CINXE.COM

Search results for: spread reshaping code

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: spread reshaping code</title> <meta name="description" content="Search results for: spread reshaping code"> <meta name="keywords" content="spread reshaping code"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="spread reshaping code" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="spread reshaping code"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 2635</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: spread reshaping code</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2635</span> An Energy Efficient Spectrum Shaping Scheme for Substrate Integrated Waveguides Based on Spread Reshaping Code</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yu%20Zhao">Yu Zhao</a>, <a href="https://publications.waset.org/abstracts/search?q=Rainer%20Gruenheid"> Rainer Gruenheid</a>, <a href="https://publications.waset.org/abstracts/search?q=Gerhard%20Bauch"> Gerhard Bauch</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the microwave and millimeter-wave transmission region, substrate-integrated waveguide (SIW) is a very promising candidate for the development of circuits and components. It facilitates the transmission at the data rates in excess of 200 Gbit/s. An SIW mimics a rectangular waveguide by approximating the closed sidewalls with a via fence. This structure suppresses the low frequency components and makes the channel of the SIW a bandpass or high pass filter. This channel characteristic impedes the conventional baseband transmission using non-return-to-zero (NRZ) pulse shaping scheme. Therefore, mixers are commonly proposed to be used as carrier modulator and demodulator in order to facilitate a passband transmission. However, carrier modulation is not an energy efficient solution, because modulation and demodulation at high frequencies consume a lot of energy. For the first time to our knowledge, this paper proposes a spectrum shaping scheme of low complexity for the channel of SIW, namely spread reshaping code. It aims at matching the spectrum of the transmit signal to the channel frequency response. It facilitates the transmission through the SIW channel while it avoids using carrier modulation. In some cases, it even does not need equalization. Simulations reveal a good performance of this scheme, such that, as a result, eye opening is achieved without any equalization or modulation for the respective transmission channels. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bandpass%20channel" title="bandpass channel">bandpass channel</a>, <a href="https://publications.waset.org/abstracts/search?q=eye-opening" title=" eye-opening"> eye-opening</a>, <a href="https://publications.waset.org/abstracts/search?q=switching%20frequency" title=" switching frequency"> switching frequency</a>, <a href="https://publications.waset.org/abstracts/search?q=substrate-integrated%20waveguide" title=" substrate-integrated waveguide"> substrate-integrated waveguide</a>, <a href="https://publications.waset.org/abstracts/search?q=spectrum%20shaping%20scheme" title=" spectrum shaping scheme"> spectrum shaping scheme</a>, <a href="https://publications.waset.org/abstracts/search?q=spread%20reshaping%20code" title=" spread reshaping code"> spread reshaping code</a> </p> <a href="https://publications.waset.org/abstracts/97740/an-energy-efficient-spectrum-shaping-scheme-for-substrate-integrated-waveguides-based-on-spread-reshaping-code" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/97740.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">160</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2634</span> Code-Switching and Code Mixing among Ogba-English Bilingual Conversations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ben-Fred%20Ohia">Ben-Fred Ohia</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Code-switching and code-mixing are linguistic behaviours that arise in a bilingual situation. They limit speakers in a conversation to decide which code they should use to utter particular phrases or words in the course of carrying out their utterance. Every human society is characterized by the existence of diverse linguistic varieties. The speakers of these varieties at some points have various degrees of contact with the non-speakers of their variety, which one of the outcomes of the linguistic contact is code-switching or code-mixing. The work discusses the nature of code-switching and code-mixing in Ogba-English bilinguals’ speeches. It provides a detailed explanation of the concept of code-switching and code-mixing and explains the typology of code-switching and code-mixing and their manifestation in Ogba-English bilingual speakers’ speeches. The findings reveal that code-switching and code-mixing are functionally motivated and being triggered by various conversational contexts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bilinguals" title="bilinguals">bilinguals</a>, <a href="https://publications.waset.org/abstracts/search?q=code-mixing" title=" code-mixing"> code-mixing</a>, <a href="https://publications.waset.org/abstracts/search?q=code-switching" title=" code-switching"> code-switching</a>, <a href="https://publications.waset.org/abstracts/search?q=Ogba" title=" Ogba"> Ogba</a> </p> <a href="https://publications.waset.org/abstracts/122982/code-switching-and-code-mixing-among-ogba-english-bilingual-conversations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/122982.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">181</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2633</span> The Design of Multiple Detection Parallel Combined Spread Spectrum Communication System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lixin%20Tian">Lixin Tian</a>, <a href="https://publications.waset.org/abstracts/search?q=Wei%20Xue"> Wei Xue</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Many jobs in society go underground, such as mine mining, tunnel construction and subways, which are vital to the development of society. Once accidents occur in these places, the interruption of traditional wired communication is not conducive to the development of rescue work. In order to realize the positioning, early warning and command functions of underground personnel and improve rescue efficiency, it is necessary to develop and design an emergency ground communication system. It is easy to be subjected to narrowband interference when performing conventional underground communication. Spreading communication can be used for this problem. However, general spread spectrum methods such as direct spread communication are inefficient, so it is proposed to use parallel combined spread spectrum (PCSS) communication to improve efficiency. The PCSS communication not only has the anti-interference ability and the good concealment of the traditional spread spectrum system, but also has a relatively high frequency band utilization rate and a strong information transmission capability. So, this technology has been widely used in practice. This paper presents a PCSS communication model-multiple detection parallel combined spread spectrum (MDPCSS) communication system. In this paper, the principle of MDPCSS communication system is described, that is, the sequence at the transmitting end is processed in blocks and cyclically shifted to facilitate multiple detection at the receiving end. The block diagrams of the transmitter and receiver of the MDPCSS communication system are introduced. At the same time, the calculation formula of the system bit error rate (BER) is introduced, and the simulation and analysis of the BER of the system are completed. By comparing with the common parallel PCSS communication, we can draw a conclusion that it is indeed possible to reduce the BER and improve the system performance. Furthermore, the influence of different pseudo-code lengths selected on the system BER is simulated and analyzed, and the conclusion is that the larger the pseudo-code length is, the smaller the system error rate is. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyclic%20shift" title="cyclic shift">cyclic shift</a>, <a href="https://publications.waset.org/abstracts/search?q=multiple%20detection" title=" multiple detection"> multiple detection</a>, <a href="https://publications.waset.org/abstracts/search?q=parallel%20combined%20spread%20spectrum" title=" parallel combined spread spectrum"> parallel combined spread spectrum</a>, <a href="https://publications.waset.org/abstracts/search?q=PN%20code" title=" PN code"> PN code</a> </p> <a href="https://publications.waset.org/abstracts/104396/the-design-of-multiple-detection-parallel-combined-spread-spectrum-communication-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/104396.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">137</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2632</span> A Rapid Code Acquisition Scheme in OOC-Based CDMA Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Keunhong%20Chae">Keunhong Chae</a>, <a href="https://publications.waset.org/abstracts/search?q=Seokho%20Yoon"> Seokho Yoon</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We propose a code acquisition scheme called improved multiple-shift (IMS) for optical code division multiple access systems, where the optical orthogonal code is used instead of the pseudo noise code. Although the IMS algorithm has a similar process to that of the conventional MS algorithm, it has a better code acquisition performance than the conventional MS algorithm. We analyze the code acquisition performance of the IMS algorithm and compare the code acquisition performances of the MS and the IMS algorithms in single-user and multi-user environments. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=code%20acquisition" title="code acquisition">code acquisition</a>, <a href="https://publications.waset.org/abstracts/search?q=optical%20CDMA" title=" optical CDMA"> optical CDMA</a>, <a href="https://publications.waset.org/abstracts/search?q=optical%20orthogonal%20code" title=" optical orthogonal code"> optical orthogonal code</a>, <a href="https://publications.waset.org/abstracts/search?q=serial%20algorithm" title=" serial algorithm"> serial algorithm</a> </p> <a href="https://publications.waset.org/abstracts/23348/a-rapid-code-acquisition-scheme-in-ooc-based-cdma-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23348.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">540</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2631</span> Neural Reshaping: The Plasticity of Human Brain and Artificial Intelligence in the Learning Process</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Seyed-Ali%20Sadegh-Zadeh">Seyed-Ali Sadegh-Zadeh</a>, <a href="https://publications.waset.org/abstracts/search?q=Mahboobe%20Bahrami"> Mahboobe Bahrami</a>, <a href="https://publications.waset.org/abstracts/search?q=Sahar%20Ahmadi"> Sahar Ahmadi</a>, <a href="https://publications.waset.org/abstracts/search?q=Seyed-Yaser%20Mousavi"> Seyed-Yaser Mousavi</a>, <a href="https://publications.waset.org/abstracts/search?q=Hamed%20Atashbar"> Hamed Atashbar</a>, <a href="https://publications.waset.org/abstracts/search?q=Amir%20M.%20Hajiyavand"> Amir M. Hajiyavand</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents an investigation into the concept of neural reshaping, which is crucial for achieving strong artificial intelligence through the development of AI algorithms with very high plasticity. By examining the plasticity of both human and artificial neural networks, the study uncovers groundbreaking insights into how these systems adapt to new experiences and situations, ultimately highlighting the potential for creating advanced AI systems that closely mimic human intelligence. The uniqueness of this paper lies in its comprehensive analysis of the neural reshaping process in both human and artificial intelligence systems. This comparative approach enables a deeper understanding of the fundamental principles of neural plasticity, thus shedding light on the limitations and untapped potential of both human and AI learning capabilities. By emphasizing the importance of neural reshaping in the quest for strong AI, the study underscores the need for developing AI algorithms with exceptional adaptability and plasticity. The paper's findings have significant implications for the future of AI research and development. By identifying the core principles of neural reshaping, this research can guide the design of next-generation AI technologies that can enhance human and artificial intelligence alike. These advancements will be instrumental in creating a new era of AI systems with unparalleled capabilities, paving the way for improved decision-making, problem-solving, and overall cognitive performance. In conclusion, this paper makes a substantial contribution by investigating the concept of neural reshaping and its importance for achieving strong AI. Through its in-depth exploration of neural plasticity in both human and artificial neural networks, the study unveils vital insights that can inform the development of innovative AI technologies with high adaptability and potential for enhancing human and AI capabilities alike. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=neural%20plasticity" title="neural plasticity">neural plasticity</a>, <a href="https://publications.waset.org/abstracts/search?q=brain%20adaptation" title=" brain adaptation"> brain adaptation</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title=" artificial intelligence"> artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=learning" title=" learning"> learning</a>, <a href="https://publications.waset.org/abstracts/search?q=cognitive%20reshaping" title=" cognitive reshaping"> cognitive reshaping</a> </p> <a href="https://publications.waset.org/abstracts/184565/neural-reshaping-the-plasticity-of-human-brain-and-artificial-intelligence-in-the-learning-process" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/184565.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">52</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2630</span> Medical Image Watermark and Tamper Detection Using Constant Correlation Spread Spectrum Watermarking</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Peter%20U.%20Eze">Peter U. Eze</a>, <a href="https://publications.waset.org/abstracts/search?q=P.%20Udaya"> P. Udaya</a>, <a href="https://publications.waset.org/abstracts/search?q=Robin%20J.%20Evans"> Robin J. Evans</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Data hiding can be achieved by Steganography or invisible digital watermarking. For digital watermarking, both accurate retrieval of the embedded watermark and the integrity of the cover image are important. Medical image security in Teleradiology is one of the applications where the embedded patient record needs to be extracted with accuracy as well as the medical image integrity verified. In this research paper, the Constant Correlation Spread Spectrum digital watermarking for medical image tamper detection and accurate embedded watermark retrieval is introduced. In the proposed method, a watermark bit from a patient record is spread in a medical image sub-block such that the correlation of all watermarked sub-blocks with a spreading code, W, would have a constant value, <em>p.</em> The constant correlation <em>p</em>, spreading code, W and the size of the sub-blocks constitute the secret key. Tamper detection is achieved by flagging any sub-block whose correlation value deviates by more than a small value, ℇ, from <em>p</em>. The major features of our new scheme include: (1) Improving watermark detection accuracy for high-pixel depth medical images by reducing the Bit Error Rate (BER) to Zero and (2) block-level tamper detection in a single computational process with simultaneous watermark detection, thereby increasing utility with the same computational cost. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Constant%20Correlation" title="Constant Correlation">Constant Correlation</a>, <a href="https://publications.waset.org/abstracts/search?q=Medical%20Image" title=" Medical Image"> Medical Image</a>, <a href="https://publications.waset.org/abstracts/search?q=Spread%20Spectrum" title=" Spread Spectrum"> Spread Spectrum</a>, <a href="https://publications.waset.org/abstracts/search?q=Tamper%20Detection" title=" Tamper Detection"> Tamper Detection</a>, <a href="https://publications.waset.org/abstracts/search?q=Watermarking" title=" Watermarking"> Watermarking</a> </p> <a href="https://publications.waset.org/abstracts/84629/medical-image-watermark-and-tamper-detection-using-constant-correlation-spread-spectrum-watermarking" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/84629.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">194</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2629</span> Characterization of Onboard Reliable Error Correction Code FORSDRAM Controller</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=N.%20Pitcheswara%20Rao">N. Pitcheswara Rao</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the process of conveying the information there may be a chance of signal being corrupted which leads to the erroneous bits in the message. The message may consist of single, double and multiple bit errors. In high-reliability applications, memory can sustain multiple soft errors due to single or multiple event upsets caused by environmental factors. The traditional hamming code with SEC-DED capability cannot be address these types of errors. It is possible to use powerful non-binary BCH code such as Reed-Solomon code to address multiple errors. However, it could take at least a couple dozen cycles of latency to complete first correction and run at a relatively slow speed. In order to overcome this drawback i.e., to increase speed and latency we are using reed-Muller code. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=SEC-DED" title="SEC-DED">SEC-DED</a>, <a href="https://publications.waset.org/abstracts/search?q=BCH%20code" title=" BCH code"> BCH code</a>, <a href="https://publications.waset.org/abstracts/search?q=Reed-Solomon%20code" title=" Reed-Solomon code"> Reed-Solomon code</a>, <a href="https://publications.waset.org/abstracts/search?q=Reed-Muller%20code" title=" Reed-Muller code"> Reed-Muller code</a> </p> <a href="https://publications.waset.org/abstracts/33706/characterization-of-onboard-reliable-error-correction-code-forsdram-controller" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/33706.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">428</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2628</span> Characterization of Onboard Reliable Error Correction Code for SDRAM Controller</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pitcheswara%20Rao%20Nelapati">Pitcheswara Rao Nelapati</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the process of conveying the information there may be a chance of signal being corrupted which leads to the erroneous bits in the message. The message may consist of single, double and multiple bit errors. In high-reliability applications, memory can sustain multiple soft errors due to single or multiple event upsets caused by environmental factors. The traditional hamming code with SEC-DED capability cannot be address these types of errors. It is possible to use powerful non-binary BCH code such as Reed-Solomon code to address multiple errors. However, it could take at least a couple dozen cycles of latency to complete first correction and run at a relatively slow speed. In order to overcome this drawback i.e., to increase speed and latency we are using reed-Muller code. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=SEC-DED" title="SEC-DED">SEC-DED</a>, <a href="https://publications.waset.org/abstracts/search?q=BCH%20code" title=" BCH code"> BCH code</a>, <a href="https://publications.waset.org/abstracts/search?q=Reed-Solomon%20code" title=" Reed-Solomon code"> Reed-Solomon code</a>, <a href="https://publications.waset.org/abstracts/search?q=Reed-Muller%20code" title=" Reed-Muller code"> Reed-Muller code</a> </p> <a href="https://publications.waset.org/abstracts/32965/characterization-of-onboard-reliable-error-correction-code-for-sdram-controller" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/32965.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">429</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2627</span> A Resistant-Based Comparative Study between Iranian Concrete Design Code and Some Worldwide Ones </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Seyed%20Sadegh%20Naseralavi">Seyed Sadegh Naseralavi</a>, <a href="https://publications.waset.org/abstracts/search?q=Najmeh%20Bemani"> Najmeh Bemani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The design in most counties should be inevitably carried out by their native code such as Iran. Since the Iranian concrete code does not exist in structural design software, most engineers in this country analyze the structures using commercial software but design the structural members manually. This point motivated us to make a communication between Iranian code and some other well-known ones to create facility for the engineers. Finally, this paper proposes the so-called interpretation charts which help specify the position of Iranian code in comparison of some worldwide ones. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=beam" title="beam">beam</a>, <a href="https://publications.waset.org/abstracts/search?q=concrete%20code" title=" concrete code"> concrete code</a>, <a href="https://publications.waset.org/abstracts/search?q=strength" title=" strength"> strength</a>, <a href="https://publications.waset.org/abstracts/search?q=interpretation%20charts" title=" interpretation charts "> interpretation charts </a> </p> <a href="https://publications.waset.org/abstracts/29241/a-resistant-based-comparative-study-between-iranian-concrete-design-code-and-some-worldwide-ones" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29241.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">526</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2626</span> Code-Switching in Facebook Chatting Among Maldivian Teenagers</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aaidha%20Hammad">Aaidha Hammad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study examines the phenomenon of code switching among teenagers in the Maldives while they carry out conversations through Facebook in the form of &ldquo;Facebook Chatting&rdquo;. The current study aims at evaluating the frequency of code-switching and it investigates between what languages code-switching occurs. Besides the study identifies the types of words that are often codeswitched and the triggers for code switching. The methodology used in this study is mixed method of qualitative and quantitative approach. In this regard, the chat log of a group conversation between 10 teenagers was collected and analyzed. A questionnaire was also administered through online to 24 different teenagers from different corners of the Maldives. The age of teenagers ranged between 16 and 19 years. The findings of the current study revealed that while Maldivian teenagers chat in Facebook they very often code switch and these switches are most commonly between Dhivehi and English, but some other languages are also used to some extent. It also identified the different types of words that are being often code switched among the teenagers. Most importantly it explored different reasons behind code switching among the Maldivian teenagers in Facebook chatting. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=code-switching" title="code-switching">code-switching</a>, <a href="https://publications.waset.org/abstracts/search?q=Facebook" title=" Facebook"> Facebook</a>, <a href="https://publications.waset.org/abstracts/search?q=Facebook%20chatting%20Maldivian%20teenagers" title=" Facebook chatting Maldivian teenagers"> Facebook chatting Maldivian teenagers</a> </p> <a href="https://publications.waset.org/abstracts/71159/code-switching-in-facebook-chatting-among-maldivian-teenagers" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71159.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">245</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2625</span> The Term Spread Impact on Economic Activity for Transition Economies: Case of Georgia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=L.%20Totladze">L. Totladze</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The role of financial sector in supporting economic growth and development is well acknowledged. The term spread (the difference between the yields on long-term and short-term Treasury securities) has been found useful for predicting economic variables as output growth, inflation, industrial production, consumption. The temp spread is one of the leading economic indicators according to NBER methodology. Leading economic indicators are widely used in forecasting of economic activity. Many empirical studies find that the term spread predicts future economic activity. The article shortly explains how the term spread might predict future economic activity. This paper analyses the dynamics of the spread between short and long-term interest rates in countries with transition economies. The research paper analyses term spread dynamics in Georgia and compare it with post-communist countries and transition economies spread dynamics. In Georgia, the banking sector plays an important and dominant role in the financial sector, especially with respect to the mobilization of savings and provision of credit and may impact on economic activity. For this purpose, we study the impact of the term spread on economic growth in Georgia. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=forecasting" title="forecasting">forecasting</a>, <a href="https://publications.waset.org/abstracts/search?q=leading%20economic%20indicators" title=" leading economic indicators"> leading economic indicators</a>, <a href="https://publications.waset.org/abstracts/search?q=term%20spread" title=" term spread"> term spread</a>, <a href="https://publications.waset.org/abstracts/search?q=transition%20economies" title=" transition economies"> transition economies</a> </p> <a href="https://publications.waset.org/abstracts/86382/the-term-spread-impact-on-economic-activity-for-transition-economies-case-of-georgia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/86382.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">176</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2624</span> Testing and Validation Stochastic Models in Epidemiology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Snigdha%20Sahai">Snigdha Sahai</a>, <a href="https://publications.waset.org/abstracts/search?q=Devaki%20Chikkavenkatappa%20Yellappa"> Devaki Chikkavenkatappa Yellappa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study outlines approaches for testing and validating stochastic models used in epidemiology, focusing on the integration and functional testing of simulation code. It details methods for combining simple functions into comprehensive simulations, distinguishing between deterministic and stochastic components, and applying tests to ensure robustness. Techniques include isolating stochastic elements, utilizing large sample sizes for validation, and handling special cases. Practical examples are provided using R code to demonstrate integration testing, handling of incorrect inputs, and special cases. The study emphasizes the importance of both functional and defensive programming to enhance code reliability and user-friendliness. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computational%20epidemiology" title="computational epidemiology">computational epidemiology</a>, <a href="https://publications.waset.org/abstracts/search?q=epidemiology" title=" epidemiology"> epidemiology</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20health" title=" public health"> public health</a>, <a href="https://publications.waset.org/abstracts/search?q=infectious%20disease%20modeling" title=" infectious disease modeling"> infectious disease modeling</a>, <a href="https://publications.waset.org/abstracts/search?q=statistical%20analysis" title=" statistical analysis"> statistical analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=health%20data%20analysis" title=" health data analysis"> health data analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=disease%20transmission%20dynamics" title=" disease transmission dynamics"> disease transmission dynamics</a>, <a href="https://publications.waset.org/abstracts/search?q=predictive%20modeling%20in%20health" title=" predictive modeling in health"> predictive modeling in health</a>, <a href="https://publications.waset.org/abstracts/search?q=population%20health%20modeling" title=" population health modeling"> population health modeling</a>, <a href="https://publications.waset.org/abstracts/search?q=quantitative%20public%20health" title=" quantitative public health"> quantitative public health</a>, <a href="https://publications.waset.org/abstracts/search?q=random%20sampling%20simulations" title=" random sampling simulations"> random sampling simulations</a>, <a href="https://publications.waset.org/abstracts/search?q=randomized%20numerical%20analysis" title=" randomized numerical analysis"> randomized numerical analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=simulation-based%20analysis" title=" simulation-based analysis"> simulation-based analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=variance-based%20simulations" title=" variance-based simulations"> variance-based