Showing 12,261 - 12,280 results of 12,475 for search '"algorithm"', query time: 0.09s Refine Results
  1. 12261

    An Approach for Detecting Parkinson’s Disease by Integrating Optimal Feature Selection Strategies with Dense Multiscale Sample Entropy by Minh Tai Pham Nguyen, Minh Khue Phan Tran, Tadashi Nakano, Thi Hong Tran, Quoc Duy Nam Nguyen

    Published 2024-12-01
    “…Subsequent to the extraction process, correlation-based feature selection (CFS) and sequential backward selection (SBS) refine feature sets, improving algorithmic accuracy. To validate the feature extraction and selection stage, three classifiers—Adaptive Weighted K-Nearest Neighbors (AW-KNN), Radial Basis Function Support Vector Machine (RBF-SVM), and Multilayer Perceptron (MLP)—were employed to evaluate classification efficacy and ascertain optimal performance across selection strategies, including CFS, SBS, and the hybrid SBS-CFS approach. …”
    Get full text
    Article
  2. 12262

    Transitioning from wet lab to artificial intelligence: a systematic review of AI predictors in CRISPR by Ahtisham Fazeel Abbasi, Muhammad Nabeel Asim, Andreas Dengel

    Published 2025-02-01
    “…Following the success of artificial intelligence (AI) in various fields, researchers are now leveraging AI algorithms to catalyze and optimize the multi-step process of CRISPR-Cas9 system. …”
    Get full text
    Article
  3. 12263

    A Spatio-Temporal Deep Learning Model for Automatic Arctic Sea Ice Classification with Sentinel-1 SAR Imagery by Li Zhao, Yufeng Zhou, Wei Zhong, Cheng Jin, Bo Liu, Fangzhao Li

    Published 2025-01-01
    “…Based on deep learning technology, many automatic sea ice classification algorithms have been developed using synthetic aperture radar (SAR) imagery over the last decade. …”
    Get full text
    Article
  4. 12264

    Comparison of Phase Estimation Methods for Quantitative Susceptibility Mapping Using a Rotating-Tube Phantom by Kathryn E. Keenan, Ben P. Berman, Slávka Rýger, Stephen E. Russek, Wen-Tung Wang, John A. Butman, Dzung L. Pham, Joseph Dagher

    Published 2021-01-01
    “…The images were processed by 10 phase estimation algorithms including Laplacian, region-growing, branch-cut, temporal unwrapping, and maximum-likelihood methods, resulting in approximately 90 different combinations of data acquisition and phase estimation methods. …”
    Get full text
    Article
  5. 12265

    Species delimitation and microalgal cryptic diversity analysis of the genus Micractinium (Chlorophyta) by E. S. Krivina, A. D. Temraleeva, Yu. S. Bukin

    Published 2022-03-01
    “…Phylogenetic analysis showed that the genus Micractinium is characterized by high cryptic diversity. The algorithms used for species delimitation had different results on the number of potentially species-level clusters allocated. …”
    Get full text
    Article
  6. 12266

    A recurrence model for non-puerperal mastitis patients based on machine learning. by Gaosha Li, Qian Yu, Feng Dong, Zhaoxia Wu, Xijing Fan, Lingling Zhang, Ying Yu

    Published 2025-01-01
    “…A combination of four machine learning algorithms (XGBoost、Logistic Regression、Random Forest、AdaBoost) was employed to predict NPM recurrence, and the model with the highest Area Under the Curve (AUC) in the test set was selected as the best model. …”
    Get full text
    Article
  7. 12267

    Design and Experimental Evaluation of a Smart Intra-Row Weed Control System for Open-Field Cabbage by Shenyu Zheng, Xueguan Zhao, Hao Fu, Haoran Tan, Changyuan Zhai, Liping Chen

    Published 2025-01-01
    “…Future research will focus on optimizing control algorithms and feedback mechanisms to enhance the system’s dynamic response capability and adaptability, thereby advancing the development of sustainable agriculture and precision field management.…”
    Get full text
    Article
  8. 12268

    Implementasi Algoritma AES 256 CBC, BASE 64, Dan SHA 256 dalam Pengamanan dan Validasi Data Ujian Online by Ferzha Putra Utama, Gusman Wijaya, Ruvita Faurina, Arie Vatresia

    Published 2023-10-01
    “…This study proposes applying several cryptographic methods to secure and ensure the authenticity of online exam data using AES 256 CBC, Base 64, and SHA 256 algorithms. This research resulted in a website-based online exam application built using MERN Stack technology. …”
    Get full text
    Article
  9. 12269

    Deep learning solutions for inverse problems in advanced biomedical image analysis on disease detection by Amal Alshardan, Hany Mahgoub, Nuha Alruwais, Abdulbasit A. Darem, Wafa Sulaiman Almukadi, Abdullah Mohamed

    Published 2024-08-01
    “…Inverse problems contribute to uncovering subtle abnormalities by employing iterative optimization techniques and sophisticated algorithms, enabling precise and early disease detection. …”
    Get full text
    Article
  10. 12270

    Face Boundary Formulation for Harmonic Models: Face Image Resembling by Hung-Tsai Huang, Zi-Cai Li, Yimin Wei, Ching Yee Suen

