Showing 521 - 540 results of 2,209 for search 'Code training', query time: 0.12s Refine Results
  1. 521
  2. 522
  3. 523
  4. 524

    Role of RELAP/SCDAPSIM in Nuclear Safety by C. M. Allison, J. K. Hohorst

    Published 2010-01-01
    “…The RELAP/SCDAPSIM code, designed to predict the behaviour of reactor systems during normal and accident conditions, is being developed as part of the international SCDAP Development and Training Program (SDTP). …”
    Get full text
    Article
  5. 525

    Micro-learning and Mindtools in Mobile-Learning (M-Learning): effects on knowledge and self-efficacy in laparoscopy education for surgical nursing students by Fatemeh Akbari HajiAbad, Fatemeh Keshmiri, Fatemeh Jabinian, Seyed Mostafa Shiryazdi

    Published 2025-02-01
    “…In conclusion, this M-learning application tool in clinical training planning is proposed as a support tool to improve students’ capabilities in clinical training programs. …”
    Get full text
    Article
  6. 526

    NeuralMie (v1.0): an aerosol optics emulator by A. Geiss, P.-L. Ma

    Published 2025-03-01
    “…TAMie achieves speed and accuracy comparable to established Fortran Mie codes and is used to produce training data for NeuralMie. …”
    Get full text
    Article
  7. 527

    TelecomGPT: A Framework to Build Telecom-Specific Large Language Models by Hang Zou, Qiyang Zhao, Yu Tian, Lina Bariah, Faouzi Bader, Thierry Lestable, Merouane Debbah

    Published 2025-01-01
    “…These datasets are leveraged for continual pre-training, instruction tuning, and alignment tuning, respectively. …”
    Get full text
    Article
  8. 528

    Threat analysis and defense methods of deep-learning-based data theft in data sandbox mode by Hezhong PAN, Peiyi HAN, Xiayu XIANG, Shaoming DUAN, Rongfei ZHUANG, Chuanyi LIU

    Published 2021-11-01
    “…The threat model of deep-learning-based data theft in data sandbox model was analyzed in detail, and the degree of damage and distinguishing characteristics of this attack were quantitatively evaluated both in the data processing stage and the model training stage.Aiming at the attack in the data processing stage, a data leakage prevention method based on model pruning was proposed to reduce the amount of data leakage while ensuring the availability of the original model.Aiming at the attack in model training stage, an attack detection method based on model parameter analysis was proposed to intercept malicious models and prevent data leakage.These two methods do not need to modify or encrypt data, and do not need to manually analyze the training code of deep learning model, so they can be better applied to data theft defense in data sandbox mode.Experimental evaluation shows that the defense method based on model pruning can reduce 73% of data leakage, and the detection method based on model parameter analysis can effectively identify more than 95% of attacks.…”
    Get full text
    Article
  9. 529

    Interdisciplinary Distance Learning Workshop for IT Students by I. A. Andrianov, S. A. Rzheutskaya, M. V. Kharina

    Published 2021-05-01
    “…An approach to organizing automatic checking by testing the program code developed by a student in the process of solving an educational problem is presented, and an extension of this approach is proposed for organizing automatic checking in cases where the solution is not the program code, but, for example, a diagram, model or text document designed in accordance with the regulated rules. …”
    Get full text
    Article
  10. 530

    Foreign Experience in the Legal Regulation of Corporate Ethics: Lessons for Ukraine (Using the Example of the U.S. Federal Bureau of Investigation) by Yu. V. Yakovenko

    Published 2025-07-01
    “…It is established that the norms governing corporate ethics at the FBI are set out in the Federal Bureau of Investigation Act and its internal code of conduct. The formation of corporate culture is shown to begin as early as training at the FBI Academy. …”
    Get full text
    Article
  11. 531

    Perceptions of ICU Care Following Do-Not-Resuscitate Orders: A Military Perspective by Sydney E. Dishman, BS, Kathryn E. Driggers, MD, Laura S. Johnson, MD, FACS, Cara H. Olsen, MS, DrPH, Andrea B. Ryan, RN, MSN, Melissa M. McLawhorn, RN, BSN, Kevin K. Chung, MD, FCCM

    Published 2020-07-01
    “…Those with do-not-resuscitate training were more likely to believe that standards of care continued to be met after code status change.…”
    Get full text
    Article
  12. 532

    Smart contract vulnerability detection method based on Bi-modal cross-attention mechanism by CHEN Jinfu, HU Xinyi, CAI Saihua, MIN Xirun

    Published 2025-06-01
    “…A specific attention mechanism was designed that simultaneously analyzed both contract source code and bytecode, achieving bidirectional mapping and complementary enhancement between high-level semantic features in source code and low-level execution flows in bytecode, thereby enriching feature representation. …”
    Get full text
    Article
  13. 533

    Software Defect Prediction Based on Effective Fusion of Multiple Features by Chaozheng Zhang, Junhua Wu

    Published 2025-01-01
    “…Therefore, this paper proposes a software defect prediction model based on the effective fusion of multiple features, named DP-SSCT (Semantics, Source Code, and Tradition). The model integrates traditional features, source code features, and semantic features. …”
    Get full text
    Article
  14. 534

    Representation of few-group homogenized cross section by multi-variate polynomial regression by Nguyen Dinh Quoc Dang, Masiello Emiliano

    Published 2024-01-01
    “…The regression model [3, 4] allow to input a significantly larger number of points for training compared to the number of monomials, thus yielding higher accuracy than polynomial interpolation without being affected by the choice of points in the training set. …”
    Get full text
    Article
  15. 535

    Integrating Generative Artificial Intelligence and Problem-Based Learning into the Digitization in Construction Curriculum by Reza Maalek

    Published 2024-11-01
    “…The effective interaction with LLMs not only facilitated code generation, which would otherwise be complex without additional formal training, but also provided a platform for strengthening basic project management skills, such as departmentalization, work breakdown structuring, modularization, activity delegation, and defining key performance indicators. …”
    Get full text
    Article
  16. 536
  17. 537

    PREDICTION OF UNIT VALUE INDEX OF EXPORTS OF SITC 897 JEWELRY AND PRECIOUS GOODS GROUP IN INDONESIA by Grace Lucyana Koesnadi, Bagas Shata Pratama, Dzuria Hilma Qurotu Ain, Elly Pusporani, M. Fariz Fadillah Mardianto

    Published 2024-10-01
    “…This study aims to evaluate the effectiveness of various methods in improving prediction accuracy for the unit value index of the SITC code 897 in Indonesia. The research data used is secondary data including monthly export unit value index data with SITC code 897 in Indonesia obtained from the Central Bureau of Statistics. …”
    Get full text
    Article
  18. 538

    Development and validation of a risk scoring system to identify patients with lupus nephritis in electronic health record data by Christine Anastasiou, Zara Izadi, Jinoos Yazdany, Gabriela Schmajuk, Milena Gianfrancesco

    Published 2024-05-01
    “…We investigated the current performance of International Classification of Diseases (ICD) codes, 9th and 10th editions (ICD9/10), for identifying prevalent LN, and developed scoring systems to increase identification of LN that are adaptable to settings with and without LN ICD codes.Methods Training and test sets derived from EHR data from a large health system. …”
    Get full text
    Article
  19. 539
  20. 540

    Intensive Care Unit Rotations and Predictors of Career Choice in Pulmonary/Critical Care Medicine: A Survey of Internal Medicine Residency Directors by Daniel J. Minter, Sean D. Levy, Sowmya R. Rao, Paul F. Currier

    Published 2018-01-01
    “…Factors predictive of residencies with a higher percentage of graduates pursuing training in PCCM included larger ICUs (>20 beds), residents serving as code leaders, and greater proportion of graduates pursuing specialization. …”
    Get full text
    Article