-
1
Deep Clustering of Student Code Strategies Using Multi-View Code Representation (CMVAE)
Published 2025-03-01“…In programming education, it is common for students to submit solutions to algorithmic problems that implement the same functionality but are not labeled, making it difficult to identify which codes employ similar strategies. …”
Get full text
Article -
2
-
3
Can LLMs effectively assist medical coding? Evaluating GPT performance on DRG and targeted clinical tasks
Published 2025-08-01“…Importantly, the recent and drastic decline of the cost of deploying large language models makes their integration into medical coding workflows increasingly feasible. …”
Get full text
Article -
4
Temporal variation in the diagnosis of resolved atrial fibrillation and the influence of performance targets on clinical coding: cohort study
Published 2019-11-01“…Among ‘resolved AF’ patients with CHA2DS2-VASc score ≥1, 81.9% (95% CI 81.1 to 82.6) had no current anticoagulant prescription, and 62.3% (95% CI 61.4 to 63.2) had no record of any anticoagulant prescription.Conclusion The introduction of AF performance targets was followed by a large increase in use of the ‘resolved AF’ code, particularly in the months immediately before practices make their anticoagulant performance target submissions. …”
Get full text
Article -
5
Enforcing Grammar in Code Synthesis with Transformers
Published 2023-05-01“…Even more so than natural language, code is extremely sensitive to syntax; a small error could make an entire snippet invalid. …”
Get full text
Article -
6
Research progress in code reuse attacking and defending
Published 2018-03-01“…Code reuse attacks make use of binary code existed in the attacked target to perform attack action,such technique breaks out the traditional assumption that malicious behavior always be introduced from the outside,it is representative sample of the advanced memory corruption techniques and also the focus of attention in the software security research field.The generation background and implementation principle were described firstly,and then the recent progresses of the technique,including improvement and variants,implementation methods under the different architecture platforms,automatic construction and important extension including blind ROP and non-control data attacks based on code reuse attacks,were introduced respectively.Various defense mechanisms and possible counter-defense methods for code reuse attacks were also discussed.Finally a perspective of the future work in this research area was discussed.…”
Get full text
Article -
7
MicroRNA-1303 in cancer pathogenesis and therapy: clinical implications for biomarker development and targeted treatment strategies
Published 2025-07-01“…Its expression patterns have been correlated with tumor stage, metastasis, and patient survival, suggesting promising utility in clinical decision-making. In addition, we explore the emerging therapeutic strategies targeting miRNA-1303, including miRNA mimics, inhibitors, and delivery systems designed to modulate its expression in cancer cells. …”
Get full text
Article -
8
The role of non-coding RNAs in the regulation of cell death pathways in melanoma
Published 2025-06-01“…Such diverse functions make ncRNAs invaluable as diagnostic and prognostic biomarkers and potential therapeutic targets. …”
Get full text
Article -
9
The JPEG Pleno Learning-Based Point Cloud Coding Standard: Serving Man and Machine
Published 2025-01-01“…Efficient point cloud coding has become increasingly critical for multiple applications such as virtual reality, autonomous driving, and digital twin systems, where rich and interactive 3D data representations may functionally make the difference. …”
Get full text
Article -
10
The Need for an International law-Informed Code of Conduct for Nuclear Command, Control and Communication
Published 2025-06-01“…To be effective, NC3 systems must fulfill certain critical functions, including detection, warning, and attack characterization; nuclear planning and targeting; decision-making; receiving orders; and enabling the management and direction of forces. …”
Get full text
Article -
11
Damage and Failure Modeling of Composite Material Structures Using the Pam-Crash Code
Published 2024-12-01Get full text
Article -
12
Asteroids Exploration Trajectory Optimal Design with Differential Evolution Based on Mixed Coding
Published 2015-07-01“…This paper proposes a novel method to design the optimal trajectory by differential evolution (DE) algorithm for asteroid exploration based on mixed coding. In our method, the celestial sequence and the time sequence are coded together into the chromosomes of DE and optimized them simultaneously. …”
Get full text
Article -
13
Novel small non-coding RNAs of Epstein-Barr virus upregulated upon lytic reactivation aid in viral genomic replication and virion production
Published 2025-05-01“…These findings highlight the role of p7 and p8 in supporting EBV persistence by regulating viral replication, cell survival, and immune evasion, making them promising targets for therapeutic strategies in EBV-related diseases.IMPORTANCEEpstein-Barr virus (EBV) employs diverse strategies for long-term persistence in the host, including the expression of viral non-coding RNAs (ncRNAs) that manipulate key cellular pathways to promote viral replication and immune evasion. …”
Get full text
Article -
14
Code-switching in Second Language Acquisition: A Systematic Literature Review on Benefits and Challenges
Published 2025-05-01“…Of 850 screened records, 50 articles were qualitatively synthesized, making up the systematic review material. The findings of this review reveal that CS can serve as a valuable and versatile strategy for learners, enabling them to overcome temporary linguistic limitations, enhance comprehension of complex concepts, and actively participate in communication even when faced with gaps in their target language proficiency. …”
Get full text
Article -
15
Exosomal non-coding RNAs: key molecules in the diagnosis and treatment of coronary artery disease
Published 2025-06-01Get full text
Article -
16
Optimized Rate Control Algorithm of High-Efficiency Video Coding Based on Region of Interest
Published 2020-01-01“…Aiming at the problems that the strategy of target bit allocation at the CTU layer has deviations from the human subjective observation mechanism, and the update phase of parametric model has a higher complexity in the JCTVC-K0103 rate control algorithm of ITU-T H.265/high efficiency video coding (HEVC) standard. …”
Get full text
Article -
17
Representation of non-coding RNA-mediated regulation of gene expression using the Gene Ontology
Published 2024-12-01“…Here, a targeted effort to revise GO terms used for the annotation of regulatory ncRNAs is described, focusing on microRNAs (miRNAs), long non-coding RNAs (lncRNAs), small interfering RNAs (siRNAs) and PIWI-interacting RNAs (piRNAs). …”
Get full text
Article -
18
Q-Pandora Unboxed: Characterizing Resilience of Quantum Error Correction Codes Under Biased Noise
Published 2025-04-01“…Tailoring surface codes to align with the target logical error rate and the biased physical error profile is crucial for optimizing reliability and resource use.…”
Get full text
Article -
19
Deciphering the roles of non-coding RNAs in liposarcoma development: Challenges and opportunities for translational therapeutic advances
Published 2025-04-01“…Liposarcoma is one of the most prevalent forms of soft tissue sarcoma, and its prognosis is highly dependent on its molecular subtypes. Non-coding RNAs (ncRNAs) like microRNAs (miRNAs) and long non-coding RNAs (lncRNAs) can bind various cellular targets to regulate carcinogenesis. …”
Get full text
Article -
20
Validation and study of different parameters in the simulation of diagnostic X-ray spectra using the MCNPX code
Published 2023-03-01“…In radiology, knowing the X-ray spectrum characteristics makes it possible to estimate the absorbed dose in the patient and to improve image quality. …”
Get full text
Article