-
521
Identification and Classification of Prescription Errors at a Tertiary Hospital in Southeast Nigeria
Published 2025-04-01Get full text
Article -
522
Tourism Potential Zone Mapping Using MCDM and Machine Learning Models in The State of Madhya Pradesh India
Published 2025-05-01Get full text
Article -
523
-
524
Role of RELAP/SCDAPSIM in Nuclear Safety
Published 2010-01-01“…The RELAP/SCDAPSIM code, designed to predict the behaviour of reactor systems during normal and accident conditions, is being developed as part of the international SCDAP Development and Training Program (SDTP). …”
Get full text
Article -
525
Micro-learning and Mindtools in Mobile-Learning (M-Learning): effects on knowledge and self-efficacy in laparoscopy education for surgical nursing students
Published 2025-02-01“…In conclusion, this M-learning application tool in clinical training planning is proposed as a support tool to improve students’ capabilities in clinical training programs. …”
Get full text
Article -
526
NeuralMie (v1.0): an aerosol optics emulator
Published 2025-03-01“…TAMie achieves speed and accuracy comparable to established Fortran Mie codes and is used to produce training data for NeuralMie. …”
Get full text
Article -
527
TelecomGPT: A Framework to Build Telecom-Specific Large Language Models
Published 2025-01-01“…These datasets are leveraged for continual pre-training, instruction tuning, and alignment tuning, respectively. …”
Get full text
Article -
528
Threat analysis and defense methods of deep-learning-based data theft in data sandbox mode
Published 2021-11-01“…The threat model of deep-learning-based data theft in data sandbox model was analyzed in detail, and the degree of damage and distinguishing characteristics of this attack were quantitatively evaluated both in the data processing stage and the model training stage.Aiming at the attack in the data processing stage, a data leakage prevention method based on model pruning was proposed to reduce the amount of data leakage while ensuring the availability of the original model.Aiming at the attack in model training stage, an attack detection method based on model parameter analysis was proposed to intercept malicious models and prevent data leakage.These two methods do not need to modify or encrypt data, and do not need to manually analyze the training code of deep learning model, so they can be better applied to data theft defense in data sandbox mode.Experimental evaluation shows that the defense method based on model pruning can reduce 73% of data leakage, and the detection method based on model parameter analysis can effectively identify more than 95% of attacks.…”
Get full text
Article -
529
Interdisciplinary Distance Learning Workshop for IT Students
Published 2021-05-01“…An approach to organizing automatic checking by testing the program code developed by a student in the process of solving an educational problem is presented, and an extension of this approach is proposed for organizing automatic checking in cases where the solution is not the program code, but, for example, a diagram, model or text document designed in accordance with the regulated rules. …”
Get full text
Article -
530
Foreign Experience in the Legal Regulation of Corporate Ethics: Lessons for Ukraine (Using the Example of the U.S. Federal Bureau of Investigation)
Published 2025-07-01“…It is established that the norms governing corporate ethics at the FBI are set out in the Federal Bureau of Investigation Act and its internal code of conduct. The formation of corporate culture is shown to begin as early as training at the FBI Academy. …”
Get full text
Article -
531
Perceptions of ICU Care Following Do-Not-Resuscitate Orders: A Military Perspective
Published 2020-07-01“…Those with do-not-resuscitate training were more likely to believe that standards of care continued to be met after code status change.…”
Get full text
Article -
532
Smart contract vulnerability detection method based on Bi-modal cross-attention mechanism
Published 2025-06-01“…A specific attention mechanism was designed that simultaneously analyzed both contract source code and bytecode, achieving bidirectional mapping and complementary enhancement between high-level semantic features in source code and low-level execution flows in bytecode, thereby enriching feature representation. …”
Get full text
Article -
533
Software Defect Prediction Based on Effective Fusion of Multiple Features
Published 2025-01-01“…Therefore, this paper proposes a software defect prediction model based on the effective fusion of multiple features, named DP-SSCT (Semantics, Source Code, and Tradition). The model integrates traditional features, source code features, and semantic features. …”
Get full text
Article -
534
Representation of few-group homogenized cross section by multi-variate polynomial regression
Published 2024-01-01“…The regression model [3, 4] allow to input a significantly larger number of points for training compared to the number of monomials, thus yielding higher accuracy than polynomial interpolation without being affected by the choice of points in the training set. …”
Get full text
Article -
535
Integrating Generative Artificial Intelligence and Problem-Based Learning into the Digitization in Construction Curriculum
Published 2024-11-01“…The effective interaction with LLMs not only facilitated code generation, which would otherwise be complex without additional formal training, but also provided a platform for strengthening basic project management skills, such as departmentalization, work breakdown structuring, modularization, activity delegation, and defining key performance indicators. …”
Get full text
Article -
536
Teaching Phonics and Vocabulary Through Children’s Literature in Early Childhood Initial Teacher Education: Trial of the Non-Scripted Intentional Teaching (N-SIT) Tool
Published 2025-05-01“…Survey data gathered participants’ code-related literacy knowledge before and after the N-SIT training. …”
Get full text
Article -
537
PREDICTION OF UNIT VALUE INDEX OF EXPORTS OF SITC 897 JEWELRY AND PRECIOUS GOODS GROUP IN INDONESIA
Published 2024-10-01“…This study aims to evaluate the effectiveness of various methods in improving prediction accuracy for the unit value index of the SITC code 897 in Indonesia. The research data used is secondary data including monthly export unit value index data with SITC code 897 in Indonesia obtained from the Central Bureau of Statistics. …”
Get full text
Article -
538
Development and validation of a risk scoring system to identify patients with lupus nephritis in electronic health record data
Published 2024-05-01“…We investigated the current performance of International Classification of Diseases (ICD) codes, 9th and 10th editions (ICD9/10), for identifying prevalent LN, and developed scoring systems to increase identification of LN that are adaptable to settings with and without LN ICD codes.Methods Training and test sets derived from EHR data from a large health system. …”
Get full text
Article -
539
An Investigation of Knee Injury Prevalence and its Mechanism among Premier League Soccer Referees in Iran
Published 2017-03-01Get full text
Article -
540
Intensive Care Unit Rotations and Predictors of Career Choice in Pulmonary/Critical Care Medicine: A Survey of Internal Medicine Residency Directors
Published 2018-01-01“…Factors predictive of residencies with a higher percentage of graduates pursuing training in PCCM included larger ICUs (>20 beds), residents serving as code leaders, and greater proportion of graduates pursuing specialization. …”
Get full text
Article