Showing 181 - 200 results of 614 for search '"sources code"', query time: 0.06s Refine Results
  1. 181

    From spots to cells: Cell segmentation in spatial transcriptomics with BOMS. by Ocima Kamboj, Jeongbin Park, Oliver Stegle, Fred A Hamprecht

    Published 2025-01-01
    “…We evaluate the performance of BOMS across various publicly available datasets and demonstrate that it achieves comparable results to the best existing method while being simple to implement and significantly faster in execution. Open-source code is available at https://github.com/sciai-lab/boms.…”
    Get full text
    Article
  2. 182

    A tutorial review of policy iteration methods in reinforcement learning for nonlinear optimal control by Yujia Wang, Xinji Zhu, Zhe Wu

    Published 2025-06-01
    “…To demonstrate the effectiveness of these approaches, a simulation example of a chemical reactor is presented, with open-source code made available on GitHub. The review concludes with a discussion of open research questions and future directions in RL-based control of nonlinear systems.…”
    Get full text
    Article
  3. 183

    A GCC-based checker for compliance with MISRA-C's single-translation-unit rules by Chih-Yuan Chen, Yung-An Fang, Guan-Ren Wang, Peng-Sheng Chen

    Published 2023-12-01
    “…It can also obtain more accurate and more complete results than Cppcheck, a popular open-source checker. The source code can be downloaded from https://github.com/CCU-HPCLAB/GCC-MISRAC-Checker.…”
    Get full text
    Article
  4. 184

    Automated and Efficient Sampling of Chemical Reaction Space by Minhyeok Lee, Umit V. Ucak, Jinyoung Jeong, Islambek Ashyrmamatov, Juyong Lee, Eunji Sim

    Published 2025-03-01
    “…This approach yields datasets with rich structural and chemical diversity, essential for robust MLIP development. Open‐source code is provided for the entire workflow, facilitating the integration of the approach into existing MLIP development pipelines.…”
    Get full text
    Article
  5. 185

    Assessing Evolution of Microservices Using Static Analysis by Amr S. Abdelfattah, Tomas Cerny, Jorge Yero Salazar, Xiaozhou Li, Davide Taibi, Eunjee Song

    Published 2024-11-01
    “…It focuses on two holistic viewpoints of inter-service interaction and data perspectives derived through static analysis of the system’s source code. The approach is demonstrated with a case study using established microservice system benchmarks.…”
    Get full text
    Article
  6. 186

    Searching for Similar Subgraphs in an Unweighted Undirected Graph by Computing Isomorphic Path Sets by Valentin Sysoev, Aleksandr Bykov

    Published 2024-03-01
    “…Graphs are highly successful models for both visualization and handling complex relationships, such as those represented in semantic networks or even source code of programs. One of the most important tasks in analyzing such data models is the problem of finding similar subgraphs. …”
    Get full text
    Article
  7. 187

    Light scalars within the CP $$ \mathcal{CP} $$ -conserving Aligned-two-Higgs-doublet model by Antonio M. Coutinho, Anirban Karan, Víctor Miralles, Antonio Pich

    Published 2025-02-01
    “…Depending on which new scalar (scalars) is (are) light, seven different scenarios may be considered. Using the open-source code HEPfit, which relies on Bayesian statistics, we perform global fits for all seven light-mass scenarios. …”
    Get full text
    Article
  8. 188

    Using a Bounded Model Checker for Test Generation: How to Kill Two Birds with One SMT-solver by Maxim Petrov, Kirill Gagarski, Mikhail Belyaev, Vladimir Itsykson

    Published 2014-12-01
    “…This process is very similar to the bounded model checking, which also has to deal with generating models from a source code, asserting logic properties in it and process the returned model. …”
    Get full text
    Article
  9. 189

    Benchmark problems for physics-informed neural networks: The Allen–Cahn equation by Hyun Geun Lee, Youngjin Hwang, Yunjae Nam, Sangkwon Kim, Junseok Kim

    Published 2025-03-01
    “…This property makes the AC equation a powerful mathematical model for capturing the dynamics of interface motion and phase separation processes in various physical and biological systems. The benchmark source codes for the 1D, 2D, and 3D AC equations are provided for interested researchers.…”
    Get full text
    Article
  10. 190

    Large Eddy Simulation of a Bluff Body Stabilized Lean Premixed Flame by A. Andreini, C. Bianchini, A. Innocenti

    Published 2014-01-01
    “…In order to expand the overview on different methods simulations were performed with both commercial and open-source codes switching from quasi-2D to fully 3D computations.…”
    Get full text
    Article
  11. 191

    Deep Learning-Based Travel Time Estimation in Hiking with Consideration of Individual Walking Ability by Asako Mizuho, Tahara Yasuyuki, Ohsuga Akihiko, Sei Yuichi

    Published 2024-12-01
    “…Furthermore, HikingTTE demonstrated higher accuracy in predicting hiking arrival times than a deep learning model originally developed to estimate taxi arrival times. The source code of HikingTTE is available on github for future development of the travel time estimation task.…”
    Get full text
    Article
  12. 192

    EyeMMV toolbox: An eye movement post-analysis tool based on a two-step spatial dispersion threshold for fixation identification by Vassilios Krassanakis, Vassiliki Filippakopoulou, Byron Nakos

    Published 2014-02-01
    “…The EyeMMV software is developed using the scripting language of MATLAB and the source code is distributed through GitHub under the third version of GNU General Public License (link: https://github.com/krasvas/EyeMMV).…”
    Get full text
    Article
  13. 193

    DEGNN: A Deep Learning-Based Method for Unmanned Aerial Vehicle Software Security Analysis by Jiang Du, Qiang Wei, Yisen Wang, Xingyu Bai

    Published 2025-02-01
    “…The binary code similarity analysis method offers a way to analyze drone firmware lacking source code. This paper proposes DEGNN, a novel graph neural network for binary code similarity analysis. …”
    Get full text
    Article
  14. 194

    Comparison of normalization methods for Hi-C data by Hongqiang Lyu, Erhu Liu, Zhifang Wu

    Published 2020-02-01
    “…The differences between these methods are analyzed, some practical recommendations are given, and the results are summarized in a table to facilitate the choice of the six normalization methods. The source code for the implementation of these methods is available at https://github.com/lhqxinghun/bioinformatics/tree/master/Hi-C/NormCompare…”
    Get full text
    Article
  15. 195

    A lightweight vulnerability detection method for long smart contracts based on bimodal feature fusion by Chen Yang Lin, Hui Zhao, Jing Han Liu

    Published 2025-04-01
    “…This method can combine the source code and opcode of smart contracts for analysis, and use a hierarchical attention network composed of bidirectional GRU and attention mechanism for vulnerability feature extraction. …”
    Get full text
    Article
  16. 196

    A Transdisciplinary Approach to Confrontation Between Self and Other: Factors Influencing the Emergence and Acceptance of Translational Language in Target Language by Mohammad Reza Rezaeian Delouei

    Published 2022-02-01
    “…A translated text emerges as a third code via the source code being confronted by the target code (i.e. the confrontation between Self and Other). …”
    Get full text
    Article
  17. 197

    PENGEMBANGAN APLIKASIKONVERSI MATA KULIAH MENGGUNAKAN FRAMEWORKCODEIGNITER DAN BOOTSTRAP (Studi Kasus : Sekolah Tinggi Ilmu Komunikasi Profesi Indonesia) by Abu Sopian

    Published 2018-09-01
    “…Based on the analysis of the system design above, it can be concluded that the Model View Controller (MVC) architecture can be applied to the codeigniter framework and MVC architecturemaking it easier to repair changes to the source code without changing the entire logic and fungtion properly and meet the objectives the beginning of the development of this subject conversion application.…”
    Get full text
    Article
  18. 198

    Plagiarism types and detection methods: a systematic survey of algorithms in text analysis by Altynbek Amirzhanov, Cemil Turan, Alfira Makhmutova

    Published 2025-03-01
    “…We highlight notable works focusing on cross-language plagiarism detection, source code plagiarism, and intrinsic detection techniques, identifying their contributions and limitations. …”
    Get full text
    Article
  19. 199

    AICOM-MP: an AI-based monkeypox detector for resource-constrained environments by Tianyi Yang, Tianze Yang, Andrew Liu, Na An, Shaoshan Liu, Xue Liu

    Published 2024-12-01
    “…We have hosted AICOM-MP as a web service to allow universal access to monkeypox screening technology, and open-sourced both the source code and the dataset of AICOM-MP to allow health AI professionals to integrate AICOM-MP into their services.…”
    Get full text
    Article
  20. 200

    Automated Code Comments Generation Using Large Language Models: Empirical Evaluation of T5 and BART by Dhan Prasad Ghale, Mohammad Dabbagh

    Published 2025-01-01
    “…Source code documentation plays a significant role in the software development lifecycle, substantially improving the comprehensibility and maintainability of software projects. …”
    Get full text
    Article