Abstract: The rooted max tree coverage (MTC) problem has wide applications in areas, such as network design and vehicle routing. Given a graph with non-negative costs defined on edges, a vertex used ...
Abstract: The belief propagation (BP) algorithm is a widely adopted iterative decoding method for Luby transform (LT) codes. However, the conventional log-likelihood ratio BP (LLR-BP) decoder exhibits ...
Abstract: As interconnect delay increasingly becomes the primary source of chip delay, timing analysis in the very large-scale integration (VLSI) routing process is becoming more crucial. Concurrently ...
Abstract: A Bounded-Degree Low-Rank Parity-Check (BD-LRPC) code is a rank-metric code that admits a parity-check matrix whose support is generated by a set of powers of an element. This specific ...
Abstract: Robot skill reconfiguration often disrupts system continuity in dynamic flexible production systems, particularly in mixed-model assembly. To address this challenge, this article proposes ...
Abstract: The gradient descent bit-flipping with momentum (GDBF-w/M) and probabilistic GDBF-w/M (PGDBF-w/M) algorithms significantly improve the decoding performance of the bit-flipping (BF) algorithm ...
A Calverton property owner charged with improperly storing compost at a 45-acre farm agreed to pay a $5,630 fine after pleading guilty to Riverhead Town code violations, town officials said. Riverhead ...
Abstract: Machine learning has been successfully applied to drug combination prediction in recent years. However, in some situations, the class imbalance problem still shows highly negative impacts on ...
The Arizona Department of Economic Security is investigating Tucson charity Cross Country Outreach, which the Star has found is violating building, zoning and health codes, and is likely breaking ...
Abstract: Over the past decade, the application of deep learning in code clone detection has produced remarkable results. However, the current approaches have two limitations: (a) code representation ...