Full text
Abstract:
Abstract Older adults can experience vision impairment following stroke in combination with pre-existing ophthalmologic disease. The new ICD-10 coding system for identifying vision related health conditions provides a much higher level of detail for coding these complex scenarios than the previous ICD-9 system. While this new coding system has advantages for clinical care and billing, the degree to which providers are utilizing the expanded code structure is unknown. The study objective was to describe the use of ICD-10 vision codes in a large cohort of stroke survivors. We used a retrospective cohort design to study national 100% Medicare claims files from 2015 through 2017. Data were analyzed using all available ICD-10 vision codes for beneficiaries who had an acute care stay because of a stroke and who also had an ICD-10 visual code recorded at least once in their claims chart. The cohort (n= 269,314) was mostly female (57.1%) with ischemic stroke (87.8%). Approximately 15% were coded as having one or more vision impairments. Unspecified glaucoma was the most frequently used code among men (2.83%), beneficiaries over 85+ (4.80%) and non-Hispanic blacks (4.12%). But multiple vision codes were used in few patients, overall (0.6%). Less than 3% of those in the oldest group (85+ years) had two vision codes noted in their claims. Despite more available codes, the coding used to describe the vision impairments in this population of stroke survivors was not specific or diverse. Hospital providers should pay attention to specificity in order to improve coding practices.
APA, Harvard, Vancouver, ISO, and other styles
14

Ellis, Brian E. "Postal code for a plant MAPK." Biochemical Journal 446, no. 2 (August 14, 2012): e5-e7. http://dx.doi.org/10.1042/bj20121003.

Full text
Abstract:
Plants contain hundreds of protein kinases that are believed to provide cellular signal transduction services, but the identities of the proteins they are targeting are largely unknown. Using an Arabidopsis MAPK (mitogen-activated protein kinase) (MPK6) as a model, Sörensson et al. describe in this issue of the Biochemical Journal how arrayed combinatorial peptide scanning offers an efficient route to discovery of new potential kinase substrates.
APA, Harvard, Vancouver, ISO, and other styles
15

Teimouri, Mehdi, and Ahmadreza Hedayat. "Parameter Estimation of Turbo Code Encoder." Advances in Electrical Engineering 2014 (September 18, 2014): 1–6. http://dx.doi.org/10.1155/2014/282108.

Full text
Abstract:
The problem of reconstruction of a channel code consists of finding out its design parameters solely based on its output. This paper investigates the problem of reconstruction of parallel turbo codes. Reconstruction of a turbo code has been addressed in the literature assuming that some of the parameters of the turbo encoder, such as the number of input and output bits of the constituent encoders and puncturing pattern, are known. However in practical noncooperative situations, these parameters are unknown and should be estimated before applying reconstruction process. Considering such practical situations, this paper proposes a novel method to estimate the above-mentioned code parameters. The proposed algorithm increases the efficiency of the reconstruction process significantly by judiciously reducing the size of search space based on an analysis of the observed channel code output. Moreover, simulation results show that the proposed algorithm is highly robust against channel errors when it is fed with noisy observations.
APA, Harvard, Vancouver, ISO, and other styles
16

Mou, Qing, and Ping Wei. "Blind Despreading of Long-code DS-SS Signals with Unknown Carrier Offset." Journal of Electronics & Information Technology 32, no. 8 (August 27, 2010): 1797–801. http://dx.doi.org/10.3724/sp.j.1146.2009.01210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Eskandari, Mojtaba, and Sattar Hashemi. "ECFGM: enriched control flow graph miner for unknown vicious infected code detection." Journal in Computer Virology 8, no. 3 (June 19, 2012): 99–108. http://dx.doi.org/10.1007/s11416-012-0169-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Jun Zheng and B. D. Rao. "LDPC-coded MIMO systems with unknown block fading channels: soft MIMO detector design, channel estimation, and code optimization." IEEE Transactions on Signal Processing 54, no. 4 (April 2006): 1504–18. http://dx.doi.org/10.1109/tsp.2006.870565.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Naresh E. and Vijaya Kumar B.P. "Innovative Approaches in Pair Programming to Enhance the Quality of Software Development." International Journal of Information Communication Technologies and Human Development 10, no. 2 (April 2018): 42–53. http://dx.doi.org/10.4018/ijicthd.2018040104.

