Showing 1,901 - 1,920 results of 4,609 for search '"code"', query time: 0.05s Refine Results
  1. 1901

    MRM-BERT: a novel deep neural network predictor of multiple RNA modifications by fusing BERT representation and sequence features by Linshu Wang, Yuan Zhou

    Published 2024-12-01
    “…MRM-BERT is available as an online tool (http://117.122.208.21:8501) or source code (https://github.com/abhhba999/MRM-BERT), which allows users to predict RNA modification sites and visualize the results. …”
    Get full text
    Article
  2. 1902

    Numerical Investigation of Hydraulic Fracture Propagation in Naturally Fractured Reservoirs Based on Lattice Spring Model by Kaikai Zhao, Pengfei Jiang, Yanjun Feng, Xiaodong Sun, Lixing Cheng, Jianwei Zheng

    Published 2020-01-01
    “…In this study, a lattice-spring code was employed to determine the impact of various parameters on the geometry of the HFN. …”
    Get full text
    Article
  3. 1903

    MtCro: multi-task deep learning framework improves multi-trait genomic prediction of crops by Dian Chao, Hao Wang, Fengqiang Wan, Shen Yan, Wei Fang, Yang Yang

    Published 2025-02-01
    “…By leveraging multi-task learning, MtCro efficiently captures diverse plant phenotypes, enhancing both model training efficiency and prediction accuracy, ultimately accelerating the progress of plant genetic breeding. Our code is available on https://github.com/chaodian12/mtcro .…”
    Get full text
    Article
  4. 1904

    Analyzing Key Features of Open Source Software Survivability with Random Forest by Sohee Park, Gihwon Kwon

    Published 2025-01-01
    “…A random forest model is used to examine the relationships between project features—such as popularity metrics, community engagement, code complexity, and project age—and issue retention rates. …”
    Get full text
    Article
  5. 1905

    Computerized Generation of Nonstandard and Asymmetric Involute Spur Gears Based on Rack Cutter Parametric Tracing by Ahmed A. Toman, Mohammad Q. Abdullah

    Published 2025-02-01
    “…This technique, although shown to be accurate in generating a 2D standard tooth, is time-consuming as it necessitates the use of source code, a programming language, a graphic processor for displaying computer graphs, a post-graphic processor for eliminating unrelated lines, and a post-process for exporting the tooth geometry to CAD software. …”
    Get full text
    Article
  6. 1906

    Welfare and research: automatic cognitive testing in social groups in macaques in the laboratory by Christophe Jouy, Nicolas Souedet, Didier Thenadey, Philippe Hantraye, Romina Aron Badin

    Published 2014-01-01
    “…Inspired by recent publications on automated cognitive testing in social groups, our laboratory developed a special application on tactile screens, AUTOBUNTO, by which each primate learnt its own pin code to launch a single trial of its own behavioral test. …”
    Get full text
    Article
  7. 1907

    Initialization Methods for FPGA-Based EMT Simulations by Xin Ma, Xiao-Ping Zhang

    Published 2024-01-01
    “…The performance of these four methods are also compared, and Method 4 can initialize instantly with the simplest code. To improve hardware adaptability, optimized strategies are developed for address sequence, interface, update modes and dataflow. …”
    Get full text
    Article
  8. 1908

    Danger Is a Signal, Not a State: Bigaagarri—An Indigenous Protocol for Dancing Around Threats to Wellbeing by Phillip Orcher, Victoria J. Palmer, Tyson Yunkaporta

    Published 2025-01-01
    “…The paper connects the first principles of this protocol to literature, then, using code-switching between academic and informal settler and Indigenous voices, it introduces personal lived experience narratives that include utilisation of the participatory and immersive protocol seen in the graphical abstract image to mitigate suicidal ideation. …”
    Get full text
    Article
  9. 1909

    Numerical Study of the Air Ingress Accident of the HTR-PM and Possible Mitigation Measures by Wei Xu, Han Zhang, Heng Xie, Lei Shi, Jun Sun

    Published 2020-01-01
    “…The performance of the HTR-PM plant under this extremely hypothetical accident has been studied by the system code TINTE in this work. The results show that the maximum fuel temperature will not reach the temperature design limitation, and the graphite oxidation will not cause unacceptable consequences even under some conservative assumptions. …”
    Get full text
    Article
  10. 1910

    The use of graphics accelerators to detect functional signals in the regulatory regions of prokaryotic genes by O. V. Vishnevsky, A. V. Bocharnikov, A. A. Romanenko

    Published 2016-01-01
    “…Methods of searching for contextual signals, based on the identification of degenerate oligonucleotide motives recorded in the 15-letter IUPAC code have become widespread. An essential problem with degenerate motifs is their great diversity, which makes the researchers apply heuristics which do not guarantee that the most significant signal will be found. …”
    Get full text
    Article
  11. 1911

    Experimental Research of Continuous Concrete Beams with GFRP Reinforcement by Nikola Baša, Mladen Ulićević, Radomir Zejak

    Published 2018-01-01
    “…On the contrary, current design codes underestimate deflection of continuous beams with GFRP reinforcement, especially for higher load levels. …”
    Get full text
    Article
  12. 1912

    Modeling of Functionally Graded Material Shells by Khalil Sihame, Elmhaia Oussama, Hamdaoui Abdellah, Braikat Bouazza, Hu Heng, Boukamel Adnane, Damil Noureddine

    Published 2025-01-01
    “…The results are validated against the Abaqus industrial code, demonstrating the accuracy of our model. Furthermore, we detail the impact of the volume fraction index on the load-displacement behavior and structural deformations, providing valuable insights for enhancing the design and safety of these critical structures.…”
    Get full text
    Article
  13. 1913

    Use of knowingly false information by criminal proceedings participants by M. L. Hribov, V. V. Shendryk

    Published 2022-12-01
    “…The Criminal Procedure Code of Ukraine and by-laws regulating the activities of law enforcement agencies indirectly provide for the use of false information by representatives of the prosecution (investigator, prosecutor, operational units) to perform the tasks of criminal proceedings. …”
    Get full text
    Article
  14. 1914

    PSI Methodologies for Nuclear Data Uncertainty Propagation with CASMO-5M and MCNPX: Results for OECD/NEA UAM Benchmark Phase I by W. Wieselquist, T. Zhu, A. Vasiliev, H. Ferroukhi

    Published 2013-01-01
    “…This paper describes both DP and SS implemented in the lattice physics code CASMO-5MX (a special PSI-modified version of CASMO-5M) and a preliminary SS technique implemented in MCNPX, routinely used in criticality safety and fluence analyses. …”
    Get full text
    Article
  15. 1915

    Simulating data breaches: Synthetic datasets for depicting personally identifiable information through scenario-based breachesMendeley DataMendeley Data by Abhishek Sharma, May Bantan

    Published 2025-02-01
    “…The synthetically generated records are shared with the code in this paper to facilitate future researchers and practitioners to generate customized synthetic records according to their requirements, enabling transparency in terms of reusability, reproducibility, and replicability.…”
    Get full text
    Article
  16. 1916

    Determination of the Peak and Residual Shear Strengths of the Sandwich Material in Slopes by Qijun Hu, Qijie Cai, Leping He, Xiaoqiang Yang, Tao Ye, Rendan Shi

    Published 2017-01-01
    “…To determine the peak and residual shear strengths of the mudded weak interlayers, the particle flow code (PFC) is used to simulate the failure behavior during the direct shear tests. …”
    Get full text
    Article
  17. 1917

    Genetic Basis for Variation of Metalloproteinase-Associated Biochemical Activity in Venom of the Mojave Rattlesnake (Crotalus scutulatus scutulatus) by Ruben K. Dagda, Sardar Gasanov, Ysidro De La OIII, Eppie D. Rael, Carl S. Lieb

    Published 2013-01-01
    “…To address this question, we PCR-amplified and compared the genomic DNA nucleotide sequences that code for the mature metalloproteinase domain of fourteen Mojave rattlesnakes captured from different geographical locations across the southwest region of the United States. …”
    Get full text
    Article
  18. 1918

    Influence of screw angle and position on the extraction dynamics of Cross-Laminated Timber: an empirical analysis and comparative modeling study by Jia Lei, Xinran Li, Xinmeng Wang, Feibin Wang, Shuo Wang, Xin An, Meng Gong, Zeli Que

    Published 2025-01-01
    “…The ratios of experimental capacities to model predictions were 1.26–1.49 for the Blaß and Uibel (B&U) model and 1.36–1.56 for Eurocode 5 (EC5). The new EC5 code, compared to the previous version, includes several advancements such as more accurate material properties and improved calculation methods for fastener withdrawal capacity, offering enhanced prediction accuracy for STS performance in CLT. …”
    Get full text
    Article
  19. 1919

    Leakage Characteristic of Helical Groove Seal Designed in Reactor Coolant Pump by Meng Zhang, Xiao-fang Wang, Sheng-li Xu, Shuo Yin

    Published 2012-01-01
    “…The flow and the friction factors in helical groove seals are predicted by employing a commercial CFD code, FLUENT. The friction factors of the helical groove seals with helix angles varying from 20 deg to 50 deg, at a range of rotational speed and axial Reynolds number, were, respectively, calculated. …”
    Get full text
    Article
  20. 1920

    Use of Mechanical Turk as a MapReduce Framework for Macular OCT Segmentation by Aaron Y. Lee, Cecilia S. Lee, Pearse A. Keane, Adnan Tufail

    Published 2016-01-01
    “…The interface was created using custom HTML5 and JavaScript code, and data analysis was performed using R. An automated pipeline was developed to handle the map and reduce steps of the framework. …”
    Get full text
    Article