Search alternatives:
generative » generate (Expand Search)
reduction » education (Expand Search)
Showing 81 - 100 results of 142 for search 'Generative reduction coding', query time: 0.11s Refine Results
  1. 81

    Vibration control in buildings under seismic excitation using optimized tuned mass dampers by Francisco da Silva Brandão, Letícia Fleck Fadel Miguel

    Published 2020-09-01
    “…The results showed that all proposed scenarios are efficient in reducing top floor response and interstory drift to values below of the interstory drift limits allowed by the standard code consulted. However, Scenario 2 presented the best reduction for the top displacement and interstory drift to the critical floor for the worst earthquake considered.…”
    Get full text
    Article
  2. 82

    Redox-Driven Epigenetic Modifications in Sperm: Unraveling Paternal Influences on Embryo Development and Transgenerational Health by Aron Moazamian, Fabrice Saez, Joël R. Drevet, Robert John Aitken, Parviz Gharagozloo

    Published 2025-05-01
    “…We discuss how this lesion can disrupt key epigenetic mechanisms such as DNA methylation, histone modifications, and small non-coding RNAs, thereby influencing fertilization outcomes, embryo development, and offspring health. …”
    Get full text
    Article
  3. 83

    Assessing the Impact of Past Flood on Rice Production in Batticaloa District, Sri Lanka by Suthakaran Sundaralingam, Kenichi Matsui

    Published 2025-06-01
    “…Temporal-spatial maps were generated using Google Earth Engine JavaScript coding, Google Earth Pro, and OpenStreetMap. …”
    Get full text
    Article
  4. 84

    Inhalation hazard of radioactive aerosols from dismantling in-core structural components in a pressurized heavy water reactor during decommissioning by Tanmay Sarkar, Chitra Subramanian, S Anand

    Published 2024-10-01
    “…We assess inhalation doses from radioactive aerosols generated during the cutting process using the ORIGEN2 code for material activation and the FLUKA code for external dose rate simulations. …”
    Get full text
    Article
  5. 85

    Multifactor Algorithm for Test Case Selection and Ordering by Atulya Gupta, Rajendra Prasad Mahapatra

    Published 2021-06-01
    “…Intra-validation for the result achieved from the reduction procedure is performed graphically. This study contrasts randomly generated sequences with procured re-ordered test sequence for over '10' benchmark codes for the proposed prioritization scheme. …”
    Get full text
    Article
  6. 86

    Extending measurement range for three-dimensional structured light imaging with digital exponential fringe pattern by Abel, Kamagara

    Published 2020
    “…This approach exploits the fact that at low levels of defocusing, exponential binary-coded fringe pattern exhibits a quasi-sinusoidal form having intact binary structures with reduced or negligible errors owing to high-order harmonic robustness during fringe generation. …”
    Get full text
    Article
  7. 87

    An Efficient Quantum Blockchain Framework With Edge Computing for Privacy-Preserving 6G Networks by Kranthi Kumar Singamaneni, Budati Anil Kumar, Raenu A. L. Kolandaisamy, Vijaya Saradhi Dommeti, Swetha Katragadda

    Published 2025-01-01
    “…Comparative studies with various lattice-, hash-, and code-based quantum cryptographic primitives have shown that CRYSTALS-Dilithium and SPHINCS+ outperform others in key generation, signing, and verification performance indicators, and thus qualify as optimal solutions for edge-centric 6G infrastructures. …”
    Get full text
    Article
  8. 88

    Coordinated Design of Power System Stabilizer and Virtual Inertia Control Using Modified Harris Hawk Optimization for Improving Power System Stability by Mohamad Almas Prakasa, Imam Robandi, Alberto Borghetti, Muhammad Ruswandi Djalal, Waseda Himawari

    Published 2025-01-01
    “…In this proposed method, PSS is focused on increasing the power system stability from the traditional generator sides with diesel engines, thermal, and hydro turbines. …”
    Get full text
    Article
  9. 89

    Proton acceleration from a pair of laser pulses target interaction by Obaydur Rahman, Zheng-Mao Sheng

    Published 2025-05-01
    “…An attempt has been made to generate a high-quality mono-energetic proton beam from a double-layer hydrogen target irradiated by a pair of sequential low-intensity lasers. …”
    Get full text
    Article
  10. 90
  11. 91

    Model Oriented Approach for Industrial Software Development by P. D. Drobintsev, V. P. Kotlyarov, N. V. Voinov, I. V. Nikiforov

    Published 2015-12-01
    “…The main emphasis is put on the system design, automated code generation for large systems, verification, proof of system properties and reduction of bug density. …”
    Get full text
    Article
  12. 92

    Construction and functional identification of overexpression vector of the peach PpCLH1 gene by LIU Xin, ZHANG Xiaoyu, MENG Junren, LI Ang, DUAN Wenyi, SUN Shihang, PAN Lei, ZENG Wenfang, WANG Zhiqiang, NIU Liang

    Published 2025-03-01
    “…A comparative amino acid sequence alignment generated via DNAMAN software highlighted that the peach PpCLH1 shared the highest degree of homology, 99.2%, with the apricot PdCLH1, underscoring their genetic affinity. …”
    Get full text
    Article
  13. 93

    Malware Detection using Deep Neural Networks on Imbalanced Data by Mohammed Abdulkreem Mohammed, Drai Ahmed Smait, Mustafa Al-Tahai, Israa S. Kamil, Kadhum Al-Majdi, Shahad K. Khaleel

    Published 2022-12-01
    “…By employing the wrapper approach for dimensionality reduction, a feature subset was generated. In this paper, we propose an approach for handling the malware detection task in imbalanced data situations. …”
    Get full text
    Article
  14. 94

    MORAL AND SPIRITUAL FOUNDATIONS OF YOUTH POLICY IN REAL SECTOR OF ECONOMY by N. V. Popova

    Published 2017-07-01
    “…Work organization of industrial enterprises for development and deployment of ethical codes and norms, implementation of special programs of moral education of working youth with attraction for this purpose of various experts (doctors, psychologists, sociologists, theologians, etc.) will surely turn back positive social and economic effect: increase in economic stability of an enterprise (also region and country in general); considerable reduction of turnover of staff; reduction of cases of industrial injuries; decrease in number of violations of labour discipline; absence without leave, and other deviations in behaviour of young workers.The materials and results of the investigation can be used as follows: organization of work with youth in real sector of economy; development of social technologies and science-based recommendations for the implementation of corporate youth policy; process of teaching of social philosophy, sociology, social psychology, management of professional career.…”
    Get full text
    Article
  15. 95
  16. 96

    Integrating Palliative Care and Heart Failure: the PalliatHeartSynthesis realist synthesis by Tracey McConnell, Carolyn Blair, Geoff Wong, Claire Duddy, Clare Howie, Loreena Hill, Joanne Reid

    Published 2024-09-01
    “…Data extraction Initial coding of the documents used both inductive (codes emerging through data analysis) and deductive methods (codes determined prior to analysis through initial programme theory and stakeholder discussions). …”
    Get full text
    Article
  17. 97

    Large language model agents can use tools to perform clinical calculations by Alex J. Goodell, Simon N. Chu, Dara Rouholiman, Larry F. Chu

    Published 2025-03-01
    “…We then assessed three forms of agentic augmentation: retrieval-augmented generation, a code interpreter tool, and a set of task-specific calculation tools (OpenMedCalc) across 10,000 trials. …”
    Get full text
    Article
  18. 98

    Approach of detecting low-rate DoS attack based on combined features by Zhi-jun WU, Jing-an ZHANG, Meng YUE, Cai-feng ZHANG

    Published 2017-05-01
    “…LDoS (low-rate denial of service) attack is a kind of RoQ (reduction of quality) attack which has the characteristics of low average rate and strong concealment.These characteristics pose great threats to the security of cloud computing platform and big data center.Based on network traffic analysis,three intrinsic characteristics of LDoS attack flow were extracted to be a set of input to BP neural network,which is a classifier for LDoS attack detection.Hence,an approach of detecting LDoS attacks was proposed based on novel combined feature value.The proposed approach can speedily and accurately model the LDoS attack flows by the efficient self-organizing learning process of BP neural network,in which a proper decision-making indicator is set to detect LDoS attack in accuracy at the end of output.The proposed detection approach was tested in NS2 platform and verified in test-bed network environment by using the Linux TCP-kernel source code,which is a widely accepted LDoS attack generation tool.The detection probability derived from hypothesis testing is 96.68%.Compared with available researches,analysis results show that the performance of combined features detection is better than that of single feature,and has high computational efficiency.…”
    Get full text
    Article
  19. 99

    Integrated photovoltaic applications: Technological advancements, case studies, economic viability, policy implications, and environmental impact by Onyekachi Nwafor

    Published 2025-09-01
    “…Integrated photovoltaic (PV) applications are at the forefront of sustainable energy innovation, merging energy generation with building materials, agriculture, transportation, and more. …”
    Get full text
    Article
  20. 100

    Coal and gas outburst prediction based on data augmentation and neuroevolution. by Wenbing Shi, Ji Huang, Gaoming Yang, Shuzhi Su, Shexiang Jiang

    Published 2025-01-01
    “…Second, the feature importance score sorting and Sparse PCA dimensionality reduction are performed on the data-augmented samples. …”
    Get full text
    Article