Full text
Abstract:
The article tries to shed some light on the impact of human psychology on the effective use of pair programming in the modern Software development lifecycle such as SCRUM, Extreme Programming which are in turn used on heterogeneous software projects. This article also tries to identify that if the authors try to pair people keeping their psychology in mind that pair can come up with code with fewer defects, with efficient code, if the paper tries to pair people randomly without any planning or thinking might create a pair which let aside create inefficient code and lead to be unproductive nature, and even it will create a negative impact on the project and the team. This article introduces a few novel approaches in framing the pairs in pair programming's like known and unknown pairs, coder and reviewer pair and coder and tester pair. Applying the described approaches, an industry can improve the quality of the delivered product and improve the efficiency of software engineers.
APA, Harvard, Vancouver, ISO, and other styles
20

Hwang, Chanwoong, Hyosik Kim, Hooki Lee, and Taejin Lee. "Effective DGA-Domain Detection and Classification with TextCNN and Additional Features." Electronics 9, no. 7 (June 30, 2020): 1070. http://dx.doi.org/10.3390/electronics9071070.

Full text
Abstract:
Malicious codes, such as advanced persistent threat (APT) attacks, do not operate immediately after infecting the system, but after receiving commands from the attacker’s command and control (C&C) server. The system infected by the malicious code tries to communicate with the C&C server through the IP address or domain address of the C&C server. If the IP address or domain address is hard-coded inside the malicious code, it can analyze the malicious code to obtain the address and block access to the C&C server through security policy. In order to circumvent this address blocking technique, domain generation algorithms are included in the malware to dynamically generate domain addresses. The domain generation algorithm (DGA) generates domains randomly, so it is very difficult to identify and block malicious domains. Therefore, this paper effectively detects and classifies unknown DGA domains. We extract features that are effective for TextCNN-based label prediction, and add additional domain knowledge-based features to improve our model for detecting and classifying DGA-generated malicious domains. The proposed model achieved 99.19% accuracy for DGA classification and 88.77% accuracy for DGA class classification. We expect that the proposed model can be applied to effectively detect and block DGA-generated domains.
APA, Harvard, Vancouver, ISO, and other styles
21

Jung, Dong-Seob, Sang-Joon Lee, and Ieck-Chae Euom. "ImageDetox: Method for the Neutralization of Malicious Code Hidden in Image Files." Symmetry 12, no. 10 (September 30, 2020): 1621. http://dx.doi.org/10.3390/sym12101621.

Full text
Abstract:
Malicious codes may cause virus infections or threats of ransomware through symmetric encryption. Moreover, various bypassing techniques such as steganography, which refers to the hiding of malicious code in image files, have been devised. Unknown or new malware hidden in an image file in the form of malicious code is difficult to detect using most representative reputation- or signature-based antivirus methods. In this paper, we propose the use of ImageDetox method to neutralize malicious code hidden in an image file even in the absence of any prior information regarding the signatures or characteristics of the code. This method is composed of four modules: image file extraction, image file format analysis, image file conversion, and the convergence of image file management modules. To demonstrate the effectiveness of the proposed method, 30 image files with hidden malicious codes were used in an experiment. The malicious codes were selected from 48,220 recent malicious codes purchased from VirusTotal (a commercial application programming interface (API)). The experimental results showed that the detection rate of viruses was remarkably reduced. In addition, image files from which the hidden malicious code had previously been removed using a nonlinear transfer function maintained nearly the same quality as that of the original image; in particular, the difference could not be distinguished by the naked eye. The proposed method can also be utilized to prevent security threats resulting from the concealment of confidential information in image files with the aim of leaking such threats.
APA, Harvard, Vancouver, ISO, and other styles
22

Chowdhury, Nargis. "Classroom Code Switching of English Language Teachers at Tertiary Level: A Bangladeshi Perspective." Stamford Journal of English 7 (April 6, 2013): 40–61. http://dx.doi.org/10.3329/sje.v7i0.14462.

Full text
Abstract:
Classroom code switching is a common scenario in many multi lingual and multicultural classes. In a monolingual country like Bangladesh, classroom code switching has some distinctive attributes. As a part of the global transformation in the methods and techniques of English language teaching, we need to consider classroom code switching as a fact which cannot be ignored in any way especially in a country like Bangladesh where English is taught as a foreign language. In most of the cases Bangladeshi students tend to switch codes, but it is also common in teachers’ discourse. This paper aims to focus on the reasons for teachers’ code switching and the attitude of the teachers and students towards classroom code switching. A survey was conducted for data collection where two different sets of questionnaires were used for teachers and students. 20 English language teachers and 37 undergrad students from different universities participated in the survey. The findings of the survey result in identifying the reasons for teachers’ code switching like ease of communication, explanation, maintaining discipline in the classroom, translation of the unknown terms etc. On the other hand, although many teachers consider that they should not switch codes in the class room, students possess a positive attitude towards it. DOI: http://dx.doi.org/10.3329/sje.v7i0.14462 Stamford Journal of English; Volume 7; Page 40-61
APA, Harvard, Vancouver, ISO, and other styles
23

Bao, Min, Jake Cornwall-Scoones, Estefania Sanchez-Vasquez, Dong-Yuan Chen, Joachim De Jonghe, Shahriar Shadkhoo, Florian Hollfelder, Matt Thomson, David M. Glover, and Magdalena Zernicka-Goetz. "Stem cell-derived synthetic embryos self-assemble by exploiting cadherin codes and cortical tension." Nature Cell Biology 24, no. 9 (September 2022): 1341–49. http://dx.doi.org/10.1038/s41556-022-00984-y.

Full text
Abstract:
AbstractMammalian embryos sequentially differentiate into trophectoderm and an inner cell mass, the latter of which differentiates into primitive endoderm and epiblast. Trophoblast stem (TS), extraembryonic endoderm (XEN) and embryonic stem (ES) cells derived from these three lineages can self-assemble into synthetic embryos, but the mechanisms remain unknown. Here, we show that a stem cell-specific cadherin code drives synthetic embryogenesis. The XEN cell cadherin code enables XEN cell sorting into a layer below ES cells, recapitulating the sorting of epiblast and primitive endoderm before implantation. The TS cell cadherin code enables TS cell sorting above ES cells, resembling extraembryonic ectoderm clustering above epiblast following implantation. Whereas differential cadherin expression drives initial cell sorting, cortical tension consolidates tissue organization. By optimizing cadherin code expression in different stem cell lines, we tripled the frequency of correctly formed synthetic embryos. Thus, by exploiting cadherin codes from different stages of development, lineage-specific stem cells bypass the preimplantation structure to directly assemble a postimplantation embryo.
APA, Harvard, Vancouver, ISO, and other styles
24

Ezeh, Nnenna Gertrude, Ifeoma Ann Umeh, and Esther Chikaodi Anyanwu. "Code Switching and Code Mixing in Teaching and Learning of English as a Second Language: Building on Knowledge." English Language Teaching 15, no. 9 (August 25, 2022): 106. http://dx.doi.org/10.5539/elt.v15n9p106.

Full text
Abstract:
The primary goal of language teaching is to afford learners, proficiency in communicating in the target language, self-development as well as intercultural understanding of languages in the learning process. The teacher is therefore charged with the task of selecting appropriate strategies to effectively achieve his pedagogic goals, one of which is the use of Code switching and Code mixing. Traditionally, this strategy has been viewed negatively as signs of deficiencies in a speaker, though in a typical multilingual setting, speakers tend to select multiple codes or mix languages they consider appropriate to facilitate and clarify meanings in their language expressions. This study intends to project the socio- linguistic functions inherent in code switching and mixing that can help ESL students transcend from the known (L1) to the unknown (L2), especially in learning complex language contents; making the teacher&rsquo;s work, productive and less strenuous. A quantitative methodology was adopted to ascertain the efficacy of code switching and mixing as a teaching strategy. The results revealed that Code switching and mixing have progressive and positive effects in language learning, both for the teacher and learners in the ESL situation.
APA, Harvard, Vancouver, ISO, and other styles
25

Angelini, Paolo. "The Code of Dušan 1349–1354." Tijdschrift voor Rechtsgeschiedenis / Revue d'Histoire du Droit / The Legal History Review 80, no. 1-2 (2012): 77–93. http://dx.doi.org/10.1163/157181912x626920.

Full text
Abstract:
AbstractIn 1349 Stefan Dušan enacted a code that was part of a tripartite codification with the Abridged syntagma and the so-called Law of Justinian. The Serbian emperor introduced in his empire a Byzantine legal system, even if elements of Slavic customary law were preserved. Physical mutilations and punishments, death penalty, public penal system, personal liability were unknown to the Slav populations and have to be connected to the Greek-Roman law influence. This influence is evident both in civil and criminal law and in this sense the dispositions of the Code of Dušan must be connected to the two other Byzantine compilations. Dušan's attempt failed just a few years after his death because of the fall of the Serbian empire due to the Ottoman advance.
APA, Harvard, Vancouver, ISO, and other styles
26

Wen, Y. K. "Building Reliability and Code Calibration." Earthquake Spectra 11, no. 2 (May 1995): 269–96. http://dx.doi.org/10.1193/1.1585815.

Full text
Abstract:
Designs of buildings and structures for seismic loads are traditionally based on experience on performance of structures in past earthquakes. The large variability in the earthquake loadings has long been recognized by engineers but not fully accounted for in the code procedures. Although the selection of the design earthquake is based on probability, since it is used in conjunction with a series of factors depending on structural period, site soil conditions, inelastic behavior, importance of the structure e.t.c., the reliability and safety of the final design remains unknown and undefined. The recent sentiment of the research community and design professionals is that there is a need to develop design formats based more on consideration of the physics of the problem and explicit treatment of the variabilities and uncertainties. Such format may be used as the basis for developing future building codes. This paper summarizes some recent developments in this area; in particular, reliability evaluation and comparison of buildings designed in accordance with current code procedures in different countries and development of design procedures and formats based on multi-level, probabilistic structural performance criteria.
APA, Harvard, Vancouver, ISO, and other styles
27

Efanov, D. V., and M. V. Zueva. "Modified Hamming Codes in Computing Devices Technical Diagnostic Systems." Informacionnye Tehnologii 29, no. 1 (January 19, 2023): 12–22. http://dx.doi.org/10.17587/it.29.12-22.

Full text
Abstract:
Previously unknown error detection characteristics by types and multiplicities in modified Hamming codes code words are established. The rules for constructing this modification of Hamming codes are described. Detailed characteristic tables of codes with data vectors lengths m = 4...16 are given. The considered code's error detection properties brief analysis is given. The results obtained in the study can be effectively used in the digital computing devices with controllable structures synthesis, as well as in the self-checking concurrent error-detection (CED) circuit synthesis using the Boolean complement method. The modified Hamming codes key property is the impossibility of 100 % double error detection in all code word bits when any single and double errors that occur only in data bits are detected. That is why it is recommended, when synthesizing a CED circuit using the Boolean complement method, to convert only those functions that describe the operating functions of the diagnostic object that will form the modified Hamming code control bits, and to separate the converted and non-convertible outputs into two groups of independent outputs. The experiment results with test combinational circuits presented in the article confirm the effectiveness of their use in the CED circuit synthesis by the Boolean complement method.
APA, Harvard, Vancouver, ISO, and other styles
28

Zelinka, Ivan, Oldrich Zmeskal, Leah Windsor, and Zhiqiang Cai. "Unconventional Methods in Voynich Manuscript Analysis." MENDEL 25, no. 1 (June 24, 2019): 1–14. http://dx.doi.org/10.13164/mendel.2019.1.001.

Full text
Abstract:
This paper discusses the possible use of unconventional algorithms on analysis and categorization of the unknown text, including documents written in unknown languages. Scholars have identied about ten famous manuscripts, mostly encrypted or written in the unknown language. The most famous is the Voynich manuscript, an illustrated codex hand-written in an unknown language or writing system. Using carbon-dating methods, the researchers determined its age as the early 15th century (between 1404-1438). Many professional and amateur cryptographers have studied the Voynich manuscript, and none has deciphered its meaning as yet, including American and British code-breakers and cryptologists. While there exist many hypotheses about the meaning and structure of the document, they have yet to be conrmed empirically. In this paper, we discuss two dierent kinds of unconventional approaches for how to handle manuscripts with unidentied writing systems and determine whether its properties are characterized by a natural language, or is only historical fake text.
APA, Harvard, Vancouver, ISO, and other styles
29

Silvey, Vivien. "Paris, borders and the concept of Europe in Paris, je t’aime and Code Unknown." Alphaville: Journal of Film and Screen Media, no. 1 (August 17, 2011): 21–35. http://dx.doi.org/10.33178/alpha.1.03.

Full text
Abstract:
Michael Haneke’s Code Unknown and the multi-director Paris, je t’aime belong (the latter at least in part) to a recently emerged cinematic form described as the network form, which represents changing spaces and plural perspectives in multicultural societies. Reflecting Rosalind Galt’s concept of “anti-anti-Eurocentrism”, they represent discursive and referential spaces of Parisian society. Through a comparative analysis of how they frame space with regard to borders and transnational relationships, it becomes apparent that some of the approaches these films take to representing Europe are problematic. In contrast, others encapsulate key concerns surrounding the constantly changing relationships between Europe and its others. While Code Unknown challenges discourses of identity, home and belonging, Paris, je t'aime tends to reinstate and validate divisive social hierarchies despite its appearances of pluralism.
APA, Harvard, Vancouver, ISO, and other styles
30

Korobeynikov, A. V. "Synthesis of a packet of pulse with phase manipulation with side lobes level 1/N at incoherent accumulation." Issues of radio electronics 49, no. 5 (July 5, 2020): 28–34. http://dx.doi.org/10.21778/2218-5453-2020-5-28-34.

Full text
Abstract:
The paper is devoted to the problem of choosing a probing radar signal using optimal processing of a packet of pulses with unknown initial phases. A method for synthesizing a packet of phase-coded pulses is proposed, the total autocorrelation function (ACF) of which, with coordinated filtering and incoherent accumulation, has a side lobes level (SLL) of 1/N. The search criteria for binary codes for phase manipulation of a signal that are potentially capable of forming packets of pulses with relative SLL of 1/N are formulated and justified. An algorithm has been developed for searching codes with a given ACF using the exhaustive search method. A method is proposed for forming the composition of a packets of pulses based on the exhaustive search method. A number of values of the code N duration were determined for which there are packets of pulses with a relative SLL of the total ACF equal to 1/N with coordinated filtering and incoherent accumulation.
APA, Harvard, Vancouver, ISO, and other styles
31

Schüller, Andreas, Alex W. Slater, Tomás Norambuena, Juan J. Cifuentes, Leonardo I. Almonacid, and Francisco Melo. "Computer-Based Annotation of Putative AraC/XylS-Family Transcription Factors of Known Structure but Unknown Function." Journal of Biomedicine and Biotechnology 2012 (2012): 1–14. http://dx.doi.org/10.1155/2012/103132.

Full text
Abstract:
Currently, about 20 crystal structures per day are released and deposited in the Protein Data Bank. A significant fraction of these structures is produced by research groups associated with the structural genomics consortium. The biological function of many of these proteins is generally unknown or not validated by experiment. Therefore, a growing need for functional prediction of protein structures has emerged. Here we present an integrated bioinformatics method that combines sequence-based relationships and three-dimensional (3D) structural similarity of transcriptional regulators with computer prediction of their cognate DNA binding sequences. We applied this method to the AraC/XylS family of transcription factors, which is a large family of transcriptional regulators found in many bacteria controlling the expression of genes involved in diverse biological functions. Three putative new members of this family with known 3D structure but unknown function were identified for which a probable functional classification is provided. Our bioinformatics analyses suggest that they could be involved in plant cell wall degradation (Lin2118 protein fromListeria innocua, PDB code 3oou), symbiotic nitrogen fixation (protein fromChromobacterium violaceum, PDB code 3oio), and either metabolism of plant-derived biomass or nitrogen fixation (protein fromRhodopseudomonas palustris, PDB code 3mn2).
APA, Harvard, Vancouver, ISO, and other styles
32

Shenhav, Liat, and David Zeevi. "Resource conservation manifests in the genetic code." Science 370, no. 6517 (November 5, 2020): 683–87. http://dx.doi.org/10.1126/science.aaz9642.

Full text
Abstract:
Nutrient limitation drives competition for resources across organisms. However, much is unknown about how selective pressures resulting from nutrient limitation shape microbial coding sequences. Here, we study this “resource-driven selection” by using metagenomic and single-cell data of marine microbes, alongside environmental measurements. We show that a significant portion of the selection exerted on microbes is explained by the environment and is associated with nitrogen availability. Notably, this resource conservation optimization is encoded in the structure of the standard genetic code, providing robustness against mutations that increase carbon and nitrogen incorporation into protein sequences. This robustness generalizes to codon choices from multiple taxa across all domains of life, including the human genome.
APA, Harvard, Vancouver, ISO, and other styles
33

Mitsutake, Toru, Shin-Ichi Morooka, Yasushi Yamamoto, and Jiro Kimura. "Critical Power Experimental Analysis Using Subchannel Analysis Code. Unknown Parameter Estimation in Spacer Model." Transactions of the Japan Society of Mechanical Engineers Series B 59, no. 565 (1993): 2715–20. http://dx.doi.org/10.1299/kikaib.59.2715.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Chen, Jun-Da, Fang-Biau Ueng, and Pi-Feng Lin. "A low-complexity adaptive receiver for DS-CDMA systems in unknown code delay environment." International Journal of Communication Systems 24, no. 2 (January 28, 2011): 225–38. http://dx.doi.org/10.1002/dac.1151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Inui, Shoichiro, Masakazu Okubo, and Masao Nakagawa. "Solution of the near-far problem for spread spectrum interference with unknown spreading code." Electronics and Communications in Japan (Part I: Communications) 80, no. 8 (August 1997): 50–58. http://dx.doi.org/10.1002/(sici)1520-6424(199708)80:8<50::aid-ecja6>3.0.co;2-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Kerr, Patrick L., and Gavin Bryant. "Use of ICD-10 Codes for Human Trafficking: Analysis of Data From a Large, Multisite Clinical Database in the United States." Public Health Reports 137, no. 1_suppl (July 2022): 83S—90S. http://dx.doi.org/10.1177/00333549221095631.

Full text
Abstract:
Objectives: People experiencing trafficking often seek health care but are not identified. Although the Centers for Disease Control and Prevention added new International Classification of Diseases, 10th Revision, Clinical Modification (ICD-10-CM) codes specific to human trafficking (hereinafter, HT ICD-10-CM codes) that could systematize the identification and documentation of human trafficking in US health care settings, the extent of their use is unknown. The objectives of this study were to investigate (1) the frequency of HT ICD-10-CM code use in US health care organizations (HCOs) and (2) demographic data associated with HT ICD-10-CM codes using a large clinical database. Methods: This retrospective study used deidentified data collected from October 1, 2018, through March 30, 2021, from a clinical database (N = 69 740 144 patients) network (TriNetX) of 48 collaborating US HCOs. Data included number of patients with ≥1 HT ICD-10-CM code, diagnoses, and demographic characteristics (age, sex, race, ethnicity, and region). Results: HT ICD-10-CM codes were associated with 298 patients in US HCOs, most of whom were young (mean [SD] age, 26 [16] y), White (53.0%; n = 158), and female (87.9%; n = 262). Thirty-seven of 48 (77.1%) participating HCOs used ≥1 HT ICD-10-CM code. The most frequently used HT ICD-10-CM codes were “forced sexual exploitation, suspected” (32.2%; n = 96) and “personal history of forced labor or sexual exploitation” (27.1%; n = 81). Labor trafficking codes were noted in approximately 3.7% of cases. Conclusions: HT ICD-10-CM codes are being used by health care professionals, as confirmed by large databases. Further research is needed to understand variation in code use and risk factors associated with human trafficking.
APA, Harvard, Vancouver, ISO, and other styles
37

