-
741
Decoding words during sentence production with ECoG reveals syntactic role encoding and structure-dependent temporal dynamics
Published 2025-06-01“…In non-canonical sentences (passives), we further observed a spatial code for syntactic roles, with subjects selectively encoded in inferior frontal gyrus (IFG) and objects selectively encoded in middle frontal gyrus (MFG). …”
Get full text
Article -
742
Experimental and Numerical Investigation on the Flexural Behavior of Composite-Reinforced Top-Hat Shape Beam
Published 2021-04-01“…Hollow section beams with top-hat cross-section are mostly employed in structures like B-pillar, rocker sill, and roof rail which are engaged in side impact collisions. …”
Get full text
Article -
743
THE MOTIVATING FUNCTION OF MYTH: A COGNITIVE ONOMASIOLOGICAL ANALYSIS
Published 2023-11-01“…A myth is irrational, axiomatic, unfounded cognitive structure, which has powerful ability of transfer by next people generations, informative stability, absence of depth of sense, tendency of disappearance and production of new myths and others like that. Mythological motivation is appropriated to the signs of cultural codes of animals and plants; also, idioms and proverbs can have propositional, associative-metaphorical and value statuses. …”
Get full text
Article -
744
The Hybrid Modern Network Model: A Multi-Technique Framework for Comprehensive Network Analysis
Published 2025-06-01“…Future research will optimize the HMNM and explore its applications across various domains. The R programming code used for the network simulations and visualizations is conceptual and demonstrates the HMNM framework. …”
Get full text
Article -
745
Perceived impact of generative AI on assessments: Comparing educator and student perspectives in Australia, Cyprus, and the United States
Published 2024-12-01“…The growing use of generative AI tools built on large language models (LLMs) calls the sustainability of traditional assessment practices into question. Tools like OpenAI's ChatGPT can generate eloquent essays on any topic and in any language, write code in various programming languages, and ace most standardized tests, all within seconds. …”
Get full text
Article -
746
Optimizing ML models for cybercrime detection: balancing performance, energy consumption, and carbon footprint through multi-objective optimization
Published 2025-04-01“…The methodology involves using NSGA-II for feature selection and evaluating energy consumption (Econ) and carbon footprint (CFP) with tools like CodeCarbon and EmissionsTracker. The performance of models such as LSTM (Long short-term memory) and SVM (Support Vector Machine) is assessed in terms of F-measure, with computational environments (Google Colab vs. personal laptop) compared for sustainability. …”
Get full text
Article -
747
ByteBait USB: a robust simulation toolkit for badUSB phishing campaign
Published 2025-07-01“…This paper addresses BadUSB devices in phishing campaigns, which exploit inherent trust in USB devices to execute malicious actions like keystroke injection. These attacks are particularly dangerous as their malicious code resides in firmware, evading traditional antivirus solutions. …”
Get full text
Article -
748
Mitigating Quantization Errors Due to Activation Spikes in Gated Linear Unit-Based Large Language Models
Published 2025-04-01“…However, we identify a critical challenge in activation quantization for GLU (Gated Linear Unit) variants, which are commonly used in the feed-forward networks of modern LLMs like the LLaMA family. Specifically, severe local quantization errors arise due to excessively large activation magnitudes, which we refer to as activation spikes, leading to significant degradation in model performance. …”
Get full text
Article -
749
The crane radar: Development and deployment of an operational eco-digital twin
Published 2025-03-01“…By showing an example of the crane radar, a real-time digital twin of the common crane (Grus grus) migration, this paper illustrates what digital twins could look like in ecology, and which challenges modellers face towards actual deployment of their digital twin in an operational environment.The most important challenges identified here are: ex ante quality and error control of the input data; accounting for time lags between observations and data availability; harmonising the updating frequencies and temporal resolutions of models and data; developing robust model/software code to keep digital twins alive; the necessity of learning new skills for ecological modellers; and effectively communicating digital twin outputs to stakeholders. …”
Get full text
Article -
750
Comparing the Shielding Features of Graphene and Impregnated Activated Carbon with Selected Traditional Shielding Materials For Gamma-Rays
Published 2023-06-01“…XCom software and EGSnrc simulation code were used to obtain the theoretical values of various shielding parameters which are significantly important to be able to understand the shielding properties of AC and RGO for gamma-rays. …”
Get full text
Article -
751
-
752
Generative adversarial DacFormer network for MRI brain tumor segmentation
Published 2025-05-01“…While effective, these architectures primarily model local dependencies, lacking the ability to capture global interactions like pure Transformer. However, using pure Transformer directly causes the network to lose local feature information. …”
Get full text
Article -
753
Multi-strategy enhanced marine predator algorithm: performance investigation and application in intrusion detection
Published 2025-02-01“…Abstract Marine Predator Algorithm (MPA) is a recently proposed population-based metaheuristic algorithm (MA), and its effectiveness has been proven in many stochastic optimization challenges. However, like most MAs, MPA suffers from shortcomings such as imbalanced search preferences and stagnation in the late phase of optimization. …”
Get full text
Article -
754
OpenCL-Based FPGA Accelerator for 3D FDTD with Periodic and Absorbing Boundary Conditions
Published 2017-01-01“…Accelerator is designed using a “C-like” programming language called OpenCL (open computing language). …”
Get full text
Article -
755
ChatGPT as a data analyst: an exploratory study on AI-supported quantitative data analysis in empirical research
Published 2025-01-01“…Accordingly, this paper explores the potential and pitfalls of using a tool like ChatGPT as an assistant in quantitative data analysis. …”
Get full text
Article -
756
SPUFChain: Permissioned Blockchain Lightweight Authentication Scheme for Supply Chain Management Using PUF of IoT
Published 2025-01-01“…A smart contract on the blockchain is a software code that executes spontaneously as and when the conditions of the contract or agreement are satisfied. …”
Get full text
Article -
757
The impact of dysmenorrhea on academic performance and coping strategies: lived experiences of female students in Ethiopian public universities
Published 2025-07-01“…Thematic analyses were done using OpenCode software based on the seven-step approach of Colaizzi’s framework of analysis. …”
Get full text
Article -
758
-
759
Some verbal cues to deception in near-death experiences
Published 2025-06-01“…Result and Discussion Considering Farsi language rules, we analyzed stories from both groups separately and coded each cue as follows:Negative statementsFor this code, we counted verbs with negative prefixes, the words ‘no’, ‘nobody’, and ‘nothing’. …”
Get full text
Article -
760
Improving Digital Cancer Care for Older Black Adults: Qualitative Study
Published 2025-02-01“…A redesign of digital cancer care programs, tailored to the needs of most structurally marginalized groups like older Black adults, can enhance the digital care experience for all population groups. …”
Get full text
Article