Showing 741 - 760 results of 2,209 for search 'Code training', query time: 0.13s Refine Results
  1. 741

    XFP-recognizer: detecting cross-file browser fingerprinting by Xiaoxi Wang, Zhenxu Liu, Chunyang Zheng, Xinyu Liu, Wei Liu, Yuling Liu, Qixu Liu

    Published 2025-07-01
    “…Research related to malicious code shows that cross-file techniques, which disperse code into multiple files, can resist current detection methods. …”
    Get full text
    Article
  2. 742

    LazyAct: Lazy actor with dynamic state skip based on constrained MDP. by Hongjie Zhang, Zhenyu Chen, Hourui Deng, Chaosheng Feng

    Published 2025-01-01
    “…Finally, we utilize pre-training and fine-tuning techniques to train the policy network. …”
    Get full text
    Article
  3. 743
  4. 744

    Small sample smart contract vulnerability detection method based on multi-layer feature fusion by Jinlin Fan, Yaqiong He, Huaiguang Wu

    Published 2025-03-01
    “…Furthermore, there is a special type of patched contract code that contains vulnerability features which need to be studied. …”
    Get full text
    Article
  5. 745

    Humatch - fast, gene-specific joint humanisation of antibody heavy and light chains by Lewis Chinery, Jeliazko R. Jeliazkov, Charlotte M. Deane

    Published 2024-12-01
    “…Humatch’s optimization toward specific genes and good VH/VL pairing increases the chances that final designs will be stable and express well and reduces the chances of immunogenic epitopes forming between the two chains. Humatch’s training data and source code are provided open-source.…”
    Get full text
    Article
  6. 746

    THE ROLE OF LOCAL ETHICS COMMITTEES: CHALLENGES AND PROSPECTS FOR PUBLIC HEALTH RESEARCH IN KAZAKHSTAN by Birzhan Seiil, Аinur Issakulova, Dana Bekaryssova

    Published 2025-03-01
    “…Historical aspects of ethical standard setting, beginning with the Nuremberg Code, and the role of self-experimentation in scientific research are also discussed. …”
    Get full text
    Article
  7. 747

    Alpha-DehazeNet: single image dehazing via RGBA haze modeling and adaptive learning by Jin He, Ruibin Li

    Published 2025-07-01
    “…On real-world datasets, Alpha-DehazeNet delivers competitive results, although it shows limitations in handling non-white fog and cloud conditions. The code is publicly available at: https://doi.org/10.5281/zenodo.15361810.…”
    Get full text
    Article
  8. 748

    Graph neural network-based drug-drug interaction prediction by Khushnood Abbas, Chen Hao, Xu Yong, Mohammad Kamrul Hasan, Shayla Islam, Abdul Hadi Abd Rahman

    Published 2025-08-01
    “…We have found that GCN with skip connections, GCN with NGNN and SAGE with NGNN give competent accuracy with other baseline models. The corresponding code and datasets used in this study are available on GitHub for reproducibility at: https://github.com/khushnood/DrugDruginteractionPredictionBasedOnGNN .…”
    Get full text
    Article
  9. 749

    A kinematic dataset of locomotion with gait and sit-to-stand movements of young adults by Simon Hanisch, Loreen Pogrzeba, Evelyn Muschter, Shu-Chen Li, Thorsten Strufe

    Published 2024-11-01
    “…Along with the raw kinematic data, we provide the source code for phase segmentation and the processed data, which has been segmented into a total of 4672 individual motion repetitions. …”
    Get full text
    Article
  10. 750

    Real time blood detection in CCTV surveillance using attention enhanced InceptionV3 by Adnan Khalil, Fakhre Alam, Dilawar Shah, Irshad khalil, Shujaat Ali, Muhammad Tahir

    Published 2025-08-01
    “…These results demonstrate the effectiveness in accurately identifying blood traces in real-world surveillance footage, offering a practical and scalable solution for enhancing public health and safety monitoring. All code and data are available at https://github.com/irshadkhalil23/bloodNet_model .…”
    Get full text
    Article
  11. 751

    A simple preprocessing approach for improving semantic segmentation in unsupervised domain adaptation by Shahaf Ettedgui, Shady Abu-Hussein, Raja Giryes

    Published 2025-07-01
    “…Our code and data are available at https://github.com/shahaf1313/ProCST .…”
    Get full text
    Article
  12. 752

    Evaluating gender bias in large language models in long-term care by Sam Rickman

    Published 2025-08-01
    “…The methods in this paper provide a practical framework for quantitative evaluation of gender bias in LLMs. The code is available on GitHub.…”
    Get full text
    Article
  13. 753
  14. 754
  15. 755

    Evaluating the Construction and Limitations of Opportunism Principle in Indonesian Judiciary by Ade Sathya Sanathana Ishwara

    Published 2023-12-01
    “…The study intricately analyzes legislative regulations through the lens of progressive law theory, incorporating primary legal materials such as the 1945 Constitution of the Republic of Indonesia, the Criminal Procedure Code, and the laws governing the Judiciary and the Prosecution Service. …”
    Get full text
    Article
  16. 756

    FLWD:A Webshell detection method based on federated learning by ZENG Qingpeng, CHAI Jiangli, WU Shuixiu

    Published 2025-06-01
    “…The method integrated the abstract syntax tree node value sequence features, code structure features, text obfuscation features, and cybersecurity expertise and experience features of Webshells. …”
    Get full text
    Article
  17. 757
  18. 758
  19. 759

    Facilitators and barriers to implementing and sustaining facility-based stillbirth reviews in India: a qualitative study by Yebeen Ysabelle Boo, Rupanjali Deka, Aliki Christou, Uchenna Gwacham-Anisiobi, Jenny Gong, Monica Lakhanpaul, Jennifer J. Kurinczuk, Manisha Nair

    Published 2025-08-01
    “…Regular training and mentoring should focus on building healthcare professionals’ capability in record-keeping and effective review practices. …”
    Get full text
    Article
  20. 760

    Assessment of the Quality of Basic and Expanded Resuscitative Measures in a Multifield Hospital (Simulation Course) by A. N. Kuzovlev, S. N. Abdusalamov, K. A. Kuz'michev

    Published 2017-01-01
    “…The analysis was performed using the ZOLL RescueNet Code Review® software. A statistical analysis was performed using the Statistica 7.0 software (MannWhitney Utest). …”
    Get full text
    Article