Showing 1,121 - 1,140 results of 2,743 for search 'critical code', query time: 0.11s Refine Results
  1. 1121

    Survival analysis using machine learning in transplantation: a practical introduction by Andrea Garcia-Lopez, Maritza Jiménez-Gómez, Andrea Gomez-Montero, Juan Camilo Gonzalez-Sierra, Santiago Cabas, Fernando Giron-Luque

    Published 2025-03-01
    “…All analyses were supported by step-by-step code to ensure reproducibility. Findings. The RSF model obtained a C-index of 0.774, an IBS of 0.090. …”
    Get full text
    Article
  2. 1122

    Teaching Education and Socio-educational Action: Developing an Implementation Proposal of the Program Community Teachers (PCT) by Paulette Barberousse-Alfonso, Marie Claire Vargas-Dengo, Pamela Corrales-Bastos

    Published 2017-12-01
    “…From a critical and transformative approach, this essay presents inputs and relevant conclusions obtained during the first stage of the project Construyendo una propuesta de implementación del Programa Maestros Comunitarios (PMC), Code number 0166-15 DEB-UNA (UNA, DEB, s. f.), conducted in 2016. …”
    Get full text
    Article
  3. 1123

    Effect of Nonlinear Constitutive Models on Seismic Site Response of Soft Reclaimed Soil Deposits by Sadiq Shamsher, Myoung-Soo Won, Young-Chul Park, Yoon-Ho Park, Mohamed A. Sayed

    Published 2025-07-01
    “…The results highlight the critical role of the site-to-motion period ratio (<i>T<sub>g</sub></i>/<i>T<sub>m</sub></i>) in controlling seismic behavior. …”
    Get full text
    Article
  4. 1124

    ViPeR: Vision-Based Surgical Phase Recognition by Soumyadeep Chandra, Sayeed Shafayet Chowdhury, Courtney Yong, Ginnie Jeng, Ashorne Mahenthiran, Kostantinos E. Morris, Harrison L. Love, Chandru P. Sundaram, Kaushik Roy

    Published 2025-01-01
    “…Surgical phase recognition is a critical, yet challenging, problem in computer vision, with significant implications for automated surgical training, intraoperative assistance, and workflow optimization. …”
    Get full text
    Article
  5. 1125

    Experimental Study on Mechanical Properties of Prefabricated Single-Cracked Red Sandstone under Uniaxial Compression by Yue Yuan, Jinlei Fu, Xiaolei Wang, Xi Shang

    Published 2020-01-01
    “…Uniaxial compression test and particle flow code (PFC2D) are used to analyze the influence of crack dip angle on the mechanical properties, crack propagation, and the failure mode of red sandstone. …”
    Get full text
    Article
  6. 1126

    Self-Supervised Image Anomaly Detection Through Diverse Pseudo Anomaly Insertion by Rizwan Ali Shah, Odilbek Urmonov, Hyungwon Kim

    Published 2025-01-01
    “…Industrial anomaly detection through deep learning-based vision systems is becoming a critical inspection tool for deploying efficient, defect-free manufacturing lines in smart factories. …”
    Get full text
    Article
  7. 1127

    P-GELU: A Novel Activation Function to Optimize Whisper for Darija Speech Translation by Maria Labied, Abdessamad Belangour, Mouad Banane

    Published 2025-01-01
    “…Activation functions play a critical role in optimizing deep learning models, directly influencing gradient flow, convergence stability, and overall translation accuracy. …”
    Get full text
    Article
  8. 1128

    w2v-SELD: A Sound Event Localization and Detection Framework for Self-Supervised Spatial Audio Pre-Training by Orlem Lima Dos Santos, Karen Rosero, Bruno Masiero, Roberto de Alencar Lotufo

    Published 2024-01-01
    “…Sound Event Localization and Detection (SELD) is a critical challenge in various industrial applications, such as autonomous systems, smart cities, and audio surveillance, which require accurate identification and localization of sound events in complex environments. …”
    Get full text
    Article
  9. 1129
  10. 1130

    IncSAR: A Dual Fusion Incremental Learning Framework for SAR Target Recognition by George Karantaidis, Athanasios Pantsios, Ioannis Kompatsiaris, Symeon Papadopoulos

    Published 2025-01-01
    “…The challenge of catastrophic forgetting, where models lose past knowledge when adapting to new tasks, remains a critical issue. In this paper, we introduce IncSAR, an incremental learning framework designed to tackle catastrophic forgetting in SAR target recognition. …”
    Get full text
    Article
  11. 1131
  12. 1132

    “Warning!” Benefits and Pitfalls of Anthropomorphising Autonomous Vehicle Informational Assistants in the Case of an Accident by Christopher D. Wallbridge, Qiyuan Zhang, Victoria Marcinkiewicz, Louise Bowen, Theodor Kozlowski, Dylan M. Jones, Phillip L. Morgan

    Published 2024-12-01
    “…The accident scenario involved a pedestrian violating the Highway Code by stepping out in front of a parked bus and the AV not being able to stop in time during an overtake manoeuvre. …”
    Get full text
    Article
  13. 1133

    Practical Evaluation Framework for Real-Time Multi-Object Tracking: Achieving Optimal and Realistic Performance by Jumabek Alikhanov, Dilshod Obidov, Mirsaid Abdurasulov, Hakil Kim

    Published 2025-01-01
    “…This finding underscores the critical advantage offered by our evaluation method. …”
    Get full text
    Article
  14. 1134

    Review of the official opponent to the doctoral (Law, major 12.00.08) thesis “The mechanism of criminal law countering extremist activities: content, structure, main directions of... by A. V. Petryanin

    Published 2021-06-01
    “…The reviewer’s opinions on the thesis are presented, concerning the use of positive foreign experience in counteracting extremism, the proposed options for the terrorist and extremist crimes qualification, as well as the proposed legal conditions governing the grounds for exemption from criminal liability for persons who participated in the activities of an extremist organized group or extremist community. A critical evaluation was carried out for the main provisions of the thesis, for example, the absence of the author’s concept of extremist activity; the definition of goods and values in relation to which the goals are achieved and the functions of the criminal-legal counteraction to extremism are implemented; the author’s classification of terrorist crimes; the proposed version of Article 2821 of the Criminal Code of the Russian Federation “Creation of an extremist organized group, extremist community or participation in it”.Scientific novelty: the author evaluates the thesis by Z. …”
    Get full text
    Article
  15. 1135

    Comparative and Interpretative Analysis of CNN and Transformer Models in Predicting Wildfire Spread Using Remote Sensing Data by Yihang Zhou, Ruige Kong, Zhengsen Xu, Linlin Xu, Sibo Cheng

    Published 2025-06-01
    “…The insights from our thorough comparative analysis offer substantial implications for future model design and also provide guidance for model selection in different scenarios. The source code for this project is publicly available as open source on Zenodo (Y. …”
    Get full text
    Article
  16. 1136

    Real-Time Long-Wave Infrared Semantic Segmentation With Adaptive Noise Reduction and Feature Fusion by Haejun Bae, Dong-Goo Kang, Minhye Chang, Kye Young Jeong, Byung Cheol Song

    Published 2025-01-01
    “…Semantic segmentation in the Long-Wave Infrared (LWIR) domain is critical for a wide range of applications including emergency response, industrial safety monitoring, and public building security. …”
    Get full text
    Article
  17. 1137

    An observational study protocol on wastewater measurements and diaper culture to estimate antimicrobial resistance in long-term care facilities for people with intellectual disabil... by S Hidad, S C de Greeff, F de Haan, R Schilperoort, G L Leusink, A Timen, H Schmitt

    Published 2025-01-01
    “…<h4>Introduction</h4>Antimicrobial resistance (AMR) has become one of the leading global health threats. It is critical to understand the burden of AMR, particularly among vulnerable populations such as people with intellectual disabilities residing in long-term care facilities (ID-LTCFs). …”
    Get full text
    Article
  18. 1138

    A Cybersecurity Risk Assessment for Enhanced Security in Virtual Reality by Rebecca Acheampong, Dorin-Mircea Popovici, Titus C. Balan, Alexandre Rekeraho, Ionut-Alexandru Oprea

    Published 2025-05-01
    “…This methodology provides a comprehensive risk evaluation method, identifying critical vulnerabilities such as Remote Code Execution (RCE), social engineering, excessive permission exploitation, unauthorized access, and data exfiltration. …”
    Get full text
    Article
  19. 1139

    A Framework for Rapidly Prototyping Data Mining Pipelines by Flavio Corradini, Luca Mozzoni, Marco Piangerelli, Barbara Re, Lorenzo Rossi

    Published 2025-06-01
    “…With the advent of Big Data, data mining techniques have become crucial for improving decision-making across diverse sectors, yet their employment demands significant resources and time. Time is critical in industrial contexts, as delays can lead to increased costs, missed opportunities, and reduced competitive advantage. …”
    Get full text
    Article
  20. 1140

    GuidedBox: a segmentation-guided box teacher-student approach for weakly supervised road segmentation by Teerapong Panboonyuen, Chaiyut Charoenphon, Chalermchon Satirapod

    Published 2025-12-01
    “…The importance of road segmentation in remote sensing data cannot be overstated, as it underpins various critical applications such as urban planning, traffic monitoring and autonomous driving systems. …”
    Get full text
    Article