Showing 121 - 140 results of 237 for search 'code generation algorithm', query time: 0.14s Refine Results
  1. 121

    Generalized Internal Coordinates for Creative Exploration of Interatomic Geometries by Aleksandr V. Marenich (1283298)

    Published 2025
    “…The analytical first- and second-order derivatives with respect to Cartesian coordinates are built automatically to provide for the seamless integration of such GICs into geometry optimization, potential energy surface searching and scans, and normal-mode analysis in terms of internal coordinates, all without further coding. Our algorithm allows the user to create compound internal coordinates that are functions of other coordinates, as well as special-purpose coordinates for specific classes of problems. …”
  2. 122

    Dataset: "A Method for Sensitivity Analysis of Automatic Contouring Algorithms Across Different MRI Contrast Weightings Using SyntheticMR" by Lucas McCullum (16521828)

    Published 2025
    “…In addition, for each contrast weighting (TR and TE combination), the synthetic image generated from SyMRI as well as the model's predicted automatic contours are also included. …”
  3. 123

    Smart contract and interface code for Nature Energy "A general form of smart contract for decentralised energy systems management" by Lee Thomas (19655773)

    Published 2024
    “…This provides the modelled electricity network cost data, the smart contract code, and the Python interface scripts described in the Nature Energy Paper  "A general form of smart contract for decentralised energy systems management." …”
  4. 124

    Using synthetic data to test group-searching algorithms in a context where the correct grouping of species is known and uniquely defined. by Yuanchen Zhao (12905580)

    Published 2024
    “…The panel shows representative outputs of these algorithms for <i>N</i> = 3 metabolites and for the number of groups indicated at the top. …”
  5. 125
  6. 126

    Structure of the Dynamic Downsampling module. by Xun Li (182737)

    Published 2025
    “…Additionally, to verify the robustness of the proposed algorithm, TLINet is evaluated on the VOC07 + 12 dataset. …”
  7. 127

    UAV aerial image samples of insulator. by Xun Li (182737)

    Published 2025
    “…Additionally, to verify the robustness of the proposed algorithm, TLINet is evaluated on the VOC07 + 12 dataset. …”
  8. 128

    General framework of the proposed TLINet. by Xun Li (182737)

    Published 2025
    “…Additionally, to verify the robustness of the proposed algorithm, TLINet is evaluated on the VOC07 + 12 dataset. …”
  9. 129

    Initialization Parameters Of Our Method. by Xun Li (182737)

    Published 2025
    “…Additionally, to verify the robustness of the proposed algorithm, TLINet is evaluated on the VOC07 + 12 dataset. …”
  10. 130

    Details of the five public datasets. by Xun Li (182737)

    Published 2025
    “…Additionally, to verify the robustness of the proposed algorithm, TLINet is evaluated on the VOC07 + 12 dataset. …”
  11. 131

    Code and Data for 'Fabrication and testing of lensed fiber optic probes for distance sensing using common path low coherence interferometry' by Radu Stancu (21165068)

    Published 2025
    “…Distance Sensing</p><p dir="ltr">Code and data to demonstrate extracting distance sensing data from A-scans and to generate Fig. 8 using the algorithm described in Fig. 7. …”
  12. 132

    Quantum Simulation of Molecular Dynamics ProcessesA Benchmark Study Using a Classical Simulator and Present-Day Quantum Hardware by Tamila Kuanysheva (21546962)

    Published 2025
    “…This serves as a benchmark and demonstrates that the quantum algorithms and Qiskit codes we developed are accurate. …”
  13. 133

    Table 1_Next-generation sequencing of mitochondrial DNA reveals pathogenic variants and protective haplogroup D4 in esophageal cancer.xlsx by Xiucheng Jiang (18849564)

    Published 2025
    “…Three tRNA mutations (7496_T>C, 5771_A>G, and 5613_T>A) were predicted to be potentially pathogenic. Within the protein-coding regions, 14 variants were classified as deleterious based on predictions from 13 independent bioinformatic algorithms. …”
  14. 134

    All the Places I Have Lived v3.0 by Christian Berg (18034411)

    Published 2025
    “…To disrupt and reshape these AI-generated scenes, a small Python-based tool called Memory Infuser is used to distort the images, using fragments of written memory as input - so each image is shaped by both code and personal experience. …”
  15. 135
  16. 136

    Comparison of Student Engagement and Exam Success at Introductory Computer Programming Classes on Faculty of Electrical Engineering University of Ljubljana in Years 2023 and 2024 a... by Žiga Rojec (22175137)

    Published 2025
    “…Future research directions include exploring test-driven learning approaches and adapting assessment strategies to address emerging challenges posed by AI-generated code submissions.</p>…”
  17. 137
  18. 138

    Text-to-SQL Verification Methods and Benchmark by Tarfah Alrashed (15442229)

    Published 2025
    “…<p dir="ltr">This repository contains the source code, evaluation results, and a new verification benchmark developed for our research on LLM-generated SQL verification.…”
  19. 139
  20. 140

    Research data for paper: Efficient Event-based Delay Learning in Spiking Neural Networks by Balázs Mészáros (16890225)

    Published 2025
    “…</li></ol><p dir="ltr">The data was generated and analysed with the code available on GitHub at https://github.com/mbalazs98/deventprop/</p><p dir="ltr">results.py contains all test accuracies shown in figures 4-7. …”