Showing 601 - 620 results of 2,209 for search 'Code training', query time: 0.10s Refine Results
  1. 601

    AzSLD: Azerbaijani sign language dataset for fingerspelling, word, and sentence translation with baseline softwareZenodo by Nigar Alishzade, Jamaladdin Hasanov

    Published 2025-02-01
    “…To facilitate efficient usage of the dataset, we provide technical instructions and source code for a data loader. Researchers and developers working on sign language recognition, translation, and synthesis systems will find AzSLD invaluable, as it offers a rich repository of labeled data for training and evaluation purposes.…”
    Get full text
    Article
  2. 602
  3. 603

    DualPose: Dual-Block Transformer Decoder with Contrastive Denoising for Multi-Person Pose Estimation by Matteo Fincato, Roberto Vezzani

    Published 2025-05-01
    “…DualPose achieves state-of-the-art results outperforming recent end-to-end methods, as shown by extensive experiments on the MS COCO and CrowdPose datasets. The code and pretrained models are publicly available.…”
    Get full text
    Article
  4. 604

    A Diagnosis Framework for High-reliability Equipment with Small Sample Based on Transfer Learning by Jinxin Pan, Bo Jing, Xiaoxuan Jiao, Shenglong Wang, Qingyi Zhang

    Published 2022-01-01
    “…The results of feature visualization further demonstrate that the features are more distinguished through the proposed method. All code and data are accessible on my GitHub.…”
    Get full text
    Article
  5. 605
  6. 606

    Comprendre et intervenir : les connaissances des entraîneurs experts en gymnastique by Cathy Rolland, Marc Cizeron

    Published 2011-10-01
    “…The study specifically focused on work activity of high-level coaches in gymnastics who must comply with an exacting code of technical, complex skills and their deployment in time and space. …”
    Get full text
    Article
  7. 607

    CrossModal Retrieval with Deep Learning by WANG Hongzhi, YAN Yu

    Published 2021-02-01
    “…This model realizes image feature extraction subnet, text feature extraction subnet and hash code learning subnet based on the powerful learning and representation ability of deep learning.The authors propose multilabel similarity measurement method and model training method based on the concepts of conditional entropy and crossentropy. …”
    Get full text
    Article
  8. 608

    Context-Informed Incremental Learning Improves Throughput and Reduces Drift in Regression-Based Myoelectric Control by Christian Morrell, Evan Campbell, Ethan Eddy, Erik Scheme

    Published 2025-01-01
    “…Source code is available on <uri>https://github.com/cbmorrell/adaptive-regression</uri>…”
    Get full text
    Article
  9. 609
  10. 610

    P-GELU: A Novel Activation Function to Optimize Whisper for Darija Speech Translation by Maria Labied, Abdessamad Belangour, Mouad Banane

    Published 2025-01-01
    “…Furthermore, P-GELU reduces training loss, improves feature retention, and enhances linguistic adaptability, making it a more effective alternative for speech translation tasks involving phonetic variability, code-switching, and limited training data. …”
    Get full text
    Article
  11. 611

    Novel education-based intervention to reduce inappropriate antibiotic prescribing for treatment of gonorrhoea in China: protocol for a cluster randomised controlled trial by Xiang-Sheng Chen, Ting-Ting Jiang, Yun-Qing Yang, Ning-Xiao Cao, Yue-Ping Yin

    Published 2020-07-01
    “…Outpatient physicians in dermatology (dermatovenerology), urology, andrology and gynaecology will be given access to the video via a quick response code. In hospitals allocated to the control arm, physicians will continue to participate in their standard of care training programme. …”
    Get full text
    Article
  12. 612

    Mobile malware detection method using improved GhostNetV2 with image enhancement technique by Yao Du, CaiXia Gao, Xi Chen, MengTian Cui, LiLi Xu, AoJi Ning

    Published 2025-07-01
    “…Subsequently, the Gabor method is employed to transform three-channel images into single-channel images, ensuring consistent detection accuracy for malicious code while reducing training and inference time. …”
    Get full text
    Article
  13. 613

    Effective multimodal hate speech detection on Facebook hate memes dataset using incremental PCA, SMOTE, and adversarial learning by Emmanuel Ludivin Tchuindjang Tchokote, Elie Fute Tagne

    Published 2025-06-01
    “…Link to the code and dataset below:https://github.com/ludivintchokote/HatePostDetection…”
    Get full text
    Article
  14. 614

    The Effectiveness of Large Language Models in Transforming Unstructured Text to Standardized Formats by William Brach, Kristian Kostal, Michal Ries

    Published 2025-01-01
    “…For further information, source code, and associated resources, please refer to the source code repository (<uri>https://github.com/fiit-ba/text-to-cooklang</uri>).…”
    Get full text
    Article
  15. 615

    DANC-Net: Dual-Attention and Negative Constraint Network for Point Cloud Classification by Hang Sun, Yuanyue Zhang, Jinmei Shi, Shuifa Sun, Guanqun Sheng, Yirong Wu

    Published 2022-01-01
    “…In addition, they only adopt ground-truth as positive information to guide the training of networks while ignoring negative information. …”
    Get full text
    Article
  16. 616

    NLP neural network copyright protection based on black box watermark by Long DAI, Jing ZHANG, Xuefeng FAN, Xiaoyi ZHOU

    Published 2023-02-01
    “…With the rapid development of natural language processing techniques, the use of language models in text classification and sentiment analysis has been increasing.However, language models are susceptible to piracy and redistribution by adversaries, posing a serious threat to the intellectual property of model owners.Therefore, researchers have been working on designing protection mechanisms to identify the copyright information of language models.However, existing watermarking of language models for text classification tasks cannot be associated with the owner’s identity, and they are not robust enough and cannot regenerate trigger sets.To solve these problems, a new model, namely black-box watermarking scheme for text classification tasks, was proposed.It was a scheme that can remotely and quickly verify model ownership.The copyright message and the key of the model owner were obtained through the Hash-based Message Authentication Code (HMAC), and the message digest obtained by HMAC can prevent forgery and had high security.A certain amount of text data was randomly selected from each category of the original training set and the digest was combined with the text data to construct the trigger set, then the watermark was embedded on the language model during the training process.To evaluate the performance of the proposed scheme, watermarks were embedded on three common language models on the IMDB’s movie reviews and CNews text classification datasets.The experimental results show that the accuracy of the proposed watermarking verification scheme can reach 100% without affecting the original model.Even under common attacks such as model fine-tuning and pruning, the proposed watermarking scheme shows strong robustness and resistance to forgery attacks.Meanwhile, the embedding of the watermark does not affect the convergence time of the model and has high embedding efficiency.…”
    Get full text
    Article
  17. 617

    Automated and Efficient Sampling of Chemical Reaction Space by Minhyeok Lee, Umit V. Ucak, Jinyoung Jeong, Islambek Ashyrmamatov, Juyong Lee, Eunji Sim

    Published 2025-03-01
    “…This approach yields datasets with rich structural and chemical diversity, essential for robust MLIP development. Open‐source code is provided for the entire workflow, facilitating the integration of the approach into existing MLIP development pipelines.…”
    Get full text
    Article
  18. 618

    Unpacking the digital competence challenge in vocational education: A case from Indonesia by Sherly Rahmawati, Sarah Prestridge, Ade Gafar Abdullah, Isma Widiaty

    Published 2025-01-01
    “…New insights into this field are provided which are instrumental for evaluating policies related to the development and training of teachers’ digital competence.…”
    Get full text
    Article
  19. 619
  20. 620

    Automating areas of interest analysis in mobile eye tracking experiments based on machine learning by Julian Wolf, Stephan Hess, David Bachmann, Quentin Lohmeyer, Mirko Meboldt

    Published 2018-12-01
    “…(Code and video examples have been made available at: https://gitlab.ethz.ch/pdz/cgom.git)…”
    Get full text
    Article