    Published 2025-01-01
    “…This paper is devoted to numerical algorithms based on harmonic transformations with two goals: (1) face boundary formulation by blending techniques based on the known characteristic nodes and (2) some challenging examples of face resembling. …”
    Get full text
    Article
  11. 12271

    Linear IgA bullous dermatosis secondary to drugs: a real-world pharmacovigilance study of the FDA adverse event reporting system by Yixuan Yang, Hanzhang Xie, Shuhan Liu, Ying Jia, Bingnan Cui, Zhanshuo Xiao

    Published 2025-01-01
    “…A significant statistical association was considered when a drug signal met the criteria of all four algorithms.ResultsIn the FAERS database analysis, we identified 1,394 adverse event (AE) reports associated with LABD. …”
    Get full text
    Article
  12. 12272
  13. 12273

    Certainty of Linear Interrelation of Technical and Economic Parameters of Power Units of 300 МWt Thermal Power Stations by E. M. Farhadzadeh, A. Z. Muradaliyev, T. K. Rafiyeva, A. A. Rustamova

    Published 2020-03-01
    “…It would seem that there is a quite fully developed mathematical apparatus for regression and correlation analysis, a set of algorithms and calculation programs. But there is one specific feature that, if it is not taken into account, further increases the risk of an erroneous decision. …”
    Get full text
    Article
  14. 12274

    Identification of ubiquitination-related key biomarkers and immune infiltration in Crohn’s disease by bioinformatics analysis and machine learning by Wei Chen, Zeyan Xu, Haitao Sun, Wen Feng, Zhenhua Huang

    Published 2025-01-01
    “…Key genes were selected by combining hub genes from the protein-protein interaction (PPI) network with feature genes identified by Lasso and Random Forest (RF) algorithms. Additionally, the correlation between key genes and immune infiltration was assessed, and Gene Set Enrichment Analysis (GSEA) of key genes was conducted. …”
    Get full text
    Article
  15. 12275

    Rare variants in previously identified linkage regions associated with carotid plaque in Dominican Republic families. by Nicole D Dueker, Ashley Beecham, Liyong Wang, Chuanhui Dong, Ralph L Sacco, Susan H Blanton, Tatjana Rundek

    Published 2022-01-01
    “…Gene-based RV analyses were performed using the Sequence Association Test for familial data (F-SKAT) under two filtering algorithms; 1. all exonic RVs and 2. non-synonymous RVs. …”
    Get full text
    Article
  16. 12276

    Transparent memory tests with even repeating addresses for storage devices by V. N. Yarmolik, I. M. Mrozek, V. A. Levantsevich, D. V. Demenkovets

    Published 2021-09-01
    “…The concept of address sequences (pA) with an even repetition of addresses is introduced, which are the basis of the basic element included in the structure of the new transparent march tests March _pA_1 and March _pA_2. Algorithms for the formation of such sequences and examples of their implementations are given. …”
    Get full text
    Article
  17. 12277

    Religion and politics of belonging in digital times: youth religiosity in focus by Astrid Mattes, Miriam Haselbacher, Katharina Limacher, Christoph Novak

    Published 2025-01-01
    “…., confessional structures). This is guided by algorithms following the logic of attention economy that structures social media as well as by the conscious search for digital possibilities of inclusion. …”
    Get full text
    Article
  18. 12278

    Endoscopic sinus surgery outcomes in patients with chronic rhinosinusitis and immunoglobulin deficiencies by Shireen Samargandy, Elysia Grose, Jonathan Yip, John M. Lee

    Published 2023-06-01
    “…However, there is a paucity of literature on the surgical outcomes in this patient population and appropriate treatment algorithms for CRS in patients with ID. The objective of this study was to better elucidate the outcomes of endoscopic sinus surgery (ESS) in patients with ID in terms of disease-specific quality-of-life scores and the need for revision surgery. …”
    Get full text
    Article
  19. 12279

    INNOVATIVE MECHANISMS FOR IMPLEMENTING STATE ECONOMIC POLICY FOR POST-WAR RECONSTRUCTION OF UKRAINE: QUANTUM TRANSFORMATIONS AS A DRIVER OF DEVELOPMENT by Oleksiy Shkuratov, Liudmila Antonova, Roman Dzyuba

    Published 2024-12-01
    “…Countries such as the USA, China, Great Britain, EU countries, etc. have already invested billions in the creation of super-powerful quantum computers, the development of quantum cryptography algorithms, and the scaling of quantum communication. …”
    Get full text
    Article
  20. 12280

    A Spectral Transfer Function to Harmonize Existing Soil Spectral Libraries Generated by Different Protocols by Nicolas Francos, Daniela Heller-Pearlshtien, José A. M. Demattê, Bas Van Wesemael, Robert Milewski, Sabine Chabrillat, Nikolaos Tziolas, Adrian Sanz Diaz, María Julia Yagüe Ballester, Asa Gholizadeh, Eyal Ben-Dor

    Published 2023-01-01
    “…Soil spectral libraries (SSLs) are important big-data archives (spectra associated with soil properties) that are analyzed via machine-learning algorithms to estimate soil attributes. Since different spectral measurement protