Showing 41 - 60 results of 2,209 for search 'Code training', query time: 0.11s Refine Results
  1. 41

    Code Generation for Collectible Card Games with Complex APIs by John Licato, Logan Fields, Brayden Hollis

    Published 2023-05-01
    “…Large pre-trained language models (LMs) such as GPT-3 Codex are able to generate code remarkably well given prompts of natural language text. …”
    Get full text
    Article
  2. 42

    Code summarization based on large model knowledge distillation by YOU Gang, LIU Wenjie, LI Meipeng, SUN Liqun, WANG Lian, TIAN Tieku

    Published 2025-08-01
    “…Code summarization is a short natural language description of source code. …”
    Get full text
    Article
  3. 43

    Program semantic analysis model for code reuse detection by GUO Xi, WANG Pan

    Published 2024-12-01
    “…During this process, the pre trained model was optimized and analyzed, and the parameters were tuned to enable similarity analysis of cross platform code. …”
    Get full text
    Article
  4. 44

    Challenges in using ChatGPT to code student's mistakes by Christoph Ableitinger, Christian Dorner

    Published 2025-08-01
    “…The research is motivated by the need to reduce the time-intensive nature of coding and grading and to explore AI's reliability in this context. …”
    Get full text
    Article
  5. 45

    Coding Patterns and Implications on Reimbursement in Foot & Ankle Surgery by Ryan G. Rogero MD, Benjamin J. Grear MD, Garnett A. Murphy MD, David R. Richardson MD, Carson M. Rider MD, Clayton C. Bettin MD

    Published 2024-12-01
    “…Surgeons were asked which Current Procedural Terminology (CPT) codes would be applied and if any Modifiers to these codes would be utilized. …”
    Get full text
    Article
  6. 46

    Algorithms of training programs for simulator training of ship's engine room personnel by Vlasov A. B.

    Published 2024-12-01
    “…In the course of simulator practice, the opportunity to develop competencies for working with high-voltage equipment (3–10 kV) of modern ships in accordance with the requirements of the STCW Convention and the STCW Code is of particular importance. Algorithms for training in high-voltage equipment maintenance should be introduced into the educational process to improve the level of qualification of specialists.…”
    Get full text
    Article
  7. 47

    DOCUMENTARY PROTECTION OF INTERACTION OF EMPLOYERS, UNIVERSITIES AND AUTHORITIES WHILE TRAINING THE GRADUATES IN THE FIELD OF SOCIO-CULTURAL ACTIVITIES by Lyudmila I. Lazareva

    Published 2016-04-01
    “…The aim of the investigation is to give reason for compliance and conjugation of professional standards, Federal state educational standards of higher education and all-Russian classifiers united system of classification and coding the technical, economic and social information related to socio-cultural activities. …”
    Get full text
    Article
  8. 48

    The efficacy and safety of the training process in sumo through autogenic training for professional wrestlers by Yuliya Holenkova, Leonid Vostroknutov, Pavol Bartik

    Published 2024-06-01
    “…The study is aimed at analyzing the effectiveness of autogenic training in the educational and training process among experienced sumo wrestlers. …”
    Get full text
    Article
  9. 49

    Digit recognition using decimal coding and artificial neural network by Toufik Datsi, Khalid Aznag, Ahmed El Oirrak

    Published 2021-12-01
    “…The method presented in this research consists to extract the characteristics of digit image by coding each row of the image by a decimal value, i.e. passage of the binary representation into a decimal value, this method called decimal coding of rows. …”
    Get full text
    Article
  10. 50

    INFLUENCE OF CODE OF POINT CHANGE ON INDIVIDUAL RHYTHMIC GYMNASTICS PERFORMANCE by Rebecca M. Freire-Maceiras, Elena Sierra- Palmeiro, María A Fernández-Villarino

    Published 2025-06-01
    “…With the current code, the contribution of all performance components is more balanced. …”
    Get full text
    Article
  11. 51

    Information-theoretical analysis of the neural code for decoupled face representation. by Miguel Ibáñez-Berganza, Carlo Lucibello, Luca Mariani, Giovanni Pezzulo

    Published 2024-01-01
    “…The advantage of decoupled coding over eigenface coding increases with image resolution and is especially prominent when coding variants of training set images that only differ in facial expressions. …”
    Get full text
    Article
  12. 52
  13. 53

    Code generation system based on MDA and convolutional neural networks by Gabriel Vargas-Monroy, Daissi-Bibiana Gonzalez-Roldan, Carlos Enrique Montenegro-Marín, Alejandro-Paolo Daza-Corredor, Daniel-David Leal-Lara, Daniel-David Leal-Lara

    Published 2025-03-01
    “…The implementation of image recognition, text analysis, and neural network construction yields promising outcomes in generating source code from diagrams. Despite some challenges related to hardware limitations during the training of the neural network, the system successfully interprets the diagrams and produces artifacts using the MDA approach. …”
    Get full text
    Article
  14. 54

    Machine learning message-passing for the scalable decoding of QLDPC codes by Arshpreet Singh Maan, Alexandru Paler

    Published 2025-05-01
    “…Without using any post-processing, Astra achieves higher thresholds and better Logical Error Rates (LER) compared to BPOSD, both for surface codes trained up to distance 11 and Bivariate Bicycle (BB) codes trained up to distance 18. …”
    Get full text
    Article
  15. 55

    Code vulnerability detection method based on graph neural network by Hao CHEN, Ping YI

    Published 2021-06-01
    “…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
    Get full text
    Article
  16. 56

    An Approach Based on Sum Product Networks for Code Smells Detection by Mostefai Abdelkader

    Published 2025-06-01
    “…The main objective of this paper is to study the performance of a Sum-Product Network as a classifier for code smell detection. To fulfill this objective, the paper proposes an approach that utilizes a classifier based on an SPN trained on data from previous projects, to identify code smells in new source code. …”
    Get full text
    Article
  17. 57

    Image Super Resolution Using Fractal Coding and Residual Network by Zhen Hua, Haicheng Zhang, Jinjiang Li

    Published 2019-01-01
    “…Fractal coding techniques are an effective tool for describing image textures. …”
    Get full text
    Article
  18. 58

    Coded speech enhancement using auxiliary utterance-level information by Haixin Zhao, Nilesh Madhu

    Published 2025-07-01
    “…The DLM model even achieves comparable performance to bitrate-specific trained (BST) models. We further extend the proposed information incorporation method, DLM, to a generalised scenario, tandem coding. …”
    Get full text
    Article
  19. 59
  20. 60