Results 71 to 80 of about 3,402,194 (310)
PPUAS--photopeak unfolding and self-shielding program [PDF]
Computer code was developed to determine radioactive emission rates of nuclear fuels. Code is basically written for two different source geometries; however, unfolding routine can be executed for other source ...
Taherzadeh, M.
core +1 more source
Efficient Call Path Detection for Android-OS Size of Huge Source Code
Today most developers utilize source code written by other parties. Because the code is modified frequently, the developers need to grasp the impact of the modification repeatedly.
Matsutsuka, Taka, Yamamoto, Koji
core +1 more source
Circulating tumor DNA (ctDNA) offers a possibility for different applications in early and late stage breast cancer management. In early breast cancer tumor informed approaches are increasingly used for detecting molecular residual disease (MRD) and early recurrence. In advanced stage, ctDNA provides a possibility for monitoring disease progression and
Eva Valentina Klocker+14 more
wiley +1 more source
A randomized covering-packing duality between source-coding and channel-coding [PDF]
A randomized covering-packing duality between source and channel coding will be discussed by considering the source coding problem of coding a source with a certain distortion level and by considering a channel which communicates the source within a certain distortion level.
arxiv
Circulating tumor cells: advancing personalized therapy in small cell lung cancer patients
Small cell lung cancer (SCLC) is an aggressive form of lung cancer that spreads rapidly to secondary sites such as the brain and liver. Cancer cells circulating in the blood, “circulating tumor cells” (CTCs), have demonstrated prognostic value in SCLC, and evaluating biomarkers on CTCs could guide treatment decisions such as for PARP inhibitors ...
Prajwol Shrestha+6 more
wiley +1 more source
Abstract Background Ultrasonography (US) and 99mTechnetium‐sestamibi scintigraphy (99mTc‐MIBI) are currently first‐line imaging modalities to localize parathyroid adenomas with sensitivities of 80% and 84%, respectively. Therefore, finding other modalities to further improve the diagnostic accuracy for preoperative localization is critically needed ...
Fangyi Liu+7 more
wiley +1 more source
In higher education, especially in programming-intensive fields like computer science, safeguarding students’ source code is crucial to prevent theft that could impact learning and future careers.
Leonardo Juan Ramirez Lopez+1 more
doaj +1 more source
The main goal of obfuscation is to make software difficult to analyze. Although obfuscation is one useful method to protect programs, the ability to analyze malware is greatly reduced if used for malicious purposes.
Jae Hyuk Suk+2 more
doaj +1 more source
Hybrid Coding: An Interface for Joint Source-Channel Coding and Network Communication [PDF]
A new approach to joint source-channel coding is presented in the context of communicating correlated sources over multiple access channels. Similar to the separation architecture, the joint source-channel coding system architecture in this approach is modular, whereby the source encoding and channel decoding operations are decoupled.
arxiv
Consider the Source: The Value of Source Code to Digital Preservation Strategies [PDF]
One of the major challenges in the digital preservation field is the difficulty of ensuring long-term access to digital objects, especially in cases when the software that was used to create an object is no longer current.
Castagné, Michel
core +1 more source