4,588 results on '"codes"'
Search Results
52. Bibliometric Analysis of Debt Financing Semiotics
- Author
-
Gajdosikova, Dominika, Valaskova, Katarina, Persiani, Niccolò, editor, Vannini, Ilaria Elisa, editor, Giusti, Martina, editor, Karasavvoglou, Anastasios, editor, and Polychronidou, Persefoni, editor
- Published
- 2023
- Full Text
- View/download PDF
53. Legal Issues in Industrial Drying Systems
- Author
-
Smith, J E ’Ed’ and Smith, J E 'Ed'
- Published
- 2023
- Full Text
- View/download PDF
54. Assessment of Shear Strength of Reinforced Concrete Walls: Is an Upper Limit Apposite?
- Author
-
Moretti, Marina L., di Prisco, Marco, Series Editor, Chen, Sheng-Hong, Series Editor, Vayas, Ioannis, Series Editor, Kumar Shukla, Sanjay, Series Editor, Sharma, Anuj, Series Editor, Kumar, Nagesh, Series Editor, Wang, Chien Ming, Series Editor, Ilki, Alper, editor, Çavunt, Derya, editor, and Çavunt, Yavuz Selim, editor
- Published
- 2023
- Full Text
- View/download PDF
55. Comparing Global Codes for FRP Reinforced Concrete
- Author
-
Gold, William J., di Prisco, Marco, Series Editor, Chen, Sheng-Hong, Series Editor, Vayas, Ioannis, Series Editor, Kumar Shukla, Sanjay, Series Editor, Sharma, Anuj, Series Editor, Kumar, Nagesh, Series Editor, Wang, Chien Ming, Series Editor, Ilki, Alper, editor, Çavunt, Derya, editor, and Çavunt, Yavuz Selim, editor
- Published
- 2023
- Full Text
- View/download PDF
56. The New ACI Code 440.11-22
- Author
-
Brown, Vicki L., Gold, Will, Shield, Carol, di Prisco, Marco, Series Editor, Chen, Sheng-Hong, Series Editor, Vayas, Ioannis, Series Editor, Kumar Shukla, Sanjay, Series Editor, Sharma, Anuj, Series Editor, Kumar, Nagesh, Series Editor, Wang, Chien Ming, Series Editor, Ilki, Alper, editor, Çavunt, Derya, editor, and Çavunt, Yavuz Selim, editor
- Published
- 2023
- Full Text
- View/download PDF
57. Comparison of Steel and GFRP Reinforcement in the Analysis and Design of a Mid-rise Building
- Author
-
Midrar, Mahrukh, Brown, Vicki L., di Prisco, Marco, Series Editor, Chen, Sheng-Hong, Series Editor, Vayas, Ioannis, Series Editor, Kumar Shukla, Sanjay, Series Editor, Sharma, Anuj, Series Editor, Kumar, Nagesh, Series Editor, Wang, Chien Ming, Series Editor, Ilki, Alper, editor, Çavunt, Derya, editor, and Çavunt, Yavuz Selim, editor
- Published
- 2023
- Full Text
- View/download PDF
58. Approved on 17 April 2024 and established under sections 88 and 89 of th...
- Published
- 2024
59. Approved on 17 April 2024 and established under sections 88 and 89 of th...
- Published
- 2024
60. Common institutional ownership and investment efficiency: Empirical evidence from China
- Author
-
Yajie Bai, Leilei He, and Tiegang Zhang
- Subjects
codes ,G32 ,G34 ,L22 ,Finance ,HG1-9999 - Abstract
Common institutional ownership has become a significant form of shareholding in the capital market. Using panel data on 2395 listed companies in China from 2007 to 2020, we examine the investment efficiency of this ownership practice on microcorporate investment behavior. The estimates indicate that common institutional ownership has a significant positive relationship with corporate investment efficiency by reducing overinvestment. Further institutional heterogeneity analysis reveals that enterprises have independent and long-term investment horizon of common institutional investors, and the positive effect of common institutional ownership on enterprises’ investment efficiency is stronger. The empirical results are validated by a series of robustness tests. This study provides empirical support for the performance of common institutional ownership participating in corporate governance and optimizing investment decisions.
- Published
- 2023
- Full Text
- View/download PDF
61. Judgement of error frames using frozen bits and its applications in decoding of polar codes
- Author
-
Dong Yang, Yinyou Mao, and Xingcheng Liu
- Subjects
codes ,5G mobile communication ,Telecommunication ,TK5101-6720 - Abstract
Abstract Polar codes have received widespread attention because of their excellent performance. However, although successive cancellation (SC)‐based decoding algorithms have achieved excellent error correction performance, they still encounter large time delays in decoding because a serial decoding structure is employed. At present, a cyclic redundancy check (CRC) is used to judge whether the decoding result of a frame is erroneous. To obtain such a result, the decoder has to wait until the end of decoding. In this work, a judgement strategy for error frames using frozen bits is proposed. With the proposed strategy, the recognition of erroneously decoded frames can be achieved based on the error state of the frozen bits in this frame. Accordingly, early termination of decoding can be realized. By using this mechanism, the strategy can also be applied in the SC List algorithm to prune the path. In addition, the SC Flip decoding algorithm can also use the proposed strategy to help find the first error message bit. The experimental results show that at least 85% of the frames decoded erroneously can be recognized by the proposed strategy so that decoding can be terminated in advance and computational resources can be saved.
- Published
- 2023
- Full Text
- View/download PDF
62. Augmented LT codes over binary extension fields with increased ratio of full‐degree columns
- Author
-
Changyue Jiang, Jingsong Cui, Jiawei Li, and Chi Guo
- Subjects
algebraic codes ,binary codes ,codecs ,codes ,decode and forward communication ,decoding ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Abstract This letter proposes an augmented scheme of LT codes to improve the decoding success rate. The method involves substituting the 1‐s in full‐degree columns of the generator matrix of conventional LT codes with binary extension field elements and simultaneously increasing the ratio of full‐degree columns in the ideal soliton distribution. For non‐full‐degree columns, we retain the nonzero elements as 1‐s in the conventional LT codes generator matrix to preserve computational efficiency. Compared to conventional LT codes, the proposed method enhances the linear independence of the generator matrix, leading to a higher decoding success rate with minimal data packets. Experimental results demonstrate the effectiveness of the method at improving the performance of LT codes, with close to 100% decoding success rate achieved with around 5% data redundancy.
- Published
- 2024
- Full Text
- View/download PDF
63. Swift-CNN: Leveraging PCM Memory’s Fast Write Mode to Accelerate CNNs.
- Author
-
Siddhu, Lokesh, Nassar, Hassan, Bauer, Lars, Hakert, Christian, Holscher, Nils, Chen, Jian-Jia, and Henkel, Joerg
- Abstract
Nonvolatile memories [especially phase change memories (PCMs)] offer scalability and higher density. However, reduced write performance has limited their use as main memory. Researchers have explored using the fast write mode available in PCM to alleviate the challenges. The fast write mode offers lower write latency and energy consumption. However, the fast-written data are retained for a limited time and need to be refreshed. Prior works perform fast writes when the memory is busy and use slow writes to refresh the data during memory idle phases. Such policies do not consider the retention time requirement of a variable and repeat all the writes made during the busy phase. In this work, we suggest a retention-time-aware selection of write modes. As a case study, we use convolutional neural networks (CNNs) and present a novel algorithm, Swift-CNN, that assesses each CNN layer’s memory access behavior and retention time requirement and suggests an appropriate PCM write mode. Our results show that Swift-CNN decreases inference and training execution time and memory energy compared to state-of-the-art techniques and achieves execution time close to the ideal (fast write-only) policy. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
64. Performance Enhancement of Encoding–Decoding Multidiagonal and Walsh Hadamard Codes for Spectral Amplitude Coding-Optical Code Division Multiple Access (SAC-OCDMA) Utilizing Dispersion Compensated Fiber.
- Author
-
Majeed, Majidah H. and Ahmed, Riyadh Khlf
- Subjects
CODE division multiple access ,HADAMARD codes ,COMPUTER network traffic ,BIT error rate ,DISPERSION (Chemistry) - Abstract
Spectral Amplitude Coding-Optical Codes Division Multiple Access (SAC-OCDMA) is a future multiplexing technique that witnessed a dramatic attraction for eliminating the problems of the internet in optical network field such as multiple-user access and speed's growth of the files or data traffic. In this research article, the performance of SAC-OCDMA system based on two encoding–decoding multidiagonal (MD) and Walsh Hadamard (WH) codes is enhanced utilizing three different schemes of dispersion compensating fiber (DCF): pre-, post- and symmetrical compensation. The system is simulated using Optisystem version 7.0 and Optigrating version 4.2. The performance of the proposed system is specified in terms of bit error rate (BER), Q-factor and eye diagram. It has been observed that the compensated system based on MD code is performs much better compared to the system based on WH code. On the other hand, the compensated SAC-OCDMA system with symmetrical DCF has the lowest values of BER and largest values of Q-factor, so it is considered the best simulated scheme contrasted with pre- and post-DCF. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
65. A Step-by-Step Process of Thematic Analysis to Develop a Conceptual Model in Qualitative Research.
- Author
-
Naeem, Muhammad, Ozuem, Wilson, Howell, Kerry, and Ranfagni, Silvia
- Subjects
- *
CONCEPTUAL models , *QUALITATIVE research , *THEMATIC analysis , *GROUNDED theory , *RESEARCH personnel - Abstract
Thematic analysis is a highly popular technique among qualitative researchers for analyzing qualitative data, which usually comprises thick descriptive data. However, the application and use of thematic analysis has also involved complications due to confusion regarding the final outcome's presentation as a conceptual model. This paper develops a systematic thematic analysis process for creating a conceptual model from qualitative research findings. It explores the adaptability of the proposed process across various research methodologies, including constructivist methodologies, positivist methodologies, grounded theory, and interpretive phenomenology, and justifies their application. The paper distinguishes between inductive and deductive coding approaches and emphasizes the merits of each. It suggests that the derived systematic thematic analysis model is valuable across multiple disciplines, particularly in grounded theory, ethnographic approaches, and narrative approaches, while also being adaptable to more descriptive, positivist-based methodologies. By providing a methodological roadmap, this study enhances the rigor and replicability of thematic analysis and offers a comprehensive strategy for theoretical conceptualization in qualitative research. The contribution of this paper is a systematic six-step thematic analysis process that leads to the development of a conceptual model; each step is described in detail and examples are given. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
66. Distinguishing 'planning' from the 'plan'. Institutional and professional implications of taking urban complexity seriously.
- Author
-
Moroni, Stefano
- Subjects
- *
TWENTIETH century , *LOCAL government , *PROFESSIONAL employees , *PLANNERS - Abstract
In the twentieth century, "planning" as a (public) activity and the "plan" as an instrument came to coincide. According to this perspective, planners are professionals specialised primarily in conceiving and designing plans. This article suggests that we should reject the overlap between planning and plan, recognising the latter as just one of the tools that planners can use – and for very specific purposes. The article starts by distinguishing between two different tasks of local administrations: the "infrastructural" task, and the "regulatory" one. Subsequently, it emphasises how the pre-twentieth-century idea of the plan was in the twentieth century inappropriately extended from infrastructural activities to regulatory ones as well. The article proceeds by suggesting how to remedy this situation: that is, demarcating more sharply between two different kinds of planning intervention – infrastructural and regulatory – and employing plans prevalently in the former case while utilising different instruments for the latter. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
67. ITS_LIVE: A Cloud-Native Approach to Monitoring Glaciers From Space.
- Author
-
Lopez, Luis A., Gardner, Alex S., Greene, Chad A., Kennedy, Joseph H., Liukis, Maria, Fahnestock, Mark A., Scambos, Ted, Fahnestock, Jacob R., Borgo, Rita, and Gaither, Kelly
- Subjects
OPEN scholarship ,DATA libraries ,EARTH sciences ,CLOUD computing ,REMOTE sensing ,GLACIERS - Abstract
NASA's ITS_LIVE project delivers information on global glacier dynamics and provides historical context for climate change with a record of how every glacier in the world has evolved over decades of satellite observation. To handle petabytes of data in the satellite archives and a constant influx of new observations, the project has adopted a cloud-native approach that is scalable, performant, user friendly, and embraces transparent and collaborative code development. As every discipline of Earth science is being transformed by a new era of remote sensing and cloud computing, ITS_LIVE offers a progressive approach to maximizing scientific advancements through open science. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
68. Experimental and Numerical Investigation for Torsional Behavior of UHPFRC Shallow and Deep Beams.
- Author
-
Yousef, Ahmed M., Marami, Nagat A., and Tahwia, Ahmed M.
- Subjects
- *
TORSIONAL load , *FIBER-reinforced concrete , *ULTIMATE strength - Abstract
With increasing the use of ultra-high performance fiber reinforced concrete (UHPFRC) in recent years, torsional design of UHPFRC beams has become of great importance. This paper presents an experimental and numerical study to investigate the torsional behavior of UHPFRC shallow and deep beams with fcu equal to 190.2 MPa. Ten UHPFRC beams with steel fibers volume fraction of 1.5% subjected to pure torsion were investigated. The provided torsional web reinforcement ratio, the area of longitudinal bars and the tested span to total height ratio (L/h = 6.0, 4.0, 2.0 and 1.0) were the studied parameters. A numerical model has been proposed to predict the torsional response of tested beams. Experimental results showed that increasing stirrups' spacing for the beams of the same L/h ratio (to be 235% of the maximum given by ACI 318-2019 code), reduced the experimental ultimate torsional strength by only 6.7%. The torsional web reinforcement ratio of UHPFRC shallow and deep beams can be safely taken to be 40% of the minimum required by ACI 318-2019. The maximum stirrups spacing can be safely taken the lesser of twice the beam width or 300 mm. The equation used by ACI 318-2019 and ECP-203-2020 for calculating the cracking strength in torsion has been modified to be suitable for UHPFRC beams by taking into consideration the L/h ratio and steel fibers percent. The proposed 3-D numerical model showed good predictions for the torsional strength of tested UHPFRC shallow and deep beams. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
69. COMPARISON STUDY OF TORSIONAL STRENGTH OF STEEL FIBER REINFORCED-CONCRETE BEAMS WITH VARIOUS DESIGN CODES.
- Author
-
Wardana, Afif Kusuma and Tavio
- Subjects
TORSIONAL load ,TRANSVERSE reinforcements ,STEEL ,FIBERS ,STANDARD deviations ,CONCRETE beams - Abstract
There has been no calculation of torque capacity using a specific code on SFRC beams. Therefore, this paper describes efforts to compare capacity analysis studies of SFRC beams with ACI Code 318-19 design, CSA A23.3:19, SNiP, Eurocode 2, and modification of ACI Code 318-19. A total of 85 specimens were adopted from 16 previous study groups, and the torsional strength was compared with the proposed equation by modifying and applying it to ACI code 318-19. The proposed formula, by adding the effect of steel fiber, increases the contribution of steel fiber to the longitudinal and transverse reinforcement. After the torsional strength of the proposed formula is obtained, it is compared with the four design codes of torsional strength analysis without the influence of steel fiber to determine the accuracy of the prediction of torsional strength, which is close to the results of experimental testing. From the results presented, each strength design prediction varies significantly in mean ratio, standard deviation, and coefficient of variation. Comparing the five concluded that the design obtained using the modified design code ACI 318-19 and CSA A23.3:19 provides better accuracy. The results of Eurocode 2 provide an average ratio of 1.62, the largest among the others. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
70. Political connections and financial performance: the moderating role of director efficacy
- Author
-
Niazi, Murtaza Masud, Othman, Zaleha, and Chandren, Sitraselvi
- Published
- 2023
- Full Text
- View/download PDF
71. An Institutional Perspective on Corporate Governance
- Author
-
Haxhi, Ilir
- Published
- 2023
- Full Text
- View/download PDF
72. Ethics of Artificial Intelligence in Education
- Author
-
Smiljana Gartner and Marjan Krašna
- Subjects
ethics ,artificial intelligence ,education ,codes ,attitude ,Education - Abstract
The post-COVID period drastically accelerated the development and increased use of artificial intelligence. These changes have not been limited to industry but have begun to be introduced into education. The digital literacy of all involved in education must also incorporate ethical considerations related to the application of AI in education. The article presents the ethical codes of AI and analyse the four basic building blocks of an ethical attitude towards AI in education (autonomy, privacy, trust and responsibility). Understanding the concepts of AI and their ethical implications is a condition for acting in accordance with them and for their introduction in education.
- Published
- 2023
- Full Text
- View/download PDF
73. Fast list decoders for polarization‐adjusted convolutional (PAC) codes
- Author
-
Hongfei Zhu, Zhiwei Cao, Yuping Zhao, Dou Li, and Yanjun Yang
- Subjects
channel coding ,codes ,information theory ,polar codes ,signal processing ,Telecommunication ,TK5101-6720 - Abstract
Abstract A latest coding scheme named polarization‐adjusted convolutional (PAC) codes is shown to approach the dispersion bound for the code (128,64) under list decoding. However, to achieve the near‐bound performance, the list size of list decoding needs to be excessively large, which leads to insufferable time complexity. In this paper, to improve the speed of list decoding, fast list decoders for PAC codes are proposed. Four types of constituent nodes are defined and fast list decoding algorithms are provided for each of them. Simulation results present that fast list decoding with three types of constituent nodes can yield exactly the same error‐correction performance as list decoding, and reduce more than 50% time steps for the code (128,64). Moreover, fast list decoding with four types of constituent nodes can further reduce decoding complexity with negligible performance degradation.
- Published
- 2023
- Full Text
- View/download PDF
74. An XSLT-Based Proposal to Ease Embedded Critical Systems Tools Implementation, Verification, Validation, Testing, and Certification Efforts.
- Author
-
Germino, Santiago, Menendez, Martin N., and Lutenberg, Ariel
- Abstract
Implementing embedded critical system tools using general-purpose programming languages usually challenges conformance to relevant standards. This letter proposes implementing tools that manipulate a system model expressed in extensive markup language using the extensive stylesheet language transformations (XSLT) and related technologies playing specific roles in a particular sequence developed to ease verification, validation, testing, and certification efforts. XSLT is a data-centric, domain-specific language that produces a more straightforward tool implementation, thus reducing human errors. We will introduce the proposal by reviewing, as an example, the reimplementation of a tool initially written in Python that automatically generates the VHDL source code of an embedded critical system. Finally, we will compare both implementations, noting compelling results. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
75. Translation Challenges in Media: A Content Analysis of Rudaw News as a Case Study.
- Author
-
Shaban, Ahmad Abdulkareem, Abdullah, KaiwanHaje, Sharafani, Abdullah Farhan, and Haji, Suhrab Muhammed
- Subjects
CROSS-cultural differences ,LANGUAGE & languages ,CONTENT analysis ,TRANSLATIONS - Abstract
Translation encompasses not only languages but also diverse cultures that differ in various ways. As linguistic aspects vary among civilizations, language and culture are intertwined. Therefore, translation serves as an essential, fundamental, and successful method for spreading culture worldwide. The study utilized three main units to analyze ten news items from prominent Iraqi media outlets, specifically Shafaq News En. The frequencies and percentages of these categories were employed to determine the statistical differences between each unit. However, the findings revealed that both samples predominantly employed re-writing and re-editing techniques instead of translating the news content. This reliance on such methods makes it challenging to draw accurate comparisons. Nevertheless, the study addressed the research problem and questions through content analysis and Semi logical analysis. It successfully confirmed the hypotheses concerning the influence of cultural differences on the translation of news content. In conclusion, this study emphasizes the importance of translation in bridging cultural gaps. It recognizes the intertwined nature of language and culture, and how translation facilitates the global dissemination of cultural knowledge. While the study's findings highlight the prevalence of re-writing and re-editing in news translation, they also shed light on the significant role cultural differences play in this process. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
76. FoggyEdge: An Information-Centric Computation Offloading and Management Framework for Edge-Based Vehicular Fog Computing.
- Author
-
Rehman, Muhammad Atif Ur, Salah ud din, Muhammad, Mastorakis, Spyridon, and Kim, Byung-Seo
- Abstract
Recent advances aiming to enable in-network service provisioning are empowering a plethora of smart infrastructure developments, including smart cities and intelligent transportation systems (ITSs). Although edge computing, in conjunction with roadside units, appears to be a promising technology for proximate service computations, the rising demands for ubiquitous computing and ultralow-latency requirements from consumer vehicles are challenging the adoption of ITSs. Vehicular fog (VF) computing, which extends the fog computing paradigm in vehicular networks by utilizing either parked or moving vehicles for computations, has the potential to further reduce computation offloading transmission costs. Therefore, with a precise objective of reducing latency and delivering proximate service computations, we integrate VF computing with roadside edge computing and propose a four-layer framework named FoggyEdge. The FoggyEdge framework is built at the top of named data networking and employs microservices to perform in-network computations and offloading. A real-world Simulation of Urban Mobility-based preliminary performance comparison validates FoggyEdge’s effectiveness. Finally, a few future research directions on incentive mechanisms, security and privacy, optimal VF location, and load balancing are summarized. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
77. Judgement of error frames using frozen bits and its applications in decoding of polar codes.
- Author
-
Yang, Dong, Mao, Yinyou, and Liu, Xingcheng
- Subjects
- *
DECODING algorithms - Abstract
Polar codes have received widespread attention because of their excellent performance. However, although successive cancellation (SC)‐based decoding algorithms have achieved excellent error correction performance, they still encounter large time delays in decoding because a serial decoding structure is employed. At present, a cyclic redundancy check (CRC) is used to judge whether the decoding result of a frame is erroneous. To obtain such a result, the decoder has to wait until the end of decoding. In this work, a judgement strategy for error frames using frozen bits is proposed. With the proposed strategy, the recognition of erroneously decoded frames can be achieved based on the error state of the frozen bits in this frame. Accordingly, early termination of decoding can be realized. By using this mechanism, the strategy can also be applied in the SC List algorithm to prune the path. In addition, the SC Flip decoding algorithm can also use the proposed strategy to help find the first error message bit. The experimental results show that at least 85% of the frames decoded erroneously can be recognized by the proposed strategy so that decoding can be terminated in advance and computational resources can be saved. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
78. Reliability‐ and sustainability‐driven strategies for the maintenance of existing structures.
- Author
-
Fernández Ruiz, Miguel, Regúlez, Borja, Todisco, Leonardo, Faria, Duarte M.V., and Corres, Hugo
- Subjects
- *
SUSTAINABILITY , *ENGINEERS , *MAINTENANCE , *RELIABILITY in engineering - Abstract
The management of existing structures is raising a number of pertinent questions to the owners and engineers. Many structures built more than 50 years ago (even those built hundreds of years ago) usually no longer comply with safety requirements of current codes, which are typically addressed in new structures. This is not necessarily only caused by a poor original design or degradation with time, but it may be, for example, the consequence of increase in actions, reducing the level of reliability of a structure. This paper focuses on strategies to be adopted for existing structures which do not comply with code requirements for new constructions (e.g., to repair, to demolish, to rebuild, etc.) on the basis of a more holistic approach that includes economic, social, and environmental considerations. To that aim, first, a brief review of the background concepts on the reliability of structures is presented, highlighting the differences for new and existing structures. Following this analysis, suitable values for the reliability index (including sustainability considerations) are proposed, as well as tailored maintenance strategies. Finally, the paper presents a case study based on a real project to emphasize the benefits of adopting such a holistic perspective. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
79. Experimental and Numerical Study of UHPFRC Continuous Deep Beams with Openings.
- Author
-
Yousef, Ahmed M., Tahwia, Ahmed M., and Al-Enezi, Meshal S.
- Subjects
TRANSVERSE reinforcements ,FAILURE mode & effects analysis ,STIRRUPS ,PERFORMANCE theory - Abstract
To study the performance of UHPFRC continuous deep beams with openings, experimental and numerical investigations have been carried out. The test program included seven continuous deep beams with openings, in addition to one similar solid beam. The variables were the ratio of transverse reinforcement and the position, height, and width of the opening. The results showed that the failure mode of UHPFRC two-span continuous deep beams depends mainly on the position and size of the opening in the shear span. The shear failure occurs in the diagonal strut between the support and the applied force through the opening edges. The maximum spacing between stirrups (s
v ,max ) of ACI 318-2019 was not suitable for UHPFRC. Providing stirrups with spacing 129% greater than sv ,max of ACI 318-2019 had a slight effect on the failure load. Web openings of 20% of beam height reduced the failure load by 31.6% to 43.0% compared with a similar solid beam. For specimens with the same opening height and position, increasing the width of the opening by about 75% more than that of a similar beam reduced the failure load by about 27.8%. The proposed 3-D numerical model successfully predicted the failure load and performance of UHPFRC continuous deep beams. [ABSTRACT FROM AUTHOR]- Published
- 2023
- Full Text
- View/download PDF
80. SSRN: A Nonlocal Sparse Attention and Multiscale Fusion Super Resolution Network for Spacecraft ISAR Image.
- Author
-
Yang, Jingfan, Li, Zhihui, Gao, Hu, Wang, Ning, and Dang, Depeng
- Abstract
Inverse synthetic aperture radar (ISAR) is a popular space object detection method. However, due to the complex flight conditions of spacecraft and limited observation time, the resolution of spacecraft ISAR images is reduced. Although there are many methods of ISAR image super resolution, but none of them aim at spacecraft. To this end, in this letter, we analyze the characteristics of spacecraft ISAR images, and first propose an approach space super resolution network (SSRN), suitable for spacecraft ISAR images. Specially, our approach is designed to utilize the repetitive structures commonly observed in spacecraft ISAR images. So we introduce nonlocal sparse attention (NLSA) to capture the long-distance self-similarity in the spacecraft ISAR image. Spherical locality sensitive hashing (SLSH) is used to construct multiple attention buckets, and the query feature and features in the same and adjacent buckets are used for attention operations. To effectively extract multiscale features and contrast features from spacecraft ISAR image, we design the Residual Atrous Spatial Pyramid Pooling block (ResASPPblock), connect a number of atrous convolution layers with different dilation rates, and add the skip connection. The experiment on the real ISAR image of a certain type spacecraft proves the effectiveness of our approach, and the performance of our approach is higher than the popular ISAR super resolution method. Overall, our approach provides a promising solution for improving the resolution of spacecraft ISAR images. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
81. Distillation-Based Hashing Transformer for Cross-Modal Vessel Image Retrieval.
- Author
-
Guo, Jiaen, Guan, Xin, Liu, Ying, and Lu, Yu
- Abstract
Cross-modal image retrieval has attracted much attention in remote sensing (RS) data analysis these years, and however, the retrieval of target images, such as surface vessels, receives little interest. Considering the complex geometric features of vessel images and the modality gap, the widely used joint feature learning based on convolutional neural networks (CNNs) tends to have low precision. In this letter, a distillation-based hashing transformer (DBHT) is proposed to solve the above problems. Specifically, we adopt vision transformer (ViT) as the feature extractor for target images and a hash token is designed and attended to ViT for hashing generation. To avoid the precision attenuation caused by the uncontrollability in common feature space construction, we design a two-step feature learning strategy and build a well-performed unimodal hashing retrieval framework first and then transfer the hashing knowledge to another modality. Two distillation strategies, as well as cross-modal weighted triplet loss, are designed to supervise the above process and ensure complete knowledge transfer. Cross-modal weight transfer is also adopted to bridge the modality gap. Extensive experiments on two bimodal vessel image datasets show that the proposed DBHT is superior to several cross-modal hashing baselines in cross-modal vessel image retrieval tasks. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
82. Learning From Self-Supervised Features for Hashing-Based Remote Sensing Image Retrieval.
- Author
-
Tang, Jiayi, Wang, Dali, Tong, Xiaochong, Qiu, Chunping, Yang, Weiming, and Lei, Yi
- Abstract
Image retrieval (IR) for practical remote sensing (RS) should have high accuracy, storage, and calculation efficiency, while not relying on big annotations. However, current supervised and unsupervised RSIR methods do not yet fully meet these requirements. To this end, we propose a novel hashing-based IR approach via learning hash codes from open and representative self-supervised features. Specifically, we constructed a model out of a self-supervised pretrained backbone and a small multilayer perceptron (MLP)-based hashing learning neural network. Features from the frozen backbones were used to reconstruct a similarity matrix to guide the hash network learning. This way, the semantic structure can be preserved. To enhance the proposed approach, we propose the exploitation of global high-level semantic information within the similarity reconstruction process by introducing a small set of labeled datasets. Extensive comparative experiments on two commonly used RS image datasets demonstrate the outperformance of our proposed approach and its good balance between the retrieval accuracy and utilized annotations. In these two datasets, the labeled data required by our method accounts for less than 3% of that required by traditional methods, but our obtained mean average precision (mAP) can reach over 90%, which is close to that of current advanced supervised methods. In addition, we analyzed the specific effect of our design and the associated hyperparameters. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
83. Central Cohesion Gradual Hashing for Remote Sensing Image Retrieval.
- Author
-
Han, Lirong, Paoletti, Mercedes E., Tao, Xuanwen, Wu, Zhaoyue, Haut, Juan M., Plaza, Javier, and Plaza, Antonio
- Abstract
With the recent development of remote sensing technology, large image repositories have been collected. In order to retrieve the desired images of massive remote sensing data sets effectively and efficiently, we propose a novel central cohesion gradual hashing (CCGH) mechanism for remote sensing image retrieval. First, we design a deep hashing model based on ResNet-18 which has a shallow architecture and extracts features of remote sensing imagery effectively and efficiently. Then, we propose a new training model by minimizing a central cohesion loss which guarantees that remote-sensing hash codes are as close to their hash code centers as possible. We also adopt a quantization loss which promotes that outputs are binary values. The combination of both loss functions produces highly discriminative hash codes. Finally, a gradual sign-like function is used to reduce quantization errors. By means of the aforementioned developments, our CCGH achieves state-of-the-art accuracy in the task of remote sensing image retrieval. Extensive experiments are conducted on two public remote sensing image data sets. The obtained results support the fact that our newly developed CCGH is competitive with other existing deep hashing methods. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
84. The Intelligence Advanced Research Projects Activity Advanced Graph Intelligent Logical Computing Environment Program: Reinventing Computing.
- Author
-
Harrod, William J.
- Subjects
ARTIFICIAL intelligence ,ARCHITECTURAL design ,WORKFLOW software ,COMPUTER architecture ,SOFTWARE engineering ,GRAPH algorithms - Abstract
New data-centric architectures optimized for knowledge discovery and analytics are urgently required. This article describes the Intelligence Advanced Research Projects Activity's Advanced Graph Intelligent Logical Computing Environment program, the first step toward catalyzing a computing revolution by pioneering new hardware and software co-designs tailored for data handling and movement. The goal is to empower transformative applications across all fields through efficient, scalable systems balanced for both data-intensive and compute-intensive workloads. Realizing this vision demands continued research into components, prototypes, and architectural design principles that place priority on the data. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
85. Challenges and Techniques for Reproducible Simulations.
- Author
-
Muhlberger, Curran D., Schneider, Barry I., and Wainer, Gabriel A.
- Subjects
SIMULATION methods & models ,COMPUTER networks - Abstract
Too often, reproducibility is unnecessarily sacrificed in new simulation codes. We explore some ways in which this happens and provide recommendations for reclaiming it. Experience shows that robust bitwise reproducibility on a fixed runtime platform is a desirable and achievable target. The variety of threats considered suggests that maintaining a reproducible simulator to this degree requires vigilance, but, in addition to the usual benefits, the increased effort is rewarded on the software engineering front by enabling low-overhead techniques to detect bugs sooner and diagnose them faster. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
86. بازنم ای ی سوژه زن در سینما ی نم ای ش خان گ ی)مطالع ه مور د ی س ریا ل مانکن (
- Author
-
افشار کبیری and ئ هسرین شاف عی
- Abstract
This study attempts to analyze the representation of the female subject in the narrative and visual content of home theater in the Mannequin series. For this purpose, by applying the constructivist approach of Richard Dyer and Stuart Hall's theory of representation as the theoretical framework and Fisk's semiotic analysis method in three levels of codes of reality, representation, and ideology, Mannequin series has been examined and evaluated. The research method of this study is a qualitative analysis with an inductive approach. According to the topic and the research problem, deploying qualitative and semiotic methods is the best technique to analyze this topic. The results indicate that the ideological codes of the series are a combination of several codes that together show the class of the woman character in the series. The upper-class female characters in Mannequin series look for fashion, extravagance, variety, and luxury life. On the other hand, the middle or lower-class women in the series are representations of the lone women's turmoil in society who are not able to find the correct and upright ways to achieve their desires and thus go astray. For the single women in the family, who are full of selfishness and self-interest, the Mannequin series leaves no choice but to prostitute themselves and trust in the criminals of society. In summarizing the contents, the following can be mentioned about the Mannequin series: home cinema, which could have been a qualitative alternative to the national television, causes serious damage to the cinema and the culture of our Iranian-Islamic society by turning to such low-quality and worthless series in terms of technical structure and moral themes. [ABSTRACT FROM AUTHOR]
- Published
- 2023
87. A SYSTEMATIC REVIEW ON THE USE OF METAPHOR ANALYSES IN TEACHING ENGLISH.
- Author
-
A., Makhanova and Gunduz, Samettin
- Subjects
CREATIVE thinking ,ENGLISH language ,ENGLISH as a foreign language ,FOREIGN language education ,METAPHOR ,LEARNING - Abstract
Copyright of Bulletin of Ablai Khan KazUIRandWL: Series 'Pedagogical Sciences' is the property of Kazakh Ablai Khan University of International Relations & World Languages and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
88. Comprehensive Competition Mechanism in Palmprint Recognition.
- Author
-
Yang, Ziyuan, Huangfu, Huijie, Leng, Lu, Zhang, Bob, Teoh, Andrew Beng Jin, and Zhang, Yi
- Abstract
Palmprint has gained popularity as a biometric modality and has recently attracted significant research interest. The competition-based method is the prevailing approach for hand-crafted palmprint recognition, thanks to its powerful discriminative ability to identify distinctive features. However, the competition mechanism possesses vast untapped advantages that have yet to be fully explored. In this paper, we reformulate the traditional competition mechanism and propose a $\boldsymbol {C}$ omprehensive $\boldsymbol {C}$ ompetition Network (CCNet). The traditional competition mechanism focuses solely on selecting the winner of different channels without considering the spatial information of the features. Our approach considers the spatial competition relationships between features while utilizing channel competition features to extract a more comprehensive set of competitive features. Moreover, existing methods for palmprint recognition typically focus on first-order texture features without utilizing the higher-order texture feature information. Our approach integrates the competition process with multi-order texture features to overcome this limitation. CCNet incorporates spatial and channel competition mechanisms into multi-order texture features to enhance recognition accuracy, enabling it to capture and utilize palmprint information in an end-to-end manner efficiently. Extensive experimental results have shown that CCNet can achieve remarkable performance on four public datasets, showing that CCNet is a promising approach for palmprint recognition that can achieve state-of-the-art performance. Related codes will be released at https://github.com/Zi-YuanYang/CCNet. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
89. Obfuscation-Resilient Android Malware Analysis Based on Complementary Features.
- Author
-
Gao, Cuiying, Cai, Minghui, Yin, Shuijun, Huang, Gaozhun, Li, Heng, Yuan, Wei, and Luo, Xiapu
- Abstract
Existing Android malware detection methods are usually hard to simultaneously resist various obfuscation techniques. Therefore, bytecode-based code obfuscation becomes an effective means to circumvent Android malware analysis. Building obfuscation-resilient Android malware analysis methods is a challenging task, due to the fact that various obfuscation techniques have vastly different effects on code and detection features. To mitigate this problem, we propose combining multiple features that are complementary in combating code obfuscation. Accordingly, we develop an obfuscation-resilient Android malware analysis method CorDroid, based on two new features: Enhanced Sensitive Function Call Graph (E-SFCG) and Opcode-based Markov transition Matrix (OMM). The first describes sensitive function call relationships, while the second reflects transition probabilities among opcodes. Combining E-SFCG and OMM can well characterize the runtime behavior of Android apps from different perspectives, hence increasing the difficulty of misleading malware analysis through using code obfuscation to affect detection features. To evaluate CorDroid, we generate 74, 138 obfuscated samples with 14 different obfuscation techniques, and compare CorDroid with the state-of-the-art detection methods (e.g., MaMaDroid, RevealDroid and APIGraph). In terms of average F1-Score, CorDroid is 29.69% higher than MaMaDroid, 21.80% higher than APIGraph, and 9.71% higher than RevealDroid, respectively. Experiments also validate the complementarity between E-SFCG and OMM, and exhibit the high execution efficiency of CorDroid. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
90. The Production and Interpretation of Signs in Interactive Art Based on Baudrillard's Theory; A Case Study of Team Lab Group's Artworks.
- Author
-
Homayounfar, Rashno, Mostafavi, Shamsalmolouk, and Ardalani, Hossein
- Subjects
INTERACTIVE art ,INSTALLATION art ,ART objects ,COMPUTER art ,COMMON sense ,STREET art ,POSTMODERNISM (Art) ,IMAGINATION - Abstract
Nowadays, use of new technologies in creating artworks lead to the expansion of interactive approaches in art. Interactive art as a new art that influenced by technology is a suitable platform to be able to study it based on the thoughts of contemporary philosopher Jean Baudrillard. In interactive art, the presence and role of the audience in the completion of artwork, creates a common sense between the audience and the artwork Jean Baudrillard, one of the postmodernism theorists, considers simulation in the contemporary world as a main factor in the disappearance of reality. According to Baudrillard's belief, signs and codes have dominated all aspects of life, including art, in the postmodern society, and he has repeatedly expressed his concern that the reality of the world is being forgotten in the midst of pretense and signs. The aim of research is by relying on the key concepts of Baudrillard's theories such as simulation and sign value and by examining two examples of Team Lab designer's interactive artworks, answers this question: how reproduction of signs and Baudrillard's simulation does occur in interactive art? To achieve this goal, a descriptive-analytical method was used to collect information using written and digital sources. The results of the research show that the presence and action of the audience in interactive art and the difference in their point of view and the way the audience communicates with the interactive work, have created new signs. This reproduction of signs along with factors such as interaction, imagination, subject and object and sense of audience leads to the blurring of the distinction between simulation and reality and the creation of signs without reference to the real world. In these interactive artworks, the role of the audience in completing the work is planned and limited according to the creator's wishes and is more close to the artist's ideas and desires. Since the creation of a hyperreal space requires requirements such as believability, computeralness, explorability, interactivity and immersion, by meeting these requirements in digital interactive art by the creator of the work and its designers, in addition to preserving the artist's idea, attractiveness for the audience of the work is also created. The lack of reference to the real world in these works demonstrates Baudrillard's creation of the hyper reality in interactive art. The interactive art invites the audience to participate and consume images and produce new signs and traps the subject and directs his thought to the subject, to create an imaginary world. The audience considers this world as their main goal and is exposed to responding and expressing the work rather than trying to understand and judge, and the audience becomes a part of artwork and becomes an art object. The results of the investigation of digital interactive art installations of water painting and the nature of graffiti are an example of the domination of signs and the control of the audience by the codes and machine algorithms considered by Baudrillard, and a manifestation of the role of modern technology. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
91. Codes from $m$-ary $n$-cubes $Q^m_n$: a survey
- Author
-
Jennifer Key and Bernardo Rodrigues
- Subjects
n-cubes- ,graphs ,codes ,permutation decoding ,Mathematics ,QA1-939 - Abstract
We collect together some known results concerning the codes from adjacency matrices of the graph with vertices the nodes of the $m$-ary $n$-cube $Q^m_n$ and with adjacency defined by the Lee metric, and include some new results.
- Published
- 2023
- Full Text
- View/download PDF
92. History of the Development of Analytical Models of Cracking of Restrained Walls on a Given Edge Since 1968
- Author
-
Mariusz Zych
- Subjects
Restrained wall ,Imposed deformation ,Crack mechanics ,Analytical models ,Codes ,Systems of building construction. Including fireproof construction, concrete construction ,TH1000-1725 - Abstract
Abstract This research paper presents and comments on analytical models for calculating the widths of cracks formed as a result of imposed deformations generating tensile stresses in reinforced concrete base-restrained members. This issue regarding the mechanics of concrete structures has been presented on the basis of calculation models since 1968. In accordance with the current regulations of the European standard, the mechanics of the cracking of base-restrained members have been presented in a very simplified way, which was justified by a limited number of research studies performed on such members as well as in a few subject publications. The main purpose of this work was to present especially those models that had the greatest practical significance within a specific period of time or formed the basis for further studies of other authors. In addition, future trends in the development of computational tools are presented. The chronologically presented development of design ideas, which takes into account varying degrees of advancement of the mechanics of cracking due to the distinctly different design consequences, is a valuable source of information and an inspiration for subsequent researchers. In the second part of the paper, a few of the most important issues connected with the calculation of the crack width in base-restrained walls are presented. It is shown that currently, on the basis of the up-to-date knowledge, there are possibilities to create more complementary standard guidelines, which is already taking place in the case of European guidelines.
- Published
- 2023
- Full Text
- View/download PDF
93. Determinants of Net Transactions in TARGET2 of European Banks Based on Micro-data
- Author
-
Drott, Constantin, Goldbach, Stefan, and Jochem, Axel
- Published
- 2024
- Full Text
- View/download PDF
94. Verbot von rechten Symbolen, Codes und Abzeichen in Österreich
- Author
-
Lichtenwagner, Mathias, Reitmair-Juárez, Susanne, Lange, Dirk, Series Editor, Goetz, Judith, editor, and Reitmair-Juárez, Susanne, editor
- Published
- 2022
- Full Text
- View/download PDF
95. Managing Labor Relations in Greek Hospitals—A Nursing Approach
- Author
-
Dialechti, Tsimpida, Grose, Chris A., Talias, Michael A., Sklias, Pantelis, editor, Polychronidou, Persefoni, editor, Karasavvoglou, Anastasios, editor, Pistikou, Victoria, editor, and Apostolopoulos, Nikolaos, editor
- Published
- 2022
- Full Text
- View/download PDF
96. Engineering Ethics
- Author
-
Blum, Michelle and Blum, Michelle
- Published
- 2022
- Full Text
- View/download PDF
97. Cultivation and Linguistic Competence
- Author
-
Daloz, Jean-Pascal and Daloz, Jean-Pascal
- Published
- 2022
- Full Text
- View/download PDF
98. Thematic Analysis: Making Values Emerge from Texts
- Author
-
Wæraas, Arild, Espedal, Gry, editor, Jelstad Løvaas, Beate, editor, Sirris, Stephen, editor, and Wæraas, Arild, editor
- Published
- 2022
- Full Text
- View/download PDF
99. Managing Industry 4 Technology and Innovation
- Author
-
Schubert, Jeff, Zavyalova, Elena B., editor, and Popkova, Elena G., editor
- Published
- 2022
- Full Text
- View/download PDF
100. Optimization of SNGDBF Decoding for LDPC Codes Parameters Based on Taguchi Method
- Author
-
Ouakili, Hajar El, Alami, Rachid El, Mehdaoui, Younes, Chenouni, Driss, Lakhliai, Zakia, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Saeed, Faisal, editor, Al-Hadhrami, Tawfik, editor, Mohammed, Errais, editor, and Al-Sarem, Mohammed, editor
- Published
- 2022
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.