Results 11 to 20 of about 942,194 (293)

Large language model-based code generation for the control of construction assembly robots: A hierarchical generation approach

open access: yesDevelopments in the Built Environment
Offline programming (OLP) is a mainstream approach for controlling assembly robots at construction sites. However, existing methods are tailored to specific assembly tasks and workflows, and thus lack flexibility.
Hanbin Luo   +3 more
doaj   +3 more sources

A Histone Code for Chromatin Assembly [PDF]

open access: yesCell, 2008
In this issue, two papers implicate histone H3 lysine 56 acetylation in histone deposition in chromatin. Li et al. (2008) show that acetylation of H3K56 promotes S phase chromatin assembly that is mediated by the histone chaperones CAF-1 and Rtt106. Chen et al.
Fillingham, Jeffrey, Greenblatt, Jack F.
openaire   +2 more sources

Analysis of Computer Modelling Results on Fuel Rods Strength and Condition at Reduced or Absent Cooling Caused by Accident

open access: yesEnergy Engineering and Control Systems, 2021
The paper describes the phenomenology of fuel rod behaviour in severe accident. As an example, an experiment is described resulting in severe damage of 19 fuel rod assembly of VVER type; it was carried out in the CORA facility in 1993 (Research Centre ...
Stepan Lys
doaj   +1 more source

Validation of PWR Neutronics Code Package TORCH V2.0 With Nuclear Power Plant Measurements

open access: yesFrontiers in Energy Research, 2022
This article presents the verification and validation (V and V) of PWR neutronics code package TORCH V2.0 with nuclear power plant (NPP) measurements. The advanced nuclear power engineering design software, TORCH V2.0, was developed by the Nuclear Power ...
Bin Zhang   +4 more
doaj   +1 more source

Binary Code Similarity Detection Method Based on Pre-training Assembly Instruction Representation [PDF]

open access: yesJisuanji kexue, 2023
Binary code similarity detection has been widely used in vulnerability searching,malware detection,advanced program analysis and other fields in recent years,while program code is similar to natural language in a degree,researchers start to use pre ...
WANG Taiyan, PAN Zulie, YU Lu, SONG Jingbin
doaj   +1 more source

Self-assembly of DNA-coded nanoclusters [PDF]

open access: yesPhysical Review E, 2006
v2, 4 pages, 7 figures, added journal ...
Licata, Nicholas A.   +1 more
openaire   +3 more sources

Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Over the past decades, fault injection attacks have been extensively studied due to their capability to efficiently break cryptographic implementations.
Jakub Breier, Xiaolu Hou, Yang Liu
doaj   +1 more source

Link-time smart card code hardening [PDF]

open access: yes, 2015
This paper presents a feasibility study to protect smart card software against fault-injection attacks by means of link-time code rewriting. This approach avoids the drawbacks of source code hardening, avoids the need for manual assembly writing, and is ...
De Bosschere, Koen   +3 more
core   +1 more source

RNA Virus Evolution via a Quasispecies-Based Model Reveals a Drug Target with a High Barrier to Resistance

open access: yesViruses, 2017
The rapid occurrence of therapy-resistant mutant strains provides a challenge for anti-viral therapy. An ideal drug target would be a highly conserved molecular feature in the viral life cycle, such as the packaging signals in the genomes of RNA viruses ...
Richard J. Bingham   +2 more
doaj   +1 more source

A measurable refinement method of design and verification for micro-kernel operating systems in communication network

open access: yesDigital Communications and Networks, 2023
A secure operating system in the communication network can provide the stable working environment, which ensures that the user information is not stolen.
Zhenjiang Qian   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy