Search alternatives:
"source code" » "sources code" (Expand Search)
Showing 321 - 340 results of 614 for search '"source code"', query time: 0.08s Refine Results
  1. 321

    IGN: Invariable gene set-based normalization for chromatin accessibility profile data analysis by Shengen Shawn Hu, Hai-Hui Xue, Chongzhi Zang

    Published 2025-01-01
    “…As the first chromatin accessibility normalization method that accounts for global differences, IGN can be widely applied to differential ATAC-seq and DNase-seq analysis. The package and source code are available on GitHub at https://github.com/zang-lab/IGN.…”
    Get full text
    Article
  2. 322

    Care home resident identification: A comparison of address matching methods with Natural Language Processing. by Víctor Suárez-Paniagua, Arlene Casey, Charis A Marwick, Jennifer K Burton, Helen Callaby, Isobel Guthrie, Bruce Guthrie, Beatrice Alex

    Published 2024-01-01
    “…The analysis used population data for 771,588 uniquely written addresses for 819,911 people in two NHS Scotland health board regions. The source code is publicly available at https://github.com/vsuarezpaniagua/NLPcarehome.…”
    Get full text
    Article
  3. 323

    Bipolar Morphological Neural Networks: Gate-Efficient Architecture for Computer Vision by Elena E. Limonova, Daniil M. Alfonso, Dmitry P. Nikolaev, Vladimir V. Arlazarov

    Published 2021-01-01
    “…We show that BM networks demonstrate accuracy that allows their practical use, with significantly higher performance in terms of a transistor budget for two (ASIC, FPGA) of the three architectures under consideration. The source code of the model and ResNet experiments are available at <uri>https://github.com/SmartEngines/bipolar-morphological-resnet</uri>.…”
    Get full text
    Article
  4. 324

    Comparative analysis of NTRUEncrypt modified post-quantum cryptographic system and standard RSA cryptosystem by P. V. Razumov, I. A. Smirnov, I. A. Pilipenko, A. V. Selyova, L. V. Cherkesova

    Published 2019-06-01
    “…A Stopwatch class element was introduced in the source code of all three programs of NTRUEncrypt, RSA, and NTRUEncrypt modifications. …”
    Get full text
    Article
  5. 325

    Gaussian random fields as an abstract representation of patient metadata for multimodal medical image segmentation by Bill Cassidy, Christian McBride, Connah Kendrick, Neil D. Reeves, Joseph M. Pappachan, Shaghayegh Raad, Moi Hoon Yap

    Published 2025-05-01
    “…Our results show significant performance gains when training individual models using specific metadata categories, followed by average merging of prediction masks using distance transforms. All source code for this study is available at: https://github.com/mmu-dermatology-research/multimodal-grf…”
    Get full text
    Article
  6. 326

    MGFNet: An MLP-dominated gated fusion network for semantic segmentation of high-resolution multi-modal remote sensing images by Kan Wei, JinKun Dai, Danfeng Hong, Yuanxin Ye

    Published 2024-12-01
    “…The experimental results demonstrate that MGFNet achieves higher evaluation metrics compared to other models, indicating its effectiveness in multi-modal feature fusion for segmentation. The source code and data are available at https://github.com/yeyuanxin110/YESeg-OPT-SAR.…”
    Get full text
    Article
  7. 327

    Identification of Arbitrary Length Shellcode for the Intel x64 Architecture as a NOP Sled by Austin Norby, Bhaskar P. Rimal, Bramwell Brizendine

    Published 2025-01-01
    “…We create an algorithm to calculate the differences between execution contexts, create an artifact to automatically process byte sequences to search for NOP sleds that satisfy our zero-difference policy, identify third-party NOP generators that did not produce NOP byte sequences that met this research&#x2019;s standard and published the source code to an open-source repository.…”
    Get full text
    Article
  8. 328

    High-Level Synthesis of In-Circuit Assertions for Verification, Debugging, and Timing Analysis by John Curreri, Greg Stitt, Alan D. George

    Published 2011-01-01
    “…Furthermore, we generalize timing assertions to transparently provide hang detection that back annotates hang occurrences to source code. The presented techniques enable software developers to rapidly verify, debug, and analyze timing for FPGA applications, while reducing frequency by less than 3% and increasing FPGA resource utilization by 0.7% or less for several application case studies on the Altera Stratix-II EP2S180 and Stratix-III EP3SE260 using Impulse-C. …”
    Get full text
    Article
  9. 329

    Finite Mixture Models: A Key Tool for Reliability Analyses by Marko Nagode, Simon Oman, Jernej Klemenc, Branislav Panić

    Published 2025-05-01
    “…All improvements are included in the open-source <b>rebmix</b> R package, with complete source code provided to support the broader adoption of the R programming language in reliability analysis.…”
    Get full text
    Article
  10. 330

    InMAP: A model for air pollution interventions. by Christopher W Tessum, Jason D Hill, Julian D Marshall

    Published 2017-01-01
    “…InMAP can be trained to run for any spatial and temporal domain given the availability of appropriate simulation output from a comprehensive model. The InMAP model source code and input data are freely available online under an open-source license.…”
    Get full text
    Article
  11. 331

    PolSAR image classification using shallow to deep feature fusion network with complex valued attention by Mohammed Q. Alkhatib, M. Sami Zitouni, Mina Al-Saad, Nour Aburaed, Hussain Al-Ahmad

    Published 2025-07-01
    “…However, the most remarkable performance of the CV-ASDF2Net model is observed with the Flevoland dataset; the model achieves an impressive OA of 96.01% with only a 1% sampling ratio. The source code is available at: https://github.com/mqalkhatib/CV-ASDF2Net…”
    Get full text
    Article
  12. 332

    HERGAI: an artificial intelligence tool for structure-based prediction of hERG inhibitors by Viet-Khoa Tran-Nguyen, Ulrick Fineddie Randriharimanamizara, Olivier Taboureau

    Published 2025-07-01
    “…This model, named “HERGAI,” along with relevant input/output data and user-friendly source code, is available in our GitHub repository ( https://github.com/vktrannguyen/HERGAI ) and can be used to predict drug-induced hERG blockade, even on large data sets.…”
    Get full text
    Article
  13. 333

    Phish Fighter: Self Updating Machine Learning Shield Against Phishing Kits Based on HTML Code Analysis by Gabriela Brezeanu, Alexandru Archip, Codrut-Georgian Artene

    Published 2025-01-01
    “…In addition, we successfully identified the phishing pages created by cloning the original source code of legitimate entities without requiring prior knowledge to distinguish such clones. …”
    Get full text
    Article
  14. 334

    A tool for CRISPR-Cas9 sgRNA evaluation based on computational models of gene expression by Shai Cohen, Shaked Bergman, Nicolas Lynn, Tamir Tuller

    Published 2024-12-01
    “…EXPosition is available at http://www.cs.tau.ac.il/~tamirtul/EXPosition . The source code is available at https://github.com/shaicoh3n/EXPosition .…”
    Get full text
    Article
  15. 335

    Food Waste Detection in Canteen Plates Using YOLOv11 by João Ferreira, Paulino Cerqueira, Jorge Ribeiro

    Published 2025-06-01
    “…Given these promising results and the provision of open-source code on a GitHub repository, the platform can be readily utilized by the research community and educational institutions to monitor FW in student meals and proactively implement reduction strategies.…”
    Get full text
    Article
  16. 336

    Method for Extracting Arterial Pulse Waveforms from Interferometric Signals by Marian Janek, Ivan Martincek, Gabriela Tarjanyiova

    Published 2025-07-01
    “…A key novelty of this work is the presentation of a complete Python-based processing pipeline, which is made publicly available as open-source code on GitHub (git version 2.39.5). To the authors’ knowledge, no such repository for demodulating these specific interferometric signals to obtain a raw arterial pulse waveform previously existed. …”
    Get full text
    Article
  17. 337

    Approaches for Documentation in Continuous Software Development by Theo Theunissen, Stijn Hoppenbrouwers, Sietse Overbeek

    Published 2022-10-01
    “…`Executable Knowledge' refers to any executable artifact except the source code. Primary artifacts include Test Driven Development methods and infrastructure-as-code, including continuous integration scripts. …”
    Get full text
    Article
  18. 338

    Enhancing Sustainable IoT Systems Through a Goal-Oriented Requirements Analysis Framework by José Alfonso Aguilar-Calderón, Carolina Tripp-Barba, Aníbal Zaldívar-Colado, Pedro Alfonso Aguilar-Calderón, Pablo Alfonso Aguilar-Calderón

    Published 2025-05-01
    “…The methodology integrates goal-oriented requirements analysis language i* and model-driven development (MDD) through a three-stage transformation process involving the i* RA model, UML class diagrams, and Python source code generation. A case study demonstrates how GORA improves system reliability, performance, and sustainability. …”
    Get full text
    Article
  19. 339

    BoostPolyGlot: A Structured IR Generation-Based Fuzz Testing Framework for GCC Compiler Frontend by Hui Liu, Hanbin Guo, Peng Liu, Tongding Hou

    Published 2025-05-01
    “…The compiler serves as a bridge connecting hardware architecture and application software, converting source code into executable files and optimizing code. …”
    Get full text
    Article
  20. 340

    An adaptive authentication and authorization model for service-oriented enterprise computing by Mohamed Ibrahim, Beer Mohamed, Mohd Fadzil Hassan

    Published 2021-12-01
    “…The authentication and authorization security requirements are considered as cross-cutting concerns of SOA implementation and the solution is constructed as Aspect Oriented Programming (AOP) advices, which enables the solution can be attached as ‘plug & play’ component without changing the underlying source code of the service implementation. For Proof-of-Concept (PoC), the proposed authentication and authorization security model is tested in a large-scale service-oriented enterprise computing environment, and the results have been analyzed statistically. …”
    Get full text
    Article