Search alternatives:
"source code" » "sources code" (Expand Search)
Showing 341 - 360 results of 614 for search '"source code"', query time: 0.07s Refine Results
  1. 341

    A Procedure for Extending Input Selection Algorithms to Low Quality Data in Modelling Problems with Application to the Automatic Grading of Uploaded Assignments by José Otero, Ana Palacios, Rosario Suárez, Luis Junco, Inés Couso, Luciano Sánchez

    Published 2014-01-01
    “…In this study, 800 source code files, collected and revised by the authors in classroom Computer Science lectures taught between 2013 and 2014, are analyzed with the proposed technique, and the most relevant metrics for the automatic grading task are discussed.…”
    Get full text
    Article
  2. 342

    DOOSRA—Distributed Object‐Oriented Software Restructuring Approach using DIM‐K‐means and MAD‐based ENRNN classifier by G. Sudhakar, S. Nithiyanandam

    Published 2023-02-01
    “…Five steps are undertaken by the developed framework. Centred on source code along with change history, the interactions amongst the classes are initially pre‐processed where the dependencies of disparate classes are detected and formulated into a graphical structure. …”
    Get full text
    Article
  3. 343

    Desktop Software for Patch-Clamp Raw Binary Data Conversion and Preprocessing by Ning Zhang, Yutao Tian, Lei Zhang, Zhuo Yang, Tao Zhang, Jishou Ruan

    Published 2011-01-01
    “…The compiled software along with the source code of the clsPulseData class module is freely available to academic and nonprofit users.…”
    Get full text
    Article
  4. 344

    Phenopacket-tools: Building and validating GA4GH Phenopackets. by Daniel Danis, Julius O B Jacobsen, Alex H Wagner, Tudor Groza, Martha A Beckwith, Lauren Rekerle, Leigh C Carmody, Justin Reese, Harshad Hegde, Markus S Ladewig, Berthold Seitz, Monica Munoz-Torres, Nomi L Harris, Jordi Rambla, Michael Baudis, Christopher J Mungall, Melissa A Haendel, Peter N Robinson

    Published 2023-01-01
    “…We demonstrate how to create, convert, and validate phenopackets using the library or the command-line application. Source code, API documentation, comprehensive user guide and a tutorial can be found at https://github.com/phenopackets/phenopacket-tools. …”
    Get full text
    Article
  5. 345

    Chaste: an open source C++ library for computational physiology and biology. by Gary R Mirams, Christopher J Arthurs, Miguel O Bernabeu, Rafel Bordas, Jonathan Cooper, Alberto Corrias, Yohan Davit, Sara-Jane Dunn, Alexander G Fletcher, Daniel G Harvey, Megan E Marsh, James M Osborne, Pras Pathmanathan, Joe Pitt-Francis, James Southern, Nejib Zemzemi, David J Gavaghan

    Published 2013-01-01
    “…We highlight some scientific studies that have used or are using Chaste, and the insights they have provided. The source code, both for specific releases and the development version, is available to download under an open source Berkeley Software Distribution (BSD) licence at http://www.cs.ox.ac.uk/chaste, together with details of a mailing list and links to documentation and tutorials.…”
    Get full text
    Article
  6. 346

    SGTCDA: Prediction of circRNA-drug sensitivity associations with interpretable graph transformers and effective assessment by Hongwei Xia, Caiyue Dong, Xinxing Chen, Zhuoyu Wei, Lichuan Gu, Xiaolei Zhu

    Published 2024-11-01
    “…Moreover, we leveraged EdgeSHAPer to explain the performance of the proposed SGTCDA model, which illustrates that the edges between drugs are more important than other edges for the performance of the model. The source code and dataset of SGTCDA are available at: https://github.com/hwxia/SGTCDA .…”
    Get full text
    Article
  7. 347

    MicroEcoTools: An R package for comprehensive theoretical microbial ecology analysis by Soheil A. Neshat, Ezequiel Santillan, Stefan Wuertz

    Published 2025-07-01
    “…This R package, along with its source code, can be freely accessed on GitHub at https://www.github.com/Soheil‐A‐Neshat/MicroEcoTools.…”
    Get full text
    Article
  8. 348

    Methods for analyzing the impact of software changes on objective functions and safety functions by A. А. Legkodumov, B. N. Kozeyev, V. V. Belikov, A. V. Korolkov

    Published 2024-04-01
    “…In addition to searching for vulnerable code sections, it is important to evaluate the effectiveness of the control flow comparison method in the analysis of source code when transferred to another code base.…”
    Get full text
    Article
  9. 349

    Comparing 545 Million Years of Sea-Level Change: New Insights from the TopoChronia QGIS Plugin by F. Franziskakis, C. Vérard, S. Castelltort, G. Giuliani

    Published 2025-07-01
    “…To address this, we have entirely rewritten and enhanced the source code into a QGIS plugin named <code>TopoChronia</code>. …”
    Get full text
    Article
  10. 350

    Enhancing Biomedical Semantic Annotations through a Knowledge Graph-Based Approach by Asim Abbas, Mutahira Khalid, Sebastian Chalarca, Fazel Keshtkar, Syed Ahmad Chan Bukhari

    Published 2023-05-01
    “…Our results showed an acceptable level of accuracy at approximately 90%. The source code for "Semantically" is freely available at: https://github.com/bukharilab/Semantically…”
    Get full text
    Article
  11. 351

    A benchmark study of compression software for human short-read sequence data by Raphael O. Betschart, Felix Thalén, Stefan Blankenberg, Martin Zoche, Tanja Zeller, Andreas Ziegler

    Published 2025-05-01
    “…Although Genozip requires an annual license, its source code is freely available, ensuring sustainability. …”
    Get full text
    Article
  12. 352

    NetraAadhaar: A Deep Learning-Driven Aadhaar Verification Platform for the Aid of Visually Impaired by Aditya Patil, Tauseef Khan, Ayatullah Faruk Mollah

    Published 2025-01-01
    “…NetraAadhaar empowers visually impaired users to verify their Aadhaar cards independently, reducing reliance on others and mitigating risks of identity fraud. The source code, dataset and developed application are publicly available for academic and research purposes at <uri>https://github.com/Adinp1213/NetraAadhar</uri>.…”
    Get full text
    Article
  13. 353

    A competitive-collaborative nonnegative representation method and its application for face recognition in smart campus by Tingting Guo, Ziqi Li, Jun Sun, Yonghong Zhang, Qingfeng Xia, Ke Ren

    Published 2025-07-01
    “…Extensive comparative experiments conducted on publicly available face datasets validate the effectiveness of the proposed model, consistently demonstrating its competitive performance. Habitually, the source code will be made available on the author’s profile page at https://github.com/li-zi-qi/CCNR .…”
    Get full text
    Article
  14. 354

    ‘gitana’ (phyloGenetic Imaging Tool for Adjusting Nodes and other Arrangements), a tool for plotting phylogenetic trees into ready-to-publish figures by Cristina Galisteo, Rafael R. de la Haba

    Published 2025-06-01
    “…The users’ manual and source code are freely available at https://github.com/cristinagalisteo/gitana .…”
    Get full text
    Article
  15. 355

    A multi-domain dual-stream network for hyperspectral unmixing by Jiwei Hu, Tianhao Wang, Qiwen Jin, Chengli Peng, Quan Liu

    Published 2024-12-01
    “…Experimental results and ablation studies conducted on Synthetic and real datasets (Samson, Japser, Urban) outperform state-of-the-art techniques by more than 10% in terms of root mean squared error and spectral angle distance, illustrating the effectiveness and superiority of our proposed method. The source code is available at https://github.com/qiwenjjin/JAG-MdsNet.…”
    Get full text
    Article
  16. 356

    Lightweight DDoS Attack Detection Using Bayesian Space-Time Correlation by Gabriel Mendonca, Rosa M. M. Leao, Edmundo De Souza E. Silva, Don Towsley

    Published 2025-01-01
    “…We collect data on DDoS attacks by generating real attack traffic from the homes of a selected group of volunteers, utilizing authentic malware source code. In that experiment, conducted using the residences of volunteers and over one month, our system detected 99.1% of all DDoS attacks launched, with no false alarms.…”
    Get full text
    Article
  17. 357

    A Graph-Based Learning Framework for Compiler Loop Auto-Vectorization by Yao Xiao, Nesreen K. Ahmed, Mihai Capotă, Guixiang Ma, Theodore L. Willke, Shahin Nazarian, Paul Bogdan

    Published 2025-01-01
    “…Modern compilers use vectorization techniques to exploit the SIMD capability, by detecting data parallelism in scalar source code and transforming a group of scalar instructions into vector-based instructions. …”
    Get full text
    Article
  18. 358

    Class-balanced negative training sets for improving classifier model predictions of enhancer-promoter interactions by Osamu Maruyama, Tsukasa Koga

    Published 2025-06-01
    “…Further advanced methods in generating negative EPIs should further improve prediction accuracy. The source code is available at https://github.com/maruyama-lab-design/CBOEP2 .…”
    Get full text
    Article
  19. 359

    WDFS-DETR: A Transformer-based framework with multi-scale attention for small object detection in UAV Engineering Tasks by Jinjiang Liu, Yonghua Xie

    Published 2025-09-01
    “…The model also generalizes well to UAVDT and DOTA datasets, demonstrating its applicability to real-world UAV-based detection tasks in complex engineering settings. Source code is available at: https://github.com/liuliuliu2002/WDFS-DETR.…”
    Get full text
    Article
  20. 360

    CODE CLONE DETECTION WITH SELF-SUPERVISION ON DUAL GRAPHS by Chunguang Li, Adisorn Sirikham, Jessada Konpang, Yan Wang

    Published 2024-12-01
    “…These findings demonstrate that integrating complementary graph views affords a label-efficient and practically viable route to uncovering subtle semantic similarities in source code. …”
    Get full text
    Article