Search alternatives:
generation algorithm » genetic algorithm (Expand Search), detection algorithm (Expand Search), encryption algorithm (Expand Search)
code generation » power generation (Expand Search), force generation (Expand Search), bone regeneration (Expand Search)
generation algorithm » genetic algorithm (Expand Search), detection algorithm (Expand Search), encryption algorithm (Expand Search)
code generation » power generation (Expand Search), force generation (Expand Search), bone regeneration (Expand Search)
-
121
Generalized Internal Coordinates for Creative Exploration of Interatomic Geometries
Published 2025“…The analytical first- and second-order derivatives with respect to Cartesian coordinates are built automatically to provide for the seamless integration of such GICs into geometry optimization, potential energy surface searching and scans, and normal-mode analysis in terms of internal coordinates, all without further coding. Our algorithm allows the user to create compound internal coordinates that are functions of other coordinates, as well as special-purpose coordinates for specific classes of problems. …”
-
122
Dataset: "A Method for Sensitivity Analysis of Automatic Contouring Algorithms Across Different MRI Contrast Weightings Using SyntheticMR"
Published 2025“…In addition, for each contrast weighting (TR and TE combination), the synthetic image generated from SyMRI as well as the model's predicted automatic contours are also included. …”
-
123
Smart contract and interface code for Nature Energy "A general form of smart contract for decentralised energy systems management"
Published 2024“…This provides the modelled electricity network cost data, the smart contract code, and the Python interface scripts described in the Nature Energy Paper "A general form of smart contract for decentralised energy systems management." …”
-
124
Using synthetic data to test group-searching algorithms in a context where the correct grouping of species is known and uniquely defined.
Published 2024“…The panel shows representative outputs of these algorithms for <i>N</i> = 3 metabolites and for the number of groups indicated at the top. …”
-
125
-
126
Structure of the Dynamic Downsampling module.
Published 2025“…Additionally, to verify the robustness of the proposed algorithm, TLINet is evaluated on the VOC07 + 12 dataset. …”
-
127
UAV aerial image samples of insulator.
Published 2025“…Additionally, to verify the robustness of the proposed algorithm, TLINet is evaluated on the VOC07 + 12 dataset. …”
-
128
General framework of the proposed TLINet.
Published 2025“…Additionally, to verify the robustness of the proposed algorithm, TLINet is evaluated on the VOC07 + 12 dataset. …”
-
129
Initialization Parameters Of Our Method.
Published 2025“…Additionally, to verify the robustness of the proposed algorithm, TLINet is evaluated on the VOC07 + 12 dataset. …”
-
130
Details of the five public datasets.
Published 2025“…Additionally, to verify the robustness of the proposed algorithm, TLINet is evaluated on the VOC07 + 12 dataset. …”
-
131
Code and Data for 'Fabrication and testing of lensed fiber optic probes for distance sensing using common path low coherence interferometry'
Published 2025“…Distance Sensing</p><p dir="ltr">Code and data to demonstrate extracting distance sensing data from A-scans and to generate Fig. 8 using the algorithm described in Fig. 7. …”
-
132
Quantum Simulation of Molecular Dynamics ProcessesA Benchmark Study Using a Classical Simulator and Present-Day Quantum Hardware
Published 2025“…This serves as a benchmark and demonstrates that the quantum algorithms and Qiskit codes we developed are accurate. …”
-
133
Table 1_Next-generation sequencing of mitochondrial DNA reveals pathogenic variants and protective haplogroup D4 in esophageal cancer.xlsx
Published 2025“…Three tRNA mutations (7496_T>C, 5771_A>G, and 5613_T>A) were predicted to be potentially pathogenic. Within the protein-coding regions, 14 variants were classified as deleterious based on predictions from 13 independent bioinformatic algorithms. …”
-
134
All the Places I Have Lived v3.0
Published 2025“…To disrupt and reshape these AI-generated scenes, a small Python-based tool called Memory Infuser is used to distort the images, using fragments of written memory as input - so each image is shaped by both code and personal experience. …”
-
135
-
136
Comparison of Student Engagement and Exam Success at Introductory Computer Programming Classes on Faculty of Electrical Engineering University of Ljubljana in Years 2023 and 2024 a...
Published 2025“…Future research directions include exploring test-driven learning approaches and adapting assessment strategies to address emerging challenges posed by AI-generated code submissions.</p>…”
-
137
-
138
Text-to-SQL Verification Methods and Benchmark
Published 2025“…<p dir="ltr">This repository contains the source code, evaluation results, and a new verification benchmark developed for our research on LLM-generated SQL verification.…”
-
139
-
140
Research data for paper: Efficient Event-based Delay Learning in Spiking Neural Networks
Published 2025“…</li></ol><p dir="ltr">The data was generated and analysed with the code available on GitHub at https://github.com/mbalazs98/deventprop/</p><p dir="ltr">results.py contains all test accuracies shown in figures 4-7. …”