-
681
Ethical Use of Social Media and Sharing of Patient Information by Medical Students at a University Hospital in Saudi Arabia: Cross-Sectional Survey
Published 2025-03-01“…Approximately 66% of the participants reported that they were unaware if their institution had a professional code of conduct for SM use, and 259/371 (70%) did not receive training on the professional use of SM. …”
Get full text
Article -
682
Application of the European Court of Human Rights case law in the criminal proceedings in Ukraine
Published 2025-04-01“…The following prospects for improving the application of the European Court of Human Rights case law in criminal proceedings in Ukraine are identified: 1) the amendments to the Criminal Procedure Code of Ukraine to comply with European standards, in particular, with regard to the right to a fair trial, the presumption of innocence, protection against torture and unlawful detention, ill-treatment, etc.; 2) the development of recommendations to improve the training of judges, prosecutors, lawyers and pre-trial investigation bodies; 3) the strengthening of control over the observance of human rights, the reasonableness of the time limits during the pre-trial investigation, and fair and lawful trial; The following prospects for improving the application of the European Court of Human Rights case law in criminal proceedings in Ukraine are identified: 4) the improvement of procedures for verification, evaluation and examination of evidence in order to protect the defence from unlawful actions of the prosecution; 5) the introduction of mechanisms for the effective implementation of judgments of the European Court of Human Rights in individual cases; 6) the provision of adequate funding and resources to law enforcement and law enforcement agencies.…”
Get full text
Article -
683
Visual tracking by matching points using diffusion model
Published 2025-08-01“…The source code of the Stable-SAM2 is publicly available at: https://github.com/HamadYA/Stable-SAM2.…”
Get full text
Article -
684
Multi-view mixture-of-experts for predicting molecular properties using SMILES, SELFIES, and graph-based representations
Published 2025-01-01“…Chemical foundation models are generally based on a two-step approach-pre-training on unlabeled data followed by fine-tuning on specific tasks-to boost model capacity. …”
Get full text
Article -
685
The effectiveness of the pre-employment card program on increasing recipient productivity
Published 2022-09-01“…The data processing in this research uses the ATLAS application, which can help organize, code, and analyze research data more efficiently and structure. …”
Get full text
Article -
686
Optimizing Machine Learning Models with Data-level Approximate Computing: The Role of Diverse Sampling, Precision Scaling, Quantization and Feature Selection Strategies
Published 2024-12-01“…This study confirms the potential of approximate computing to optimize machine learning workflows, making it particularly suitable for applications with limited computational resources. The source code is publicly available online https://github.com/AyadMDalloo/DatalvlAxC.…”
Get full text
Article -
687
Correlation between self-concept and academic achievement of students
Published 2014-04-01Get full text
Article -
688
A practical evaluation of AutoML tools for binary, multiclass, and multilabel classification
Published 2025-05-01“…Our findings demonstrate that AutoSklearn excels in predictive performance for binary and multiclass settings, albeit at longer training times, while Lightwood and AutoKeras offer faster training at the cost of predictive performance on complex datasets. …”
Get full text
Article -
689
EEG-CLIP: learning EEG representations from natural language descriptions
Published 2025-08-01“…Deep networks for electroencephalogram (EEG) decoding are often only trained to solve one specific task, such as pathology or age decoding. …”
Get full text
Article -
690
Silkscreen: Direct Measurements of Galaxy Distances from Survey Image Cutouts
Published 2025-01-01“…We introduce Silkscreen : a code leveraging neural posterior estimation to infer the posterior distribution of parameters while simultaneously training a convolutional neural network such that inference is performed directly on the images. …”
Get full text
Article -
691
Analysis of Body Posture of Rice Processing Warehouse Workers Using OWAS Method (Ovako Working Analysis System)
Published 2025-01-01“…Data collection included systematic observation and analysis categorized by OWAS Action Codes. Immediate corrective actions, including ergonomic adjustments and improved training, are essential to mitigate these risks. …”
Get full text
Article -
692
Unsupervised anomaly detection for gearboxes based on the deep convolutional support generative adversarial network
Published 2025-07-01“…Next, these reconstruction errors are utilized to train one-class support vector machine (OCSVM). During the testing phase, reconstruction errors are similarly calculated for the test data, and after being normalized using the same process as the training data, the errors are input into the trained OCSVM model for anomaly detection. …”
Get full text
Article -
693
Domain Adaptation for Vehicle Detection Under Adverse Weather
Published 2025-01-01“…Code and datasets are available at <uri>https://github.com/daniel851218/all-weather-vehicle-detector</uri>.…”
Get full text
Article -
694
Leveraging Graph Networks to Model Environments in Reinforcement Learning
Published 2023-05-01“…We also explore our model’s applicability in Multi-Agent RL scenarios. Our code is available online at https://github.com/Derposoft/GNNsAsEnvs.…”
Get full text
Article -
695
Promoting Cyber Ethics Compliance among Teachers in Tanzania: What should be done?
Published 2024-11-01“…The findings indicated that teachers’ compliance with cyber ethics requires training of teachers on the pedagogical uses of technology, the inception of a specific national policy for the responsible use of technology in schools, integration of the cyber ethics aspects of the Teachers’ Code of Conduct, improvement of teachers’ living and working conditions, and promotion of teachers’ awareness of the Cyber Crimes Act of 2015, among others. …”
Get full text
Article -
696
AlBERTo: Modeling Italian Social Media Language with BERT
Published 2019-12-01“…The specifications of the model, the code developed for training and fine-tuning, and the instructions for using it in a research project are freely available.…”
Get full text
Article -
697
LtU-ILI: An All-in-One Framework for Implicit Inference in Astrophysics and Cosmology
Published 2024-07-01“…The pipeline includes software for implementing various neural architectures, training schema, priors, and density estimators in a manner easily adaptable to any research workflow. …”
Get full text
Article -
698
Enhanced object detection in low-visibility haze conditions with YOLOv9s.
Published 2025-01-01“…Our source code is available at: https://github.com/PaTinLei/EOD.…”
Get full text
Article -
699
Transformer model with external token memories and attention for PersonaChat
Published 2025-07-01“…The prevailing approach involves using large machine-learning models and extensive datasets for training to ensure that token information and the connections between them exist solely within the model structure. …”
Get full text
Article -
700
ESOMICS: ML-Based Timing Behavior Analysis for Efficient Mixed-Criticality System Design
Published 2024-01-01“…This article introduces ESOMICS, a novel scheme, to obtain appropriate WCET for LO modes, in which we propose an ML-based approach for WCET estimation based on the application’s source code analysis and the model training using a comprehensive data set. …”
Get full text
Article