نتایج جستجو برای: check
تعداد نتایج: 52349 فیلتر نتایج به سال:
the paper presents lower and upper bounds on the number of parity check digits required for a linear code that detects solid bursts of length $b$ or less and simultaneously any $e$ or less random errors. an example of such a code is also provided. further, codes capable of detecting and simultaneously correcting such errors have also been dealt with.
D espite their name, the passenger proteins aren't just along for the ride during mitosis. They are busy helping control the attachment of spindle fi bers to the chromosomes and ensuring that the cell splits after the chromosomes part. INCENPs' many locations But it was the proteins' seemingly bizarre movements that fi rst caught the eye of William Earnshaw (now at the University of Edinburgh i...
drastically displaced. From our side, this has lead to an intelligent analytical procedure that we call “InCAP,” which groups waveforms into clusters.3 The cluster that most closely agrees with the normal capnogram is used for calculating PETCO2. This analysis system provides considerably better agreement between the data from cluster 1 and the PaCO2 value. The problematic nature of the convent...
Null dereferencing is one of the most frequent bugs in Java systems causing programs to crash due to the uncaught NullPointerException. Developers often fix this bug by introducing a guard (i.e., null check) on the potentially-null objects before using them. In this paper we investigate the null checks in 717 open-source Java systems to understand when and why developers introduce null checks. ...
This paper describes a method for packet synchronization and error detection for use in a synchronous digital communications system. The method relies upon a class of linear block codes that have parity checks that are expressed in terms of a finite-impulse response (FIR) filter. This system is incorporated in the newly established ITU standard of digital cable television standard, J.83 appendi...
Organization’s dependency on information systems and the related resources has led to an increased vulnerability to computer crime and abuse. It is therefore of the utmost importance that senior management are aware of the importance of information security because they are ultimately accountable for the organization’s success. Unfortunately, no effective, easy to use tool is available to diagn...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید