Zobrazeno 1 - 10
of 34 559
pro vyhledávání: '"Sultan P."'
Autor:
Sultan, Talha, Brandt, Eric, Masumnia-Bisheh, Khadijeh, Riccardo, Simone, Polynkin, Pavel, Tosi, Alberto, Velten, Andreas
Active imaging systems sample the Transient Light Transport Matrix (TLTM) for a scene by sequentially illuminating various positions in this scene using a controllable light source, and then measuring the resulting spatiotemporal light transport with
Externí odkaz:
http://arxiv.org/abs/2412.10300
Autor:
Alrashed, Sultan
We present SmolTulu-1.7b-Instruct, referenced in this report as SmolTulu-DPO-1130, an instruction-tuned language model that adapts AllenAI's Tulu 3 post-training pipeline to enhance Huggingface's SmolLM2-1.7B base model. Through comprehensive empiric
Externí odkaz:
http://arxiv.org/abs/2412.08347
Autor:
Ahmed, Sultan, Rakin, Salman, Waliur, Mohammad Washeef Ibn, Islam, Nuzhat Binte, Hossain, Billal, Akbar, Md. Mostofa
Emotion artificial intelligence is a field of study that focuses on figuring out how to recognize emotions, especially in the area of text mining. Today is the age of social media which has opened a door for us to share our individual expressions, em
Externí odkaz:
http://arxiv.org/abs/2412.05861
Autor:
Vornehm, Marc, Chen, Chong, Sultan, Muhammad Ahmad, Arshad, Syed Murtaza, Han, Yuchi, Knoll, Florian, Ahmad, Rizwan
Cardiovascular magnetic resonance imaging is a powerful diagnostic tool for assessing cardiac structure and function. Traditional breath-held imaging protocols, however, pose challenges for patients with arrhythmias or limited breath-holding capacity
Externí odkaz:
http://arxiv.org/abs/2412.04639
Autor:
Sultan, Md. Fahim, Karim, Tasmin, Shaon, Md. Shazzad Hossain, Wardat, Mohammad, Akter, Mst Shapna
Software security is crucial in any field where breaches can exploit sensitive data, and lead to financial losses. As a result, vulnerability detection becomes an essential part of the software development process. One of the key steps in maintaining
Externí odkaz:
http://arxiv.org/abs/2412.00216
Autor:
Sultan, Md. Fahim, Karim, Tasmin, Shaon, Md. Shazzad Hossain, Wardat, Mohammad, Akter, Mst Shapna
In software, a vulnerability is a defect in a program that attackers might utilize to acquire unauthorized access, alter system functions, and acquire information. These vulnerabilities arise from programming faults, design flaws, incorrect setups, a
Externí odkaz:
http://arxiv.org/abs/2411.17621
Autor:
Li, Chengyin, Zhu, Hui, Sultan, Rafi Ibn, Ebadian, Hassan Bagher, Khanduri, Prashant, Indrin, Chetty, Thind, Kundan, Zhu, Dongxiao
In the diverse field of medical imaging, automatic segmentation has numerous applications and must handle a wide variety of input domains, such as different types of Computed Tomography (CT) scans and Magnetic Resonance (MR) images. This heterogeneit
Externí odkaz:
http://arxiv.org/abs/2411.15576
This study examines a home healthcare scheduling and routing problem (HHSRP) with a lunch break requirement. This problem especially consists of lunch break constraints for caregivers in addition to other typical features of the HHSRP in literature s
Externí odkaz:
http://arxiv.org/abs/2412.06797
Autor:
Ahad, Jawad Ibn, Sultan, Rafeed Mohammad, Kaikobad, Abraham, Rahman, Fuad, Amin, Mohammad Ruhul, Mohammed, Nabeel, Rahman, Shafin
This study investigates the automation of meta-analysis in scientific documents using large language models (LLMs). Meta-analysis is a robust statistical method that synthesizes the findings of multiple studies support articles to provide a comprehen
Externí odkaz:
http://arxiv.org/abs/2411.10878
Autor:
Andrianomena, Sambatra, Hassan, Sultan
We present an approach that can be utilized in order to account for the covariate shift between two datasets of the same observable with different distributions, so as to improve the generalizability of a neural network model trained on in-distributi
Externí odkaz:
http://arxiv.org/abs/2411.10515