Results 31 to 40 of about 822,562 (319)

A Scheme of Full Kinetic Particle-in-cell Algorithms for GPU Acceleration Using CUDA Fortran Programming

open access: yesThe Astrophysical Journal Supplement Series, 2022
The emerging computable devices, graphical processing units (GPUs), are gradually applied in the simulations of space physics. In this paper, we introduce an approach that implements full kinetic particle-in-cell simulations on GPU architecture devices ...
Q. Y. Xiong   +9 more
doaj   +1 more source

A Union of Dynamic Hydrological Modeling and Satellite Remotely-Sensed Data for Spatiotemporal Assessment of Sediment Yields

open access: yesRemote Sensing, 2022
(1) The existing frameworks for water quality modeling overlook the connection between multiple dynamic factors affecting spatiotemporal sediment yields (SY).
Pooja Preetha, Ashraf Al-Hamdan
doaj   +1 more source

Android-Based Introduction to Agricultural Crops and Pests

open access: yesJournal of Information Systems and Informatics, 2022
The number of farmers in Indonesia continues to increase during the pandemic. However, this increase was not accompanied by good literacy related to plants and pests. The main factor is the increasing amount of information that is not credible.
Aldi Susanto   +3 more
doaj   +1 more source

Język migowy w świetle współczesnego paradygmatu głuchoty

open access: yesProblemy Wczesnej Edukacji, 2019
The main issue addressed in this paper is a practical application of sign language in early development support for deaf and hard of hearing children in Poland.
Piotr Tomaszewski, Lucyna Kościelniak
doaj   +1 more source

CodeGen: An Open Large Language Model for Code with Multi-Turn Program Synthesis [PDF]

open access: yesarXiv, 2022
Program synthesis strives to generate a computer program as a solution to a given problem specification, expressed with input-output examples or natural language descriptions. The prevalence of large language models advances the state-of-the-art for program synthesis, though limited training resources and data impede open access to such models.
arxiv  

Transforming Probabilistic Programs for Model Checking [PDF]

open access: yes, 2020
Probabilistic programming is perfectly suited to reliable and transparent data science, as it allows the user to specify their models in a high-level language without worrying about the complexities of how to fit the models. Static analysis of probabilistic programs presents even further opportunities for enabling a high-level style of programming, by ...
arxiv   +1 more source

Length of a Hanging Cable

open access: yesUndergraduate Journal of Mathematical Modeling: One + Two, 2011
The shape of a cable hanging under its own weight and uniform horizontal tension between two power poles is a catenary. The catenary is a curve which has an equation defined by a hyperbolic cosine function and a scaling factor.
Eric Costello
doaj   +1 more source

Using Large Language Models to Enhance Programming Error Messages [PDF]

open access: yes, 2022
A key part of learning to program is learning to understand programming error messages. They can be hard to interpret and identifying the cause of errors can be time-consuming. One factor in this challenge is that the messages are typically intended for an audience that already knows how to program, or even for programming environments that then use ...
arxiv   +1 more source

Abstraction Level Taxonomy of Programming Language Frameworks [PDF]

open access: yesInternational Journal of Programming Languages and Applications, Volume 3, No. 4, pp. 1-12, 2013, 2013
The main purpose of this article is to describe the taxonomy of computer languages according to the levels of abstraction. There exists so many computer languages because of so many reasons like the evolution of better computer languages over the time; the socio-economic factors as the proprietary interests, commercial advantages; expressive power ...
arxiv   +1 more source

C# parser for extracting cryptographic protocols structure from source code

open access: yesТруды Института системного программирования РАН, 2019
Cryptographic protocols are the core of any secure system. With the help of them, data is transmitted securely and protected from third parties' negative impact.
Ilya Aleksandrovich Pisarev   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy