Search Results - coding rule checking function
-
1
Analysis of Code Writing Problem Solution Results in C Programming Course
ISSN: 2158-4001Published: IEEE 06.01.2024Published in Proceedings of IEEE International Symposium on Consumer Electronics (06.01.2024)“… The results confirmed the effectiveness of the code validation function for the automatic marking and the coding rule checking function to improve readable code writing…”
Get full text
Conference Proceeding -
2
An Implementation of Coding Rule Checking Function for C Programming Study
Published: IEEE 07.03.2022Published in 2022 IEEE 4th Global Conference on Life Sciences and Technologies (LifeTech) (07.03.2022)“… In this paper, we implement a coding rule checking function for C programming study of novice students…”
Get full text
Conference Proceeding -
3
An Implementation of Naming Rule Checking Function and its Applications to Java Programming Codes
ISSN: 2158-4001Published: IEEE 11.01.2025Published in Proceedings of IEEE International Symposium on Consumer Electronics (11.01.2025)“… In this paper, we consider four naming rules to write a readable code and implement the naming rule checking function to check whether the given code follows…”
Get full text
Conference Proceeding -
4
TRustPN: Transforming Rust Source Code to Petri Nets for Checking Deadlocks
ISSN: 2576-3555Published: IEEE 01.07.2024Published in International Conference on Control, Decision and Information Technologies (Online) (01.07.2024)“…This paper introduces an innovative method for converting Rust source code to Petri nets while checking deadlock detection caused by synchronization primitives such as Mutex, RwLock, and CandVar…”
Get full text
Conference Proceeding -
5
E-prescribing implementation in paediatrics: lessons learned
ISSN: 0003-9888, 1468-2044Published: London BMJ Publishing Group Ltd and Royal College of Paediatrics and Child Health 01.06.2013Published in Archives of disease in childhood (01.06.2013)“… Paediatric prescribing rules and clinical decision support (CDS) are required; Pharmacist involvement in developing CDS may be a significant resource demand…”
Get full text
Journal Article -
6
Exploring Reliable Communication in Optical Networks-on-Chip Based on All-Optical Linear Block Codes Encoder
ISSN: 0733-8724, 1558-2213Published: New York IEEE 15.08.2019Published in Journal of lightwave technology (15.08.2019)“… The scheme mainly exploits the characteristics of linear block codes to implement the function of checking and correcting bit errors…”
Get full text
Journal Article -
7
On the minimization of k-valued logic functions in the class of disjunctive normal forms
ISSN: 1563-0277, 2617-4871Published: 09.04.2024Published in Vestnik KazNU. Serii͡a︡ matematika, mekhanika, informatika (09.04.2024)“… Therefore, checking the completeness of classes of k valued logical functions and developing methods and algorithms for minimizing functions in the class of canonical normal forms, estimating…”
Get full text
Journal Article -
8
Beyond Words, Beyond Conflicts: Narrative Inquiry into the Language Games of Asian Interreligious Dialogue
ISSN: 1547-9684, 1521-4672Published: 2025Published in Informing science (2025)“… Wittgenstein’s concepts of language games and rule-following. It seeks to: (1) analyze how religious traditions function as distinct yet overlapping language games; (2…”
Get full text
Journal Article -
9
Error detection in arithmetic circuits using divisibility checking
ISBN: 0780300815, 9780780300811Published: IEEE 1990Published in IEEE Thirty-Third Midwest Symposium on Circuits and Systems, 1990 (1990)“…Divisibility checking for error detection in arithmetic circuits is proposed. This technique is based on encoding the operands of an arithmetic operation according to a divisibility rule which is function of all the bits in the operand…”
Get full text
Conference Proceeding -
10
An ontology-based approach for developing a harmonised data-validation tool for European cancer registration
ISSN: 2041-1480, 2041-1480Published: London BioMed Central 06.01.2021Published in Journal of biomedical semantics (06.01.2021)“…Background Population-based cancer registries constitute an important information source in cancer epidemiology. Studies collating and comparing data across…”
Get full text
Journal Article -
11
무기체계 소프트웨어 신뢰성 시험 개선점 도출을 위한 소프트웨어 정적/동적 검증 분석 사례연구
ISSN: 2287-5905Published: 한국정보처리학회 31.07.2019Published in 정보처리학회 논문지 (KTSDE) (31.07.2019)“… when developing the weapon system software is classified into static test and dynamic test. In static test, checking the coding rules, vulnerabilities and source code metric are performed without executing the software…”
Get full text
Journal Article -
12
Towards Automated Structural Stability Design of Buildings—A BIM-Based Solution
ISSN: 2075-5309, 2075-5309Published: Basel MDPI AG 01.04.2022Published in Buildings (Basel) (01.04.2022)“… The number of unwanted errors is increasing, and any suspension of the project is led by the structural code-checking system, and is a tiresome process…”
Get full text
Journal Article -
13
The study on the space time block coding and its application in wireless communications
ISBN: 9780496964079, 0496964070Published: ProQuest Dissertations & Theses 01.01.2004“…Among all the systems implementing transmit diversity, Space-Time Block Coding (STBC) has the simplest structure and offers full diversity and linear maximum-likelihood…”
Get full text
Dissertation -
14
Graph-Theoretic Vulnerability Detection for Insecure Cryptography Code
ISBN: 9798379596965Published: ProQuest Dissertations & Theses 01.01.2023“… One of the most popular and accessible sources of information for developers is Stack Overflow, a website where programmers can ask and answer questions about coding…”
Get full text
Dissertation -
15
Increasing the Reliability of Information in Electronic Documents Based on the Use of Statistical Redundancy and n-Gram Structure of Texts
ISSN: 2836-614XPublished: IEEE 07.09.2025Published in International Russian Automation Conference (Online) (07.09.2025)“… of statistical Huffman coding, forming n-grams of text statistics, and determining a rational set of hash functions are obtained…”
Get full text
Conference Proceeding -
16
Chapter 14 - Creating a Web Security Tool
ISBN: 1597490059, 9781597490054Published: Elsevier Inc 2005Published in Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals (2005)“… It is dedicated solely to creating a tool from the ground up to accomplish a particular function, or to take a function of a best-in-class freeware tool (Nikto…”
Get full text
Book Chapter

