Several years ago, my linguistic research team and I began developing a computational tool we call "Read-y Grammarian." Our ...
Abstract: This study introduced an automated method for Individual Tree Crown Detection (ITCD) and Segmentation (ITCS) using high-resolution LiDAR data and the Simple Non-Iterative Clustering (SNIC) ...
Abstract: In this paper, we propose the modified cycle-concentrating progressive-edge-growth (CC-PEG) algorithm for lifting protograph-based quasi-cyclic low-density parity-check (QC-LDPC) codes over ...
This comprehensive package provides everything you need to implement advanced Claude Code workflows in your projects, from simple automation to complex enterprise deployments.
Abstract: With the emergence of the Satellite Internet of Things (S-IoT), mega-constellations are playing a pivotal role as the core communication infrastructure in large-scale connectivity scenarios.
Abstract: UDP Flood Denial of Service (DoS) attacks are a critical threat to network security, especially in IoT systems with limited resources. These attacks exploit the UDP (User Datagram Protocol), ...
We use Quarto to generate all outputs. @book{Nguyen2025TLBoAlg, author = {Duc-Tam Nguyen}, title = {The Little Book of algorithms}, year = {2025}, url = {https ...
Ready-to-use configurations for Anthropic's Claude Code. A comprehensive collection of AI agents, custom commands, settings, hooks, external integrations (MCPs), and project templates to enhance your ...
Abstract: With the evolution of automotive E/E architectures toward centralized designs, virtualization systems for intelligent cockpits impose higher demands on the security and reliability of ...
Abstract: Machine learning has been successfully applied to drug combination prediction in recent years. However, in some situations, the class imbalance problem still shows highly negative impacts on ...