simulations</a>, <a href="https://publications.waset.org/abstracts/search?q=algorithmic%20disease%20simulation" title=" algorithmic disease simulation"> algorithmic disease simulation</a>, <a href="https://publications.waset.org/abstracts/search?q=computational%20public%20health%20strategies" title=" computational public health strategies"> computational public health strategies</a>, <a href="https://publications.waset.org/abstracts/search?q=epidemiological%20surveillance" title=" epidemiological surveillance"> epidemiological surveillance</a>, <a href="https://publications.waset.org/abstracts/search?q=disease%20pattern%20analysis" title=" disease pattern analysis"> disease pattern analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=epidemic%20risk%20assessment" title=" epidemic risk assessment"> epidemic risk assessment</a>, <a href="https://publications.waset.org/abstracts/search?q=population-based%20health%20strategies" title=" population-based health strategies"> population-based health strategies</a>, <a href="https://publications.waset.org/abstracts/search?q=preventive%20healthcare%20models" title=" preventive healthcare models"> preventive healthcare models</a>, <a href="https://publications.waset.org/abstracts/search?q=infection%20dynamics%20in%20populations" title=" infection dynamics in populations"> infection dynamics in populations</a>, <a href="https://publications.waset.org/abstracts/search?q=contagion%20spread%20prediction%20models" title=" contagion spread prediction models"> contagion spread prediction models</a>, <a href="https://publications.waset.org/abstracts/search?q=survival%20analysis%20techniques" title=" survival analysis techniques"> survival analysis techniques</a>, <a href="https://publications.waset.org/abstracts/search?q=epidemiological%20data%20mining" title=" epidemiological data mining"> epidemiological data mining</a>, <a href="https://publications.waset.org/abstracts/search?q=host-pathogen%20interaction%20models" title=" host-pathogen interaction models"> host-pathogen interaction models</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20assessment%20algorithms%20for%20disease%20spread" title=" risk assessment algorithms for disease spread"> risk assessment algorithms for disease spread</a>, <a href="https://publications.waset.org/abstracts/search?q=decision-support%20systems%20in%20epidemiology" title=" decision-support systems in epidemiology"> decision-support systems in epidemiology</a>, <a href="https://publications.waset.org/abstracts/search?q=macro-level%20health%20impact%20simulations" title=" macro-level health impact simulations"> macro-level health impact simulations</a>, <a href="https://publications.waset.org/abstracts/search?q=socioeconomic%20determinants%20in%20disease%20spread" title=" socioeconomic determinants in disease spread"> socioeconomic determinants in disease spread</a>, <a href="https://publications.waset.org/abstracts/search?q=data-driven%20decision%20making%20in%20public%20health" title=" data-driven decision making in public health"> data-driven decision making in public health</a>, <a href="https://publications.waset.org/abstracts/search?q=quantitative%20impact%20assessment%20of%20health%20policies" title=" quantitative impact assessment of health policies"> quantitative impact assessment of health policies</a>, <a href="https://publications.waset.org/abstracts/search?q=biostatistical%20methods%20in%20population%20health" title=" biostatistical methods in population health"> biostatistical methods in population health</a>, <a href="https://publications.waset.org/abstracts/search?q=probability-driven%20health%20outcome%20predictions" title=" probability-driven health outcome predictions"> probability-driven health outcome predictions</a> </p> <a href="https://publications.waset.org/abstracts/194780/testing-and-validation-stochastic-models-in-epidemiology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/194780.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">6</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2623</span> Development of Fem Code for 2-D Elasticity Problems Using Quadrilateral and Triangular Elements </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Umar%20Kiani">Muhammad Umar Kiani</a>, <a href="https://publications.waset.org/abstracts/search?q=Waseem%20Sakawat"> Waseem Sakawat</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study presents the development of FEM code using Quadrilateral 4-Node (Q4) and Triangular 3-Node (T3) elements. Code is formulated using MATLAB language. Instead of using both elements in the same code, two separate codes are written. Quadrilateral element is difficult to handle directly, that is why natural coordinates (eta, ksi) are used. Due to this, Q4 code includes numerical integration (Gauss quadrature). In this case, complete numerical integration is performed using 2 points. On the other hand, T3 element can be modeled directly, by using direct stiffness approach. Axially loaded element, cantilever (special constraints) and Patch test cases were analyzed using both codes and the results were verified by using Ansys. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=FEM%20code" title="FEM code">FEM code</a>, <a href="https://publications.waset.org/abstracts/search?q=MATLAB" title=" MATLAB"> MATLAB</a>, <a href="https://publications.waset.org/abstracts/search?q=numerical%20integration" title=" numerical integration"> numerical integration</a>, <a href="https://publications.waset.org/abstracts/search?q=ANSYS" title=" ANSYS"> ANSYS</a> </p> <a href="https://publications.waset.org/abstracts/2344/development-of-fem-code-for-2-d-elasticity-problems-using-quadrilateral-and-triangular-elements" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2344.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">419</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2622</span> Code Switching: A Case Study Of Lebanon</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wassim%20Bekai">Wassim Bekai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Code switching, as its name states, is altering between two or more languages in one sentence. The speaker tends to use code switching in his/her speech for better clarification of his/her message to the receiver. It is commonly used in sociocultural countries such as Lebanon because of the various cultures that have come across its lands through history, considering Lebanon is geographically located in the heart of the world, and hence between many cultures and languages. In addition, Lebanon was occupied by Turkish authorities for about 400 years, and later on by the French mandate, where both of these countries forced their languages in official papers and in the Lebanese educational system. In this paper, the importance of code switching in the Lebanese workplace will be examined, stressing the efficiency and amount of the production resulting from code switching in the workplace (factories, universities among other places) in addition to exploring the social, education, religious and cultural factors behind this phenomenon in Lebanon. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=code%20switching" title="code switching">code switching</a>, <a href="https://publications.waset.org/abstracts/search?q=Lebanon" title=" Lebanon"> Lebanon</a>, <a href="https://publications.waset.org/abstracts/search?q=cultural" title=" cultural"> cultural</a>, <a href="https://publications.waset.org/abstracts/search?q=factors" title=" factors"> factors</a> </p> <a href="https://publications.waset.org/abstracts/143945/code-switching-a-case-study-of-lebanon" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143945.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">287</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2621</span> Features of Testing of the Neuronetwork Converter Biometrics-Code with Correlation Communications between Bits of the Output Code</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=B.%20S.%20Akhmetov">B. S. Akhmetov</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20I.%20Ivanov"> A. I. Ivanov</a>, <a href="https://publications.waset.org/abstracts/search?q=T.%20S.%20Kartbayev"> T. S. Kartbayev</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Y.%20Malygin"> A. Y. Malygin</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20Mukapil"> K. Mukapil</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20D.%20Tolybayev"> S. D. Tolybayev</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The article examines the testing of the neural network converter of biometrics code. Determined the main reasons that prevented the use adopted in the works of foreign researchers classical a Binomial Law when describing distribution of measures of Hamming "Alien" codes-responses. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=biometrics" title="biometrics">biometrics</a>, <a href="https://publications.waset.org/abstracts/search?q=testing" title=" testing"> testing</a>, <a href="https://publications.waset.org/abstracts/search?q=neural%20network" title=" neural network"> neural network</a>, <a href="https://publications.waset.org/abstracts/search?q=converter%20of%20biometrics-code" title=" converter of biometrics-code"> converter of biometrics-code</a>, <a href="https://publications.waset.org/abstracts/search?q=Hamming%27s%20measure" title=" Hamming&#039;s measure"> Hamming&#039;s measure</a> </p> <a href="https://publications.waset.org/abstracts/20893/features-of-testing-of-the-neuronetwork-converter-biometrics-code-with-correlation-communications-between-bits-of-the-output-code" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20893.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">1138</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2620</span> Optical Multicast over OBS Networks: An Approach Based on Code-Words and Tunable Decoders</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maha%20Sliti">Maha Sliti</a>, <a href="https://publications.waset.org/abstracts/search?q=Walid%20Abdallah"> Walid Abdallah</a>, <a href="https://publications.waset.org/abstracts/search?q=Noureddine%20Boudriga"> Noureddine Boudriga</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the frame of this work, we present an optical multicasting approach based on optical code-words. Our approach associates, in the edge node, an optical code-word to a group multicast address. In the core node, a set of tunable decoders are used to send a traffic data to multiple destinations based on the received code-word. The use of code-words, which correspond to the combination of an input port and a set of output ports, allows the implementation of an optical switching matrix. At the reception of a burst, it will be delayed in an optical memory. And, the received optical code-word is split to a set of tunable optical decoders. When it matches a configured code-word, the delayed burst is switched to a set of output ports. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=optical%20multicast" title="optical multicast">optical multicast</a>, <a href="https://publications.waset.org/abstracts/search?q=optical%20burst%20switching%20networks" title=" optical burst switching networks"> optical burst switching networks</a>, <a href="https://publications.waset.org/abstracts/search?q=optical%20code-words" title=" optical code-words"> optical code-words</a>, <a href="https://publications.waset.org/abstracts/search?q=tunable%20decoder" title=" tunable decoder"> tunable decoder</a>, <a href="https://publications.waset.org/abstracts/search?q=virtual%20optical%20memory" title=" virtual optical memory"> virtual optical memory</a> </p> <a href="https://publications.waset.org/abstracts/11614/optical-multicast-over-obs-networks-an-approach-based-on-code-words-and-tunable-decoders" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/11614.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">607</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2619</span> Detecting Heartbeat Architectural Tactic in Source Code Using Program Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ananta%20Kumar%20%20Das">Ananta Kumar Das</a>, <a href="https://publications.waset.org/abstracts/search?q=Sujit%20Kumar%20Chakrabarti"> Sujit Kumar Chakrabarti</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Architectural tactics such as heartbeat, ping-echo, encapsulate, encrypt data are techniques that are used to achieve quality attributes of a system. Detecting architectural tactics has several benefits: it can aid system comprehension (e.g., legacy systems) and in the estimation of quality attributes such as safety, security, maintainability, etc. Architectural tactics are typically spread over the source code and are implicit. For large codebases, manual detection is often not feasible. Therefore, there is a need for automated methods of detection of architectural tactics. This paper presents a formalization of the heartbeat architectural tactic and a program analytic approach to detect this tactic in source code. The experiment of the proposed method is done on a set of Java applications. The outcome of the experiment strongly suggests that the method compares well with a manual approach in terms of its sensitivity and specificity, and far supersedes a manual exercise in terms of its scalability. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=software%20architecture" title="software architecture">software architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=architectural%20tactics" title=" architectural tactics"> architectural tactics</a>, <a href="https://publications.waset.org/abstracts/search?q=detecting%20architectural%20tactics" title=" detecting architectural tactics"> detecting architectural tactics</a>, <a href="https://publications.waset.org/abstracts/search?q=program%20analysis" title=" program analysis"> program analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=AST" title=" AST"> AST</a>, <a href="https://publications.waset.org/abstracts/search?q=alias%20analysis" title=" alias analysis"> alias analysis</a> </p> <a href="https://publications.waset.org/abstracts/117825/detecting-heartbeat-architectural-tactic-in-source-code-using-program-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/117825.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">160</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2618</span> Quick Response(QR) Code for Vehicle Registration and Identification</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=S.%20Malarvizhi">S. Malarvizhi</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Sadiq%20Basha"> S. Sadiq Basha</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Santhosh%20Kumar"> M. Santhosh Kumar</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20Saravanan"> K. Saravanan</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Sasikumar"> R. Sasikumar</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Satheesh"> R. Satheesh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This is a web based application which provides authorization for the vehicle identification and registration. It also provides mutual authentication between the police and users in order to avoid misusage. The QR code generation in this application overcomes the difficulty in the manual registration of the vehicle documents. This generated QR code is placed in the number plates of the vehicles. The QR code is scanned using the QR Reader installed in the smart devices. The police officials can check the vehicle details and file cases on accidents, theft and traffic rules violations using QR code. In addition to vehicle insurance payments and renewals, the renewal alert is sent to the vehicle owner about payment deadline. The non-permitted vehicles can be blocked in the next check-post by sending the alert messages. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=QR%20code" title="QR code">QR code</a>, <a href="https://publications.waset.org/abstracts/search?q=QR%20reader" title=" QR reader"> QR reader</a>, <a href="https://publications.waset.org/abstracts/search?q=registration" title=" registration"> registration</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication" title=" authentication"> authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=idenfication" title=" idenfication"> idenfication</a> </p> <a href="https://publications.waset.org/abstracts/1704/quick-responseqr-code-for-vehicle-registration-and-identification" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/1704.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">494</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2617</span> Analyzing the Impact of Code Commenting on Software Quality</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Thulya%20Premathilake">Thulya Premathilake</a>, <a href="https://publications.waset.org/abstracts/search?q=Tharushi%20Perera"> Tharushi Perera</a>, <a href="https://publications.waset.org/abstracts/search?q=Hansi%20Thathsarani"> Hansi Thathsarani</a>, <a href="https://publications.waset.org/abstracts/search?q=Tharushi%20Nethmini"> Tharushi Nethmini</a>, <a href="https://publications.waset.org/abstracts/search?q=Dilshan%20De%20Silva"> Dilshan De Silva</a>, <a href="https://publications.waset.org/abstracts/search?q=Piyumika%20Samarasekara"> Piyumika Samarasekara</a> </p> <p class="card-text"><strong>Abstract:</strong></p> One of the most efficient ways to assist developers in grasping the source code is to make use of comments, which can be found throughout the code. When working in fields such as software development, having comments in your code that are of good quality is a fundamental requirement. Tackling software problems while making use of programs that have already been built. It is essential for the intention of the source code to be made crystal apparent in the comments that are added to the code. This assists programmers in better comprehending the programs they are working on and enables them to complete software maintenance jobs in a more timely manner. In spite of the fact that comments and documentation are meant to improve readability and maintainability, the vast majority of programmers place the majority of their focus on the actual code that is being written. This study provides a complete and comprehensive overview of the previous research that has been conducted on the topic of code comments. The study focuses on four main topics, including automated comment production, comment consistency, comment classification, and comment quality rating. One is able to get the knowledge that is more complete for use in following inquiries if they conduct an analysis of the proper approaches that were used in this study issue. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=code%20commenting" title="code commenting">code commenting</a>, <a href="https://publications.waset.org/abstracts/search?q=source%20code" title=" source code"> source code</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20quality" title=" software quality"> software quality</a>, <a href="https://publications.waset.org/abstracts/search?q=quality%20assurance" title=" quality assurance"> quality assurance</a> </p> <a href="https://publications.waset.org/abstracts/166697/analyzing-the-impact-of-code-commenting-on-software-quality" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/166697.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">85</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2616</span> Lowering Error Floors by Concatenation of Low-Density Parity-Check and Array Code</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cinna%20Soltanpur">Cinna Soltanpur</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Ghamari"> Mohammad Ghamari</a>, <a href="https://publications.waset.org/abstracts/search?q=Behzad%20Momahed%20Heravi"> Behzad Momahed Heravi</a>, <a href="https://publications.waset.org/abstracts/search?q=Fatemeh%20Zare"> Fatemeh Zare</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Low-density parity-check (LDPC) codes have been shown to deliver capacity approaching performance; however, problematic graphical structures (e.g. trapping sets) in the Tanner graph of some LDPC codes can cause high error floors in bit-error-ratio (BER) performance under conventional sum-product algorithm (SPA). This paper presents a serial concatenation scheme to avoid the trapping sets and to lower the error floors of LDPC code. The outer code in the proposed concatenation is the LDPC, and the inner code is a high rate array code. This approach applies an interactive hybrid process between the BCJR decoding for the array code and the SPA for the LDPC code together with bit-pinning and bit-flipping techniques. Margulis code of size (2640, 1320) has been used for the simulation and it has been shown that the proposed concatenation and decoding scheme can considerably improve the error floor performance with minimal rate loss. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=concatenated%20coding" title="concatenated coding">concatenated coding</a>, <a href="https://publications.waset.org/abstracts/search?q=low%E2%80%93density%20parity%E2%80%93check%20codes" title=" low–density parity–check codes"> low–density parity–check codes</a>, <a href="https://publications.waset.org/abstracts/search?q=array%20code" title=" array code"> array code</a>, <a href="https://publications.waset.org/abstracts/search?q=error%20floors" title=" error floors"> error floors</a> </p> <a href="https://publications.waset.org/abstracts/60058/lowering-error-floors-by-concatenation-of-low-density-parity-check-and-array-code" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/60058.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">356</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2615</span> UNIX Source Code Leak: Evaluation and Feasible Solutions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gu%20Dongxing">Gu Dongxing</a>, <a href="https://publications.waset.org/abstracts/search?q=Li%20Yuxuan"> Li Yuxuan</a>, <a href="https://publications.waset.org/abstracts/search?q=Nong%20Tengxiao"> Nong Tengxiao</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Since computers are widely used in business models, more and more companies choose to store important information in computers to improve productivity. However, this information can be compromised in many cases, such as when it is stored locally on the company's computers or when it is transferred between servers and clients. Of these important information leaks, source code leaks are probably the most costly. Because the source code often represents the core technology of the company, especially for the Internet companies, source code leakage may even lead to the company's core products lose market competitiveness, and then lead to the bankruptcy of the company. In recent years, such as Microsoft, AMD and other large companies have occurred source code leakage events, suffered a huge loss. This reveals to us the importance and necessity of preventing source code leakage. This paper aims to find ways to prevent source code leakage based on the direction of operating system, and based on the fact that most companies use Linux or Linux-like system to realize the interconnection between server and client, to discuss how to reduce the possibility of source code leakage during data transmission. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20transmission" title="data transmission">data transmission</a>, <a href="https://publications.waset.org/abstracts/search?q=Linux" title=" Linux"> Linux</a>, <a href="https://publications.waset.org/abstracts/search?q=source%20code" title=" source code"> source code</a>, <a href="https://publications.waset.org/abstracts/search?q=operating%20system" title=" operating system"> operating system</a> </p> <a href="https://publications.waset.org/abstracts/153161/unix-source-code-leak-evaluation-and-feasible-solutions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153161.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">270</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2614</span> Code Refactoring Using Slice-Based Cohesion Metrics and AOP</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jagannath%20Singh">Jagannath Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Durga%20Prasad%20Mohapatra"> Durga Prasad Mohapatra</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Software refactoring is very essential for maintaining the software quality. It is an usual practice that we first design the software and then go for coding. But after coding is completed, if the requirement changes slightly or our expected output is not achieved, then we change the codes. For each small code change, we cannot change the design. In course of time, due to these small changes made to the code, the software design decays. Software refactoring is used to restructure the code in order to improve the design and quality of the software. In this paper, we propose an approach for performing code refactoring. We use slice-based cohesion metrics to identify the target methods which requires refactoring. After identifying the target methods, we use program slicing to divide the target method into two parts. Finally, we have used the concepts of Aspects to adjust the code structure so that the external behaviour of the original module does not change. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=software%20refactoring" title="software refactoring">software refactoring</a>, <a href="https://publications.waset.org/abstracts/search?q=program%20slicing" title=" program slicing"> program slicing</a>, <a href="https://publications.waset.org/abstracts/search?q=AOP" title=" AOP"> AOP</a>, <a href="https://publications.waset.org/abstracts/search?q=cohesion%20metrics" title=" cohesion metrics"> cohesion metrics</a>, <a href="https://publications.waset.org/abstracts/search?q=code%20restructure" title=" code restructure"> code restructure</a>, <a href="https://publications.waset.org/abstracts/search?q=AspectJ" title=" AspectJ"> AspectJ</a> </p> <a href="https://publications.waset.org/abstracts/10366/code-refactoring-using-slice-based-cohesion-metrics-and-aop" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/10366.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">513</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2613</span> Maximum Distance Separable b-Symbol Repeated-Root γ-Constacylic Codes over a Finite Chain Ring of Length 2</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jamal%20Laaouine">Jamal Laaouine</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammed%20Elhassani%20Charkani"> Mohammed Elhassani Charkani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Let p be a prime and let b be an integer. MDS b-symbol codes are a direct generalization of MDS codes. The γ-constacyclic codes of length pˢ over the finite commutative chain ring Fₚm [u]/ < u² > had been classified into four distinct types, where is a nonzero element of the field Fₚm. Let C₃ be a code of Type 3. In this paper, we obtain the b-symbol distance db(C₃) of the code C₃. Using this result, necessary and sufficient conditions under which C₃ is an MDS b-symbol code are given. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=constacyclic%20code" title="constacyclic code">constacyclic code</a>, <a href="https://publications.waset.org/abstracts/search?q=repeated-root%20code" title=" repeated-root code"> repeated-root code</a>, <a href="https://publications.waset.org/abstracts/search?q=maximum%20distance%20separable" title=" maximum distance separable"> maximum distance separable</a>, <a href="https://publications.waset.org/abstracts/search?q=MDS%20codes" title=" MDS codes"> MDS codes</a>, <a href="https://publications.waset.org/abstracts/search?q=b-symbol%20distance" title=" b-symbol distance"> b-symbol distance</a>, <a href="https://publications.waset.org/abstracts/search?q=finite%20chain%20rings" title=" finite chain rings"> finite chain rings</a> </p> <a href="https://publications.waset.org/abstracts/131201/maximum-distance-separable-b-symbol-repeated-root-gh-constacylic-codes-over-a-finite-chain-ring-of-length-2" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/131201.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">137</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2612</span> The Development, Validation, and Evaluation of the Code Blue Simulation Module in Improving the Code Blue Response Time among Nurses</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Siti%20Rajaah%20Binti%20Sayed%20Sultan">Siti Rajaah Binti Sayed Sultan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Managing the code blue event is stressful for nurses, the patient, and the patient's families. The rapid response from the first and second responders in the code blue event will improve patient outcomes and prevent tissue hypoxia that leads to brain injury and other organ failures. Providing 1 minute for the cardiac massage and 2 minutes for defibrillation will significantly improve patient outcomes. As we know, the American Heart Association came out with guidelines for managing cardiac arrest patients. The hospital must provide competent staff to manage this situation. It can be achieved when the staff is well equipped with the skill, attitude, and knowledge to manage this situation with well-planned strategies, i.e., clear guidelines for managing the code blue event, competent staff, and functional equipment. The code blue simulation (CBS) was chosen in the training program for code blue management because it can mimic real scenarios. Having the code blue simulation module will allow the staff to appreciate what they will face during the code blue event, especially since it rarely happens in that area. This CBS module training will help the staff familiarize themselves with the activities that happened during actual events and be able to operate the equipment accordingly. Being challenged and independent in managing the code blue in the early phase gives the patient a better outcome. The CBS module will help the assessor and the hospital management team with the proper tools and guidelines for managing the code blue drill accordingly. As we know, prompt action will benefit the patient and their family. It also indirectly increases the confidence and job satisfaction among the nurses, increasing the standard of care, reducing the complication and hospital burden, and enhancing cost-effective care. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=code%20blue%20simulation%20module" title="code blue simulation module">code blue simulation module</a>, <a href="https://publications.waset.org/abstracts/search?q=development%20of%20code%20blue%20simulation%20module" title=" development of code blue simulation module"> development of code blue simulation module</a>, <a href="https://publications.waset.org/abstracts/search?q=code%20blue%20response%20time" title=" code blue response time"> code blue response time</a>, <a href="https://publications.waset.org/abstracts/search?q=code%20blue%20drill" title=" code blue drill"> code blue drill</a>, <a href="https://publications.waset.org/abstracts/search?q=cardiorespiratory%20arrest" title=" cardiorespiratory arrest"> cardiorespiratory arrest</a>, <a href="https://publications.waset.org/abstracts/search?q=managing%20code%20blue" title=" managing code blue"> managing code blue</a> </p> <a href="https://publications.waset.org/abstracts/183021/the-development-validation-and-evaluation-of-the-code-blue-simulation-module-in-improving-the-code-blue-response-time-among-nurses" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/183021.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">67</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2611</span> A Characterization of Skew Cyclic Code with Complementary Dual</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eusebio%20Jr.%20Lina">Eusebio Jr. Lina</a>, <a href="https://publications.waset.org/abstracts/search?q=Ederlina%20Nocon"> Ederlina Nocon</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cyclic codes are a fundamental subclass of linear codes that enjoy a very interesting algebraic structure. The class of skew cyclic codes (or θ-cyclic codes) is a generalization of the notion of cyclic codes. This a very large class of linear codes which can be used to systematically search for codes with good properties. A linear code with complementary dual (LCD code) is a linear code C satisfying C ∩ C^⊥ = {0}. This subclass of linear codes provides an optimum linear coding solution for a two-user binary adder channel and plays an important role in countermeasures to passive and active side-channel analyses on embedded cryptosystems. This paper aims to identify LCD codes from the class of skew cyclic codes. Let F_q be a finite field of order q, and θ be an automorphism of F_q. Some conditions for a skew cyclic code to be LCD were given. To this end, the properties of a noncommutative skew polynomial ring F_q[x, θ] of automorphism type were revisited, and the algebraic structure of skew cyclic code using its skew polynomial representation was examined. Using the result that skew cyclic codes are left ideals of the ring F_q[x, θ]/⟨x^n-1⟩, a characterization of a skew cyclic LCD code of length n was derived. A necessary condition for a skew cyclic code to be LCD was also given. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=LCD%20cyclic%20codes" title="LCD cyclic codes">LCD cyclic codes</a>, <a href="https://publications.waset.org/abstracts/search?q=skew%20cyclic%20LCD%20codes" title=" skew cyclic LCD codes"> skew cyclic LCD codes</a>, <a href="https://publications.waset.org/abstracts/search?q=skew%20cyclic%20complementary%20dual%20codes" title=" skew cyclic complementary dual codes"> skew cyclic complementary dual codes</a>, <a href="https://publications.waset.org/abstracts/search?q=theta-cyclic%20codes%20with%20complementary%20duals" title=" theta-cyclic codes with complementary duals"> theta-cyclic codes with complementary duals</a> </p> <a href="https://publications.waset.org/abstracts/56575/a-characterization-of-skew-cyclic-code-with-complementary-dual" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/56575.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">345</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2610</span> Performance Analysis and Comparison of Various 1-D and 2-D Prime Codes for OCDMA Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gurjit%20Kaur">Gurjit Kaur</a>, <a href="https://publications.waset.org/abstracts/search?q=Shashank%20Johri"> Shashank Johri</a>, <a href="https://publications.waset.org/abstracts/search?q=Arpit%20Mehrotra"> Arpit Mehrotra</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper we have analyzed and compared the performance of various coding schemes. The basic ID prime sequence codes are unique in only dimension i.e. time slots whereas 2D coding techniques are not unique by their time slots but with their wavelengths also. In this research we have evaluated and compared the performance of 1D and 2D coding techniques constructed using prime sequence coding pattern for OCDMA system on a single platform. Results shows that 1D Extended Prime Code (EPC) can support more number of active users compared to other codes but at the expense of larger code length which further increases the complexity of the code. Modified Prime Code (MPC) supports lesser number of active users at λc=2 but it has a lesser code length as compared to 1D prime code. Analysis shows that 2D prime code supports lesser number of active users than 1D codes but they are having large code family and are the most secure codes compared to other codes. The performance of all these codes is analyzed on basis of number of active users supported at a Bit Error Rate (BER) of 10-9. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CDMA" title="CDMA">CDMA</a>, <a href="https://publications.waset.org/abstracts/search?q=OCDMA" title=" OCDMA"> OCDMA</a>, <a href="https://publications.waset.org/abstracts/search?q=BER" title=" BER"> BER</a>, <a href="https://publications.waset.org/abstracts/search?q=OOC" title=" OOC"> OOC</a>, <a href="https://publications.waset.org/abstracts/search?q=PC" title=" PC"> PC</a>, <a href="https://publications.waset.org/abstracts/search?q=EPC" title=" EPC"> EPC</a>, <a href="https://publications.waset.org/abstracts/search?q=MPC" title=" MPC"> MPC</a>, <a href="https://publications.waset.org/abstracts/search?q=2-D%20PC%2FPC" title=" 2-D PC/PC"> 2-D PC/PC</a>, <a href="https://publications.waset.org/abstracts/search?q=%CE%BBc" title=" λc"> λc</a>, <a href="https://publications.waset.org/abstracts/search?q=%CE%BBa" title=" λa"> λa</a> </p> <a href="https://publications.waset.org/abstracts/35194/performance-analysis-and-comparison-of-various-1-d-and-2-d-prime-codes-for-ocdma-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/35194.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">510</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2609</span> The Effect of the 2015 Revision to the Corporate Governance Code on Japanese Listed Firms</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tomotaka%20Yanagida">Tomotaka Yanagida</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Corporate Governance Code, revised in 2015, requires firms listed within the first and second sections of Japan’s Tokyo stock exchange to select two or more independent outside directors (the Corporate Governance Code4-8). Therefore, Japanese listed firms must do this or explain the reason why they are not able to do so. This study investigates how the Corporate Governance Code affects Japanese listed firms. We find that the Corporate Governance Code increases the ratio of outside directors by nearly 8.8% for a sample of Japanese firms comprising nearly 4,200 firm-year observations from 2014 to 2015 using a difference-in-differences approach. This implies that they felt it would have been difficult to explain why it was not appropriate to have an outside director at the annual shareholders' meeting. Moreover, this suggests that they appoint outside directors as defined by the Corporate Governance Code, but maintain board size. This situation shows that compliance in Japan may simply be 'window dressing,' that is, more form than substance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=board%20structure" title="board structure">board structure</a>, <a href="https://publications.waset.org/abstracts/search?q=comply%20or%20explain" title=" comply or explain"> comply or explain</a>, <a href="https://publications.waset.org/abstracts/search?q=corporate%20governance%20code" title=" corporate governance code"> corporate governance code</a>, <a href="https://publications.waset.org/abstracts/search?q=soft%20law" title=" soft law"> soft law</a> </p> <a href="https://publications.waset.org/abstracts/131186/the-effect-of-the-2015-revision-to-the-corporate-governance-code-on-japanese-listed-firms" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/131186.