Showing 841 - 860 results of 2,209 for search 'Code training', query time: 0.12s Refine Results
  1. 841

    Abnormal event detection in surveillance videos through LSTM auto-encoding and local minima assistance by Erkan Sengonul, Refik Samet, Qasem Abu Al-Haija, Ali Alqahtani, Rayan A. Alsemmeari, Bandar Alghamdi, Badraddin Alturki, Abdulaziz A. Alsulami

    Published 2025-03-01
    “…For anomaly detection, we map video data to a lower-dimensional space (latent code) and compare it against the distribution of codes from normal sequences. …”
    Get full text
    Article
  2. 842

    Enhancing LLMs for Sequential Recommendation With Reversed User History and User Embeddings by Yeo Jun Choi, Woo-Seong Yun, Yoon-Sik Cho

    Published 2025-01-01
    “…Moreover, we leverage Curriculum Learning (CL) for effectively training, and provide insights into defining easy and hard tasks for LLMs within CL. …”
    Get full text
    Article
  3. 843

    A Novel Dataset for Polyp Segmentation and Detection Using a Vision-Language Model by Mahdiyeh Alilou, Javad Mozaffari, Abdollah Amirkhani, Shahriar B. Shokouhi, Alireza Khafaf

    Published 2025-01-01
    “…Results indicate that the proposed model performs better than state-of-the-art studies by 2.7% and 2.5%, respectively, in mDice and mIoU. The dataset and code are available at: <uri>https://github.com/javadmozaffari/PolypDataset</uri>.…”
    Get full text
    Article
  4. 844

    Vertically Recurrent Neural Networks for Sub‐Grid Parameterization by P. Ukkonen, M. Chantry

    Published 2025-06-01
    “…We find optimized, state‐of‐the‐art radiation code on CPU generally faster than RNN‐based emulators on GPU, although the latter can be more energy efficient. …”
    Get full text
    Article
  5. 845

    Possible Health Benefits and Risks of DeepFake Videos: A Qualitative Study in Nursing Students by Olga Navarro Martínez, David Fernández-García, Noemí Cuartero Monteagudo, Olga Forero-Rincón

    Published 2024-10-01
    “…The data were analyzed using ATLAS.ti (version 22), and the project was approved by the Ethics Committee (code UCV/2021–2022/116). Results: Data analysis identified 21 descriptive codes, classified into four main themes: advantages, disadvantages, health applications, and ethical dilemmas. …”
    Get full text
    Article
  6. 846
  7. 847

    WDFS-DETR: A Transformer-based framework with multi-scale attention for small object detection in UAV Engineering Tasks by Jinjiang Liu, Yonghua Xie

    Published 2025-09-01
    “…Second, the Dual-Stage Adaptive Normalization (DSAN) dynamically selects appropriate normalization strategies during training and inference to improve convergence and runtime performance. …”
    Get full text
    Article
  8. 848

    Optimizing ML models for cybercrime detection: balancing performance, energy consumption, and carbon footprint through multi-objective optimization by Romil Rawat

    Published 2025-04-01
    “…The study addresses the increasing energy consumption and carbon emissions due to the rapid adoption of AI technologies, especially during training and deployment. The methodology involves using NSGA-II for feature selection and evaluating energy consumption (Econ) and carbon footprint (CFP) with tools like CodeCarbon and EmissionsTracker. …”
    Get full text
    Article
  9. 849

    Facilitators and barriers to smoking cessation: a qualitative study among health professionals in Germany by Frederike Bokemeyer, Paulina Kiefer, Lea Schmidt, Kathleen Gali

    Published 2025-04-01
    “…A deductively developed categorization system was applied to identify sub-themes within categories and to systematically code the data. All data were thencategorized under two main categories: facilitators and barriers to smoking cessation. …”
    Get full text
    Article
  10. 850

    ByteBait USB: a robust simulation toolkit for badUSB phishing campaign by Wenhao Li, Selvakumar Manickam, Yung-Wey Chong, Yongqing He, Ho Yean Li, Binyong Li

    Published 2025-07-01
    “…These attacks are particularly dangerous as their malicious code resides in firmware, evading traditional antivirus solutions. …”
    Get full text
    Article
  11. 851

    General context and relevant public datasets available for improving pathways in Paediatric Cancer applying Artificial Intelligence. A review by Gustavo Hernández-Peñaloza, Silvia Uribe, Francisco Moreno García, Norbert Graf, Federico Álvarez

    Published 2024-12-01
    “…It includes the description of the most relevant techniques to address problems associated with data sharing and training. Finally, a set of code snippets is provided to perform exploratory analysis for the available data.…”
    Get full text
    Article
  12. 852

    A study of enhanced visual perception of marine biology images based on diffusion-GAN by Feifan Yao, Huiying Zhang, Yifei Gong, Qinghua Zhang, Pan Xiao

    Published 2025-03-01
    “…Therefore, the U-CCL and VGG16 can be applied as an innovative approach to enhance visual perception of underwater images. The experimental code with pre-trained models will be published shortly at https://github.com/yff0428/DPL-SG2/tree/main .…”
    Get full text
    Article
  13. 853

    Symbol Detection and Channel Estimation for Space Optical Communications Using Neural Network and Autoencoder by Abdelrahman Elfikky, Zouheir Rezki

    Published 2024-01-01
    “…Additionally, with no fading and for both perfect and imperfect CSI with different code rates and fading channels, the proposed AE-based detection outperforms both benchmark learning frameworks and most popular convolutional codes.…”
    Get full text
    Article
  14. 854
  15. 855

    Methods of the Verification of the Expert’s Opinion within Criminal Procedure of Ukraine by B. V. Shabarovskyi

    Published 2019-06-01
    “…The author has analyzed the Criminal Procedural Code of Ukraine, as well as the court practice. As the result of the study, the author has provided, for the first time, all methods of verifying the expert’s opinion available to an investigator, a prosecutor, a suspect, an accused (defendant), the person, who is the subject of compulsory measures of medical or educational character application, their defenders and legal representatives, a victim, his representative and legal representative, the civil plaintiff, his representative and legal representative, a civil defendant and his representative, a representative of the legal entity who is the subject of the proceedings. …”
    Get full text
    Article
  16. 856
  17. 857
  18. 858

    Protocol for predicting single- and multiple-dose-dependent gene expression using deep generative learning by Derek E. Bowman, Vishal Panda, Daniel Marri, Omar Kana, Sudin Bhattacharya

    Published 2025-09-01
    “…We describe steps to access the scVIDR code and data using a containerization application called Docker. …”
    Get full text
    Article
  19. 859

    586 Fostering collaboration and innovation across the Clinical and Translational Science Awards (CTSA) Consortium by Kristopher Bough, Soju Chang, Francisco Leyva, Monica Donerson

    Published 2025-04-01
    “…Methods/Study Population: All CCIA awards between 2016 and 2022 were reviewed and analyzed by Fiscal year, activity code, and research area using NIH analytical tools and platforms. …”
    Get full text
    Article
  20. 860

    Development and Research Directions in Seafarers’ Welfare and Rights: A Bibliometric Analysis Between 1920 and 2023 by Hanh-Thi Hong Hoang, Le-Thanh Nguyen, Sung-Ho Park, Jong-Kwan Kim

    Published 2025-04-01
    “…For over one century, since the first international instrument – the National Seamen’s Code Recommendation – was adopted in 1920, global seafarers have been fighting for their rights and welfare. …”
    Get full text
    Article