Efanov, D. V., G. V. Osadchii, and M. V. Zueva. "BERGER CODES IN CONCURRENT ERROR-DETECTION SYSTEMS, IMPLEMENTED ON THE BASIS OF BOOLEAN COMPLEMENT METHOD." Informatika i sistemy upravleniya, no. 1 (2021): 75–89. http://dx.doi.org/10.22250/isu.2021.67.75-89.

Full text
Abstract:
The article deals with the previously unknown characteristics of the error detection by using classical Berger codes based on their multiplicities and types (unidirectional, symmetrical and asymmetrical), which can be applied in the concurrent error-detection (CED) systems synthesis, for example, through the use of Boolean complement method. The article shows that Berger codes do not detect a certain amount of both symmetrical, unidirectional and asymmetrical errors in code words. This differs from the previously identified characteristics of the error detection only in data vectors of Berger codes (in this case, any symmetrical errors are not detected, and any unidirectional and asymmetrical errors are detected, which is used in the synthesis of systems with fault detection). The share of undetectable er-rors from their total number for Berger codes with data vector lengths r = 4,…,7 is less than 2%, and for Berger codes with data vector lengths r = 8,…,15 it is less than 0.5%. The use of classical sum codes is effective in the CED systems synthesis, including the Boolean complement method, in which both data and check bits of code words are calculated using the diagnostic object itself
APA, Harvard, Vancouver, ISO, and other styles
38

SASAKI, Masato, and Shogo HAYASHI. "New Calling System for Unknown Vessel Using a Position Code : Considerations about the Structure of Calling Code Based on the Field Experiments." Journal of Japan Institute of Navigation 97 (1997): 55–63. http://dx.doi.org/10.9749/jin.97.55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Sari, Putu Pande Novita. "The Use Of Code-Mixing By Online Sellers On Facebook Page “Peken Online Buleleng”." Jurnal Pendidikan Bahasa Inggris Indonesia 8, no. 1 (May 14, 2020): 31–43. http://dx.doi.org/10.23887/jpbi.v8i1.3138.

Full text
Abstract:
This study investigated the phenomena of code-mixing in the language used in social media. This study aimed at describing (1) the kinds of code-mixing produced by online sellers; (2) the online sellers' response towards the use of code-mixing. The data collected through online sellers' comments, captions, status and, hashtags on Facebook. The data were analysed based on the linguistic form of code-mixing by Suwito’s theory and the reasons for the use of code-mixing by Holmes Hoffman's theory. There were five steps in collecting the data, namely (1) opens the Facebook page; (2) screenshots code-mixing sentences; (3) writes code-mixing in the form of a table; (4) reads code-mixing sentences; (5) interviews the online sellers. The result showed that there were 50 code-mixing produced by online sellers. The online sellers frequently produced code-mixing in the form of words as a noun, phrase, adjective, clause, hybrid, repetition word and idiom. Meanwhile, the result of the interview showed that online sellers use code-mixing to get people’s attention, limited words or unknown translation.
APA, Harvard, Vancouver, ISO, and other styles
40

Khan, Nayeem, Johari Abdullah, and Adnan Shahid Khan. "Defending Malicious Script Attacks Using Machine Learning Classifiers." Wireless Communications and Mobile Computing 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/5360472.

Full text
Abstract:
The web application has become a primary target for cyber criminals by injecting malware especially JavaScript to perform malicious activities for impersonation. Thus, it becomes an imperative to detect such malicious code in real time before any malicious activity is performed. This study proposes an efficient method of detecting previously unknown malicious java scripts using an interceptor at the client side by classifying the key features of the malicious code. Feature subset was obtained by using wrapper method for dimensionality reduction. Supervised machine learning classifiers were used on the dataset for achieving high accuracy. Experimental results show that our method can efficiently classify malicious code from benign code with promising results.
APA, Harvard, Vancouver, ISO, and other styles
41

Hofweber, Julia, Theodoros Marinis, and Jeanine Treffers-Daller. "Effects of dense code-switching on executive control." Linguistic Approaches to Bilingualism 6, no. 5 (June 24, 2016): 648–68. http://dx.doi.org/10.1075/lab.15052.hof.

Full text
Abstract:
Abstract Bilingualism is reported to re-structure executive control networks, but it remains unknown which aspects of the bilingual experience cause this modulation. This study explores the impact of three code-switching types on executive functions: (1) alternation, (2) insertion, and (3) dense code-switching or congruent lexicalisation. Current models hypothesise that different code-switching types challenge different aspects of the executive system because they vary in the extent and scope of language separation. Two groups of German-English bilinguals differing in dense code-switching frequency participated in a flanker task under conditions varying in degree of trial-mixing and resulting demands to conflict-monitoring. Bilinguals engaging in more dense code-switching showed inhibitory advantages in the condition requiring most conflict-monitoring. Moreover, dense code-switching frequency correlated positively with monitoring skills. This suggests that dense code-switching is a key experience shaping bilinguals’ executive functioning and highlights the importance of controlling for participants’ code-switching habits in bilingualism research.
APA, Harvard, Vancouver, ISO, and other styles
42

No, Albert. "Nonasymptotic Upper Bounds on Binary Single Deletion Codes via Mixed Integer Linear Programming." Entropy 21, no. 12 (December 6, 2019): 1202. http://dx.doi.org/10.3390/e21121202.

Full text
Abstract:
The size of the largest binary single deletion code has been unknown for more than 50 years. It is known that Varshamov–Tenengolts (VT) code is an optimum single deletion code for block length n ≤ 10 ; however, only a few upper bounds of the size of single deletion code are proposed for larger n. We provide improved upper bounds using Mixed Integer Linear Programming (MILP) relaxation technique. Especially, we show the size of single deletion code is smaller than or equal to 173 when the block length n is 11. In the second half of the paper, we propose a conjecture that is equivalent to the long-lasting conjecture that “VT code is optimum for all n”. This equivalent formulation of the conjecture contains small sub-problems that can be numerically verified. We provide numerical results that support the conjecture.
APA, Harvard, Vancouver, ISO, and other styles
43

Luk, Hiu Mei, Emma Allanson, Wai-Kit Ming, and Wing Cheong Leung. "Improving Diagnostic Classification of Stillbirths and Neonatal Deaths Using ICD-PM (International Classification of Diseases for Perinatal Mortality) Codes: Validation Study." JMIR Medical Informatics 8, no. 8 (August 3, 2020): e20071. http://dx.doi.org/10.2196/20071.

Full text
Abstract:
Background Stillbirths and neonatal deaths have long been imperfectly classified and recorded worldwide. In Hong Kong, the current code system is deficient (>90% cases with unknown causes) in providing the diagnoses of perinatal mortality cases. Objective The objective of this study was to apply the International Classification of Diseases for Perinatal Mortality (ICD-PM) system to existing perinatal death data. Further, the aim was to assess whether there was any change in the classifications of perinatal deaths compared with the existing classification system and identify any areas in which future interventions can be made. Methods We applied the ICD-PM (with International Statistical Classification of Diseases and Related Health Problems, 10th Revision) code system to existing perinatal death data in Kwong Wah Hospital, Hong Kong, to improve diagnostic classification. The study included stillbirths (after 24 weeks gestation) and neonatal deaths (from birth to 28 days). The retrospective data (5 years) from May 1, 2012, to April 30, 2017, were recoded by the principal investigator (HML) applying the ICD-PM, then validated by an overseas expert (EA) after she reviewed the detailed case summaries. The prospective application of ICD-PM from May 1, 2017, to April 30, 2019, was performed during the monthly multidisciplinary perinatal meetings and then also validated by EA for agreement. Results We analyzed the data of 34,920 deliveries, and 119 cases were included for analysis (92 stillbirths and 27 neonatal deaths). The overall agreement with EA of our codes using the ICD-PM was 93.2% (111/119); 92% (78/85) for the 5 years of retrospective codes and 97% (33/34) for the 2 years of prospective codes (P=.44). After the application of the ICD-PM, the overall proportion of unknown causes of perinatal mortality dropped from 34.5% (41/119) to 10.1% (12/119) of cases (P<.001). Conclusions Using the ICD-PM would lead to a better classification of perinatal deaths, reduce the proportion of unknown diagnoses, and clearly link the maternal conditions with these perinatal deaths.
APA, Harvard, Vancouver, ISO, and other styles
44

Zhang, Pengwei, Yong Li, Hsin-Chiu Chang, Hongqing Liu, and Trieu-Kien Truong. "Fast Decoding of the (47, 24, 11) Quadratic Residue Code Without Determining the Unknown Syndromes." IEEE Communications Letters 19, no. 8 (August 2015): 1279–82. http://dx.doi.org/10.1109/lcomm.2015.2440263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Luo, Chunlan, Yi Wu, Hsin-chiu Chang, Zheng Yang, and Song Xing. "Algebraic decoding of the (41, 21, 9) quadratic residue code without determining the unknown syndromes." Physical Communication 42 (October 2020): 101135. http://dx.doi.org/10.1016/j.phycom.2020.101135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Ritter, Fabian, and Sebastian Hack. "AnICA: analyzing inconsistencies in microarchitectural code analyzers." Proceedings of the ACM on Programming Languages 6, OOPSLA2 (October 31, 2022): 1–29. http://dx.doi.org/10.1145/3563288.

Full text
Abstract:
Microarchitectural code analyzers, i.e., tools that estimate the throughput of machine code basic blocks, are important utensils in the tool belt of performance engineers. Recent tools like llvm-mca, uiCA, and Ithemal use a variety of techniques and different models for their throughput predictions. When put to the test, it is common to see these state-of-the-art tools give very different results. These inconsistencies are either errors, or they point to different and rarely documented assumptions made by the tool designers. In this paper, we present AnICA, a tool taking inspiration from differential testing and abstract interpretation to systematically analyze inconsistencies among these code analyzers. Our evaluation shows that AnICA can summarize thousands of inconsistencies in a few dozen descriptions that directly lead to high-level insights into the different behavior of the tools. In several case studies, we further demonstrate how AnICA automatically finds and characterizes known and unknown bugs in llvm-mca, as well as a quirk in AMD's Zen microarchitectures.
APA, Harvard, Vancouver, ISO, and other styles
47

Mahfoud, Asmaa, Abu Bakar Sultan, Abdul Azim Abd, Norhayati Mohd Ali, and Novia Admodisastro. "Code Obfuscation. Where is it Heading?" International Journal of Engineering & Technology 7, no. 4.1 (September 12, 2018): 22. http://dx.doi.org/10.14419/ijet.v7i4.1.19485.

Full text
Abstract:
Reverse Engineering is the process of revealing hidden code from class file. It converts garbage to readable English text. The main purpose of Reverse Engineering is to uncover the hidden code when the documentation is poor, missing source file, and developer is no longer available to provide the original code source file. Hacker uses Reverse Engineering to attack the class file to uncover the code. Then, the code can be reused for other purposes without taking any permission from the original author. The class file contains all the information and business rules that will be revealed once Reverse Engineering process attacks. Anti-Reverse Engineering techniques are developed to stop, delay, and prevent Reverse Engineering; one of the most common techniques is Obfuscation. It has many forms of protection such as, changing the names of classes and variables names, hide classes, and change form of code. In this paper, an appraisal will be conducted to study the current Obfuscation techniques. This research proposes a new hybrid technique that is based on obfuscation; the technique will be using mathematics, Unicode, and unknown language to convert the source file to a garbage running file that does same task which normal source file does for java applications.
APA, Harvard, Vancouver, ISO, and other styles
48

Efanov, D. V., G. V. Osadchiy, and M. V. Zueva. "THE CHARACTERISTICS OF ERROR DETECTION BY CODES WITH THE SUMMATION OF SINGLE INFORMATION BITS IN THE RING OF RESIDUES, ACCORDING TO A GIVEN MODULUS ARE ANALYZED, WHICH ARE MANIFESTED IN THE SYNTHESIS OF BUILT-IN CONTROL CIRCUITS USING THE BOOLEAN COMPLEMENT METHOD." Automation on Transport 7, no. 2 (June 2021): 284–314. http://dx.doi.org/10.20295/2412-9186-2021-7-2-284-314.

Full text
Abstract:
Errors occurring in the control vectors are always detected. Unlike previous studies in this subject area, the authors focus on the features of error detection by modular sum codes in all codewords, and not just in information vectors. Previously unknown properties of error detection by modular sum- mation codes with their classification by types (unidirectional, symmetrical and asymmetrical errors) and multiplicities have been established. Catalogs of detailed characteristics of modular sum codes are provided. The key patterns inherent in this class of codes are described. The research results can be used in organizing built-in control circuits using the Boolean complement method, in solving other problems of technical diagnostics, where it is important to know the properties of detecting errors in code words, as well as problems of data protection and transmission
APA, Harvard, Vancouver, ISO, and other styles
49

Yugang Ma, K. H. Li, A. C. Kot, and Getian Ye. "A blind code timing estimator and its implementation for DS-CDMA signals in unknown colored noise." IEEE Transactions on Vehicular Technology 51, no. 6 (November 2002): 1600–1607. http://dx.doi.org/10.1109/tvt.2002.802986.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Li, Yong, Gaoming Chen, Hsin-Chiu Chang, Qianbin Chen, and Trieu-Kien Truong. "An Improved Decoding Algorithm of the (71, 36, 11) Quadratic Residue Code Without Determining Unknown Syndromes." IEEE Transactions on Communications 63, no. 12 (December 2015): 4607–14. http://dx.doi.org/10.1109/tcomm.2015.2481894.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography