Showing 2,521 - 2,540 results of 2,827 for search 'making and coding', query time: 0.13s Refine Results
  1. 2521

    Leveraging Local LLMs for Secure In-System Task Automation With Prompt-Based Agent Classification by Suthir Sriram, C. H. Karthikeya, K. P. Kishore Kumar, Nivethitha Vijayaraj, Thangavel Murugan

    Published 2024-01-01
    “…Every module is has its own function, including file search, document summarization, code interpretation, and general tasks, to make certain that all processing happens locally on the user’s device. …”
    Get full text
    Article
  2. 2522

    Preliminary measurements using a Triple to Double Coincidence Ratio (TDCR) Liquid Scintillator Counter System by Marina Fallone Koskinas, Marina Fallone Koskinas, Maria Kuznetsova, Denise Moreira S. Moreira, Roberto M. Shoueri, Ione M. Yamazaki, Thales S. L. Morais, Renato Semmler, Mauro S. Dias

    Published 2021-04-01
    “…The Software Coincidence System (SCS) developed by the LMN was used for both systems to register the events. MICELLE 2 code was used to calculate the theoretical TDCR efficiency. …”
    Get full text
    Article
  3. 2523

    Fault Type Classification in the Presence of Inverter-Based Resources: Review, Challenges, and Future Works by Mohammad Mehdi Mobashsher, Seyyed Mehdi Hosseini, Ali Akbar Abdoos, Sayyed Mohammad Hashemi, Majid Sanaye-Pasand, Maher Azzouz

    Published 2025-01-01
    “…Traditional FTC techniques make use of either phase changes between current symmetrical components or magnitude differences between superimposed currents. …”
    Get full text
    Article
  4. 2524

    BDNet: Bengali Handwritten Numeral Digit Recognition based on Densely connected Convolutional Neural Networks by Abu Sufian, Anirudha Ghosh, Avijit Naskar, Farhana Sultana, Jaya Sil, M.M. Hafizur Rahman

    Published 2022-06-01
    “…Images of handwritten digits are different from natural images as the orientation of a digit, as well as similarity of features of different digits, makes confusion. On the other hand, deep convolutional neural networks are achieving huge success in computer vision problems, especially in image classification. …”
    Get full text
    Article
  5. 2525

    Offline Safe Reinforcement Learning for Sepsis Treatment: Tackling Variable-Length Episodes with Sparse Rewards by Rui Tu, Zhipeng Luo, Chuanliang Pan, Zhong Wang, Jie Su, Yu Zhang, Yifan Wang

    Published 2025-02-01
    “…Meanwhile, safety is often overlooked by many models, leading them to make excessively extreme recommendations. In this paper, we study how to recommend effective and safe treatments for critically ill septic patients. …”
    Get full text
    Article
  6. 2526

    Development and Research Directions in Seafarers’ Welfare and Rights: A Bibliometric Analysis Between 1920 and 2023 by Hanh-Thi Hong Hoang, Le-Thanh Nguyen, Sung-Ho Park, Jong-Kwan Kim

    Published 2025-04-01
    “…Seafarers make a critical contribution to civil society; however, they are exposed to various occupational health hazards on board ships and have historically not been granted fundamental rights. …”
    Get full text
    Article
  7. 2527

    Tracer-based Rapid Anthropogenic Carbon Estimation (TRACE) by B. R. Carter, B. R. Carter, J. Schwinger, R. Sonnerup, A. J. Fassbender, J. D. Sharp, J. D. Sharp, L. M. Dias, L. M. Dias, D. E. Sandborn

    Published 2025-07-01
    “…Unfortunately, C<span class="inline-formula"><sub>anth</sub></span> estimation methods are typically only accessible to trained scientists and modelers with access to significant computational resources. Here, we make modifications to the transit time distribution approach for C<span class="inline-formula"><sub>anth</sub></span> estimation that render the method more accessible. …”
    Get full text
    Article
  8. 2528

    GPU‐Accelerated Lattice Boltzmann Simulations of Power‐Law Non‐Newtonian Fluid Flow in a Diagonally Driven Cavity Using D3Q27 MRT‐LBM by Md. Mamun Molla, Amzad Hossain, Md. Mahadul Islam

    Published 2025-03-01
    “…LBM provides a mesoscopic method that makes handling intricate geometries easier and scales effectively on GPUs and other parallel computing architectures. …”
    Get full text
    Article
  9. 2529

    Syn‐Aug: An Effective and General Synchronous Data Augmentation Framework for 3D Object Detection by Huaijin Liu, Jixiang Du, Yong Zhang, Hongbo Zhang, Jiandian Zeng

    Published 2025-06-01
    “…Second, we propose a local augmentation technique (Local‐Aug) to generate local noise by rotating and scaling objects in the scene while avoiding collisions, which can improve generalisation performance. Finally, we make full use of the structural information of 3D labels to make the model more robust by randomly changing the geometry of objects in the training frames. …”
    Get full text
    Article
  10. 2530

    Про методологію просторової фіксації в дослідженнях книгописання в Україні XI–XVIII ст. by Віра Фрис

    Published 2024-12-01
    “…Such records often mention the settlements where they were created or stored, or there are indications of religious locations where those books were copied. This makes it possible to reliably record the most active centers of the books copying on our territory. …”
    Get full text
    Article
  11. 2531

    Building an Associative Classification Data Model Based on the Apriori Method by K. V. Mulyukova, V. M. Kureichik

    Published 2020-09-01
    “…This factor greatly simplifies the further development of program code.…”
    Get full text
    Article
  12. 2532

    The institution of digital rights in Russian civil law by E. A. Kirillova, T. E. Zulfugarzade, S. E. Metelev

    Published 2022-03-01
    “…Digital objects represent an independent legal category, which is a cryptographic code that gives the owner the right to perform any actions with it - to own, dispose of, alienate, make transactions, and other actions not prohibited by law. …”
    Get full text
    Article
  13. 2533

    Two studied metropolitan cities in Ethiopia and their current integrated infrastructure plan to enhance resilience and sustainability by Geremew Worku, Dagnachew Adugna

    Published 2025-06-01
    “…This included 69 respondents, 15 key interviews, and 90 focus group discussions (FGDs). We processed, coded, classified, and input the data into Microsoft Excel for analysis. …”
    Get full text
    Article
  14. 2534

    Correlate of business incubators and small medium and micro-enterprises development (SMMEs) in Nigeria by Mufutau Akanmu Popoola, Azeez Olasunkanmi Ojo, Mutairu Oyewale Akintunde

    Published 2024-10-01
    “…The responds gotten from the questionnaire was be sorted, coded and the statistical Packages for Social Sciences (SPSS) version 20.0 was employed. …”
    Get full text
    Article
  15. 2535
  16. 2536

    Multi-voxel pattern analysis for developmental cognitive neuroscientists by João F. Guassi Moreira, Jennifer A. Silvers

    Published 2025-06-01
    “…While these are powerful tools, it is somewhat surprising that multi-voxel pattern analysis (MVPA) is not more common in developmental cognitive neuroscience given its enhanced ability to both probe neural population codes and greater sensitivity relative to the mass univariate approach. …”
    Get full text
    Article
  17. 2537

    PROTESTANTISM – REGULATION OF CONSUMPTION by Vladimir A. Ermolaev

    Published 2022-09-01
    “…In particular, it is indicated that such tools, as a rule, find their place in religious canons (codes of rules). Speaking about the religious regulation of consumption, the author examines Protestantism and its currents and trends. …”
    Get full text
    Article
  18. 2538

    Adaptive genetic algorithm based deep feature selector for cancer detection in lung histopathological images by Avigyan Roy, Priyam Saha, Nandita Gautam, Friedhelm Schwenker, Ram Sarkar

    Published 2025-02-01
    “…Imaging tests on different image modalities such as Histopathology images, provide valuable insights into the cellular and architectural features of tissues, allowing pathologists to make diagnosis, determine disease stages, and guide treatment decisions. …”
    Get full text
    Article
  19. 2539

    AnomLite: Efficient binary and multiclass video anomaly detection by Anna K. Zvereva, Mariam Kaprielova, Andrey Grabovoy

    Published 2025-03-01
    “…The code could be found here: https://github.com/AnnaZverev/UCF_Crime.git…”
    Get full text
    Article
  20. 2540

    Cyber-Physical System Security for Manufacturing Industry 4.0 Using LSTM-CNN Parallel Orchestration by Salman Saeidlou, Nikdokht Ghadiminia, Kwadwo Oti-Sarpong

    Published 2025-01-01
    “…Intrusions through malicious code embedded in the design can hamper precision and cause production delays, resulting in significant revenue loss. …”
    Get full text
    Article