-
321
IGN: Invariable gene set-based normalization for chromatin accessibility profile data analysis
Published 2025-01-01“…As the first chromatin accessibility normalization method that accounts for global differences, IGN can be widely applied to differential ATAC-seq and DNase-seq analysis. The package and source code are available on GitHub at https://github.com/zang-lab/IGN.…”
Get full text
Article -
322
Care home resident identification: A comparison of address matching methods with Natural Language Processing.
Published 2024-01-01“…The analysis used population data for 771,588 uniquely written addresses for 819,911 people in two NHS Scotland health board regions. The source code is publicly available at https://github.com/vsuarezpaniagua/NLPcarehome.…”
Get full text
Article -
323
Bipolar Morphological Neural Networks: Gate-Efficient Architecture for Computer Vision
Published 2021-01-01“…We show that BM networks demonstrate accuracy that allows their practical use, with significantly higher performance in terms of a transistor budget for two (ASIC, FPGA) of the three architectures under consideration. The source code of the model and ResNet experiments are available at <uri>https://github.com/SmartEngines/bipolar-morphological-resnet</uri>.…”
Get full text
Article -
324
Comparative analysis of NTRUEncrypt modified post-quantum cryptographic system and standard RSA cryptosystem
Published 2019-06-01“…A Stopwatch class element was introduced in the source code of all three programs of NTRUEncrypt, RSA, and NTRUEncrypt modifications. …”
Get full text
Article -
325
Gaussian random fields as an abstract representation of patient metadata for multimodal medical image segmentation
Published 2025-05-01“…Our results show significant performance gains when training individual models using specific metadata categories, followed by average merging of prediction masks using distance transforms. All source code for this study is available at: https://github.com/mmu-dermatology-research/multimodal-grf…”
Get full text
Article -
326
MGFNet: An MLP-dominated gated fusion network for semantic segmentation of high-resolution multi-modal remote sensing images
Published 2024-12-01“…The experimental results demonstrate that MGFNet achieves higher evaluation metrics compared to other models, indicating its effectiveness in multi-modal feature fusion for segmentation. The source code and data are available at https://github.com/yeyuanxin110/YESeg-OPT-SAR.…”
Get full text
Article -
327
Identification of Arbitrary Length Shellcode for the Intel x64 Architecture as a NOP Sled
Published 2025-01-01“…We create an algorithm to calculate the differences between execution contexts, create an artifact to automatically process byte sequences to search for NOP sleds that satisfy our zero-difference policy, identify third-party NOP generators that did not produce NOP byte sequences that met this research’s standard and published the source code to an open-source repository.…”
Get full text
Article -
328
High-Level Synthesis of In-Circuit Assertions for Verification, Debugging, and Timing Analysis
Published 2011-01-01“…Furthermore, we generalize timing assertions to transparently provide hang detection that back annotates hang occurrences to source code. The presented techniques enable software developers to rapidly verify, debug, and analyze timing for FPGA applications, while reducing frequency by less than 3% and increasing FPGA resource utilization by 0.7% or less for several application case studies on the Altera Stratix-II EP2S180 and Stratix-III EP3SE260 using Impulse-C. …”
Get full text
Article -
329
Finite Mixture Models: A Key Tool for Reliability Analyses
Published 2025-05-01“…All improvements are included in the open-source <b>rebmix</b> R package, with complete source code provided to support the broader adoption of the R programming language in reliability analysis.…”
Get full text
Article -
330
InMAP: A model for air pollution interventions.
Published 2017-01-01“…InMAP can be trained to run for any spatial and temporal domain given the availability of appropriate simulation output from a comprehensive model. The InMAP model source code and input data are freely available online under an open-source license.…”
Get full text
Article -
331
PolSAR image classification using shallow to deep feature fusion network with complex valued attention
Published 2025-07-01“…However, the most remarkable performance of the CV-ASDF2Net model is observed with the Flevoland dataset; the model achieves an impressive OA of 96.01% with only a 1% sampling ratio. The source code is available at: https://github.com/mqalkhatib/CV-ASDF2Net…”
Get full text
Article -
332
HERGAI: an artificial intelligence tool for structure-based prediction of hERG inhibitors
Published 2025-07-01“…This model, named “HERGAI,” along with relevant input/output data and user-friendly source code, is available in our GitHub repository ( https://github.com/vktrannguyen/HERGAI ) and can be used to predict drug-induced hERG blockade, even on large data sets.…”
Get full text
Article -
333
Phish Fighter: Self Updating Machine Learning Shield Against Phishing Kits Based on HTML Code Analysis
Published 2025-01-01“…In addition, we successfully identified the phishing pages created by cloning the original source code of legitimate entities without requiring prior knowledge to distinguish such clones. …”
Get full text
Article -
334
A tool for CRISPR-Cas9 sgRNA evaluation based on computational models of gene expression
Published 2024-12-01“…EXPosition is available at http://www.cs.tau.ac.il/~tamirtul/EXPosition . The source code is available at https://github.com/shaicoh3n/EXPosition .…”
Get full text
Article -
335
Food Waste Detection in Canteen Plates Using YOLOv11
Published 2025-06-01“…Given these promising results and the provision of open-source code on a GitHub repository, the platform can be readily utilized by the research community and educational institutions to monitor FW in student meals and proactively implement reduction strategies.…”
Get full text
Article -
336
Method for Extracting Arterial Pulse Waveforms from Interferometric Signals
Published 2025-07-01“…A key novelty of this work is the presentation of a complete Python-based processing pipeline, which is made publicly available as open-source code on GitHub (git version 2.39.5). To the authors’ knowledge, no such repository for demodulating these specific interferometric signals to obtain a raw arterial pulse waveform previously existed. …”
Get full text
Article -
337
Approaches for Documentation in Continuous Software Development
Published 2022-10-01“…`Executable Knowledge' refers to any executable artifact except the source code. Primary artifacts include Test Driven Development methods and infrastructure-as-code, including continuous integration scripts. …”
Get full text
Article -
338
Enhancing Sustainable IoT Systems Through a Goal-Oriented Requirements Analysis Framework
Published 2025-05-01“…The methodology integrates goal-oriented requirements analysis language i* and model-driven development (MDD) through a three-stage transformation process involving the i* RA model, UML class diagrams, and Python source code generation. A case study demonstrates how GORA improves system reliability, performance, and sustainability. …”
Get full text
Article -
339
BoostPolyGlot: A Structured IR Generation-Based Fuzz Testing Framework for GCC Compiler Frontend
Published 2025-05-01“…The compiler serves as a bridge connecting hardware architecture and application software, converting source code into executable files and optimizing code. …”
Get full text
Article -
340
An adaptive authentication and authorization model for service-oriented enterprise computing
Published 2021-12-01“…The authentication and authorization security requirements are considered as cross-cutting concerns of SOA implementation and the solution is constructed as Aspect Oriented Programming (AOP) advices, which enables the solution can be attached as ‘plug & play’ component without changing the underlying source code of the service implementation. For Proof-of-Concept (PoC), the proposed authentication and authorization security model is tested in a large-scale service-oriented enterprise computing environment, and the results have been analyzed statistically. …”
Get full text
Article