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">173</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2608</span> A Sociolinguistic Investigation of Code-Switching Practices of ESL Students Outside EFL Classrooms</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shehroz%20Mukhtar">Shehroz Mukhtar</a>, <a href="https://publications.waset.org/abstracts/search?q=Maqsood%20Ahmed"> Maqsood Ahmed</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdullah%20Mukhtar"> Abdullah Mukhtar</a>, <a href="https://publications.waset.org/abstracts/search?q=Choudhry%20Shahid"> Choudhry Shahid</a>, <a href="https://publications.waset.org/abstracts/search?q=Waqar%20Javaid"> Waqar Javaid</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Code switching is a common phenomenon, generally observed in multilingual communities across the globe. A critical look at code switching literature reveals that mostly code switching has been studied in classroom in learning and teaching context while code switching outside classroom in settings such as café, hostel and so on have been the least explored areas. Current research investigated the reasons for code switching in the interactive practices of students and their perceptions regarding the same outside the classroom settings. This paper is the study of the common practice that prevails in the Universities of Sialkot that bilinguals mix two languages when they speak in different class room situations. In Pakistani classrooms where Multilingual are in abundance i.e. they can speak two or more than two languages at the same time, the code switching or language combination is very common. The teachers of Sialkot switch from one language to another consciously or unconsciously while teaching English in the class rooms. This phenomenon has not been explored in the Sialkot’s teaching context. In Sialkot private educational institutes does not encourage code-switching whereas the public or government institutes use it frequently. The crux of this research is to investigate and identify the importance of code switching by taking its users in consideration. Survey research method and survey questionnaire will be used to get exact data from teachers and students. We will try to highlight the functions and importance of code switching in foreign language classrooms of Sialkot and will explore why this trend is emerging in Sialkot. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=code%20switching" title="code switching">code switching</a>, <a href="https://publications.waset.org/abstracts/search?q=bilingual%20context" title=" bilingual context"> bilingual context</a>, <a href="https://publications.waset.org/abstracts/search?q=L1" title=" L1"> L1</a>, <a href="https://publications.waset.org/abstracts/search?q=L2" title=" L2"> L2</a> </p> <a href="https://publications.waset.org/abstracts/184377/a-sociolinguistic-investigation-of-code-switching-practices-of-esl-students-outside-efl-classrooms" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/184377.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">65</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2607</span> Code Embedding for Software Vulnerability Discovery Based on Semantic Information</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Joseph%20Gear">Joseph Gear</a>, <a href="https://publications.waset.org/abstracts/search?q=Yue%20Xu"> Yue Xu</a>, <a href="https://publications.waset.org/abstracts/search?q=Ernest%20Foo"> Ernest Foo</a>, <a href="https://publications.waset.org/abstracts/search?q=Praveen%20Gauravaran"> Praveen Gauravaran</a>, <a href="https://publications.waset.org/abstracts/search?q=Zahra%20Jadidi"> Zahra Jadidi</a>, <a href="https://publications.waset.org/abstracts/search?q=Leonie%20Simpson"> Leonie Simpson</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Deep learning methods have been seeing an increasing application to the long-standing security research goal of automatic vulnerability detection for source code. Attention, however, must still be paid to the task of producing vector representations for source code (code embeddings) as input for these deep learning models. Graphical representations of code, most predominantly Abstract Syntax Trees and Code Property Graphs, have received some use in this task of late; however, for very large graphs representing very large code snip- pets, learning becomes prohibitively computationally expensive. This expense may be reduced by intelligently pruning this input to only vulnerability-relevant information; however, little research in this area has been performed. Additionally, most existing work comprehends code based solely on the structure of the graph at the expense of the information contained by the node in the graph. This paper proposes Semantic-enhanced Code Embedding for Vulnerability Discovery (SCEVD), a deep learning model which uses semantic-based feature selection for its vulnerability classification model. It uses information from the nodes as well as the structure of the code graph in order to select features which are most indicative of the presence or absence of vulnerabilities. This model is implemented and experimentally tested using the SARD Juliet vulnerability test suite to determine its efficacy. It is able to improve on existing code graph feature selection methods, as demonstrated by its improved ability to discover vulnerabilities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=code%20representation" title="code representation">code representation</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20learning" title=" deep learning"> deep learning</a>, <a href="https://publications.waset.org/abstracts/search?q=source%20code%20semantics" title=" source code semantics"> source code semantics</a>, <a href="https://publications.waset.org/abstracts/search?q=vulnerability%20discovery" title=" vulnerability discovery"> vulnerability discovery</a> </p> <a href="https://publications.waset.org/abstracts/157454/code-embedding-for-software-vulnerability-discovery-based-on-semantic-information" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/157454.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">158</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2606</span> A Sociolinguistic Investigation of Code-Switching Practices of ESL Students Outside EFL Classrooms</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shehroz%20Mukhtar">Shehroz Mukhtar</a>, <a href="https://publications.waset.org/abstracts/search?q=Maqsood%20Ahmed"> Maqsood Ahmed</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdullah%20Mukhtar"> Abdullah Mukhtar</a>, <a href="https://publications.waset.org/abstracts/search?q=Choudhry%20Shahid"> Choudhry Shahid</a>, <a href="https://publications.waset.org/abstracts/search?q=Waqar%20Javaid"> Waqar Javaid</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Code switching is a common phenomenon, generally observed in multilingual communities across the globe. A critical look at code-switching literature reveals that mostly code-switching has been studied in the classrooms in learning and teaching contexts, while code-switching outside the classroom in settings such as café, hostels and so on has been the least explored areas. The current research investigated the reasons for code-switching in the interactive practices of students and their perceptions regarding the same outside the classroom settings. This paper is the study of the common practice that prevails in the Universities of Sialkot that bilinguals mix two languages when they speak in different classroom situations. In Pakistani classrooms where Multilingual is in abundance, i.e. they can speak two or more two languages at the same time, code-switching or language combination is very common. The teachers of Sialkot switch from one language to another consciously or unconsciously while teaching English in the classrooms. This phenomenon has not been explored in Sialkot’s teaching context. In Sialkot, private educational institutes do not encourage code-switching, whereas public or government institutes use it frequently. The crux of this research is to investigate and identify the importance of code-switching by taking its users into consideration. The survey research method and survey questionnaire will be used to get exact data from teachers and students. We will try to highlight the functions and importance of code switching in foreign language classrooms of Sialkot and will explore why this trend is emerging in Sialkot. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=code%20switching" title="code switching">code switching</a>, <a href="https://publications.waset.org/abstracts/search?q=foreign%20language%20classrooms" title=" foreign language classrooms"> foreign language classrooms</a>, <a href="https://publications.waset.org/abstracts/search?q=bilingual%20context" title=" bilingual context"> bilingual context</a>, <a href="https://publications.waset.org/abstracts/search?q=use%20of%20L1" title=" use of L1"> use of L1</a>, <a href="https://publications.waset.org/abstracts/search?q=importance%20of%20L2." title=" importance of L2."> importance of L2.</a> </p> <a href="https://publications.waset.org/abstracts/184351/a-sociolinguistic-investigation-of-code-switching-practices-of-esl-students-outside-efl-classrooms" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/184351.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">66</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=spread%20reshaping%20code&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=spread%20reshaping%20code&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=spread%20reshaping%20code&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=spread%20reshaping%20code&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=spread%20reshaping%20code&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=spread%20reshaping%20code&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=spread%20reshaping%20code&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=spread%20reshaping%20code&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=spread%20reshaping%20code&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=spread%20reshaping%20code&amp;page=87">87</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=spread%20reshaping%20code&amp;page=88">88</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=spread%20reshaping%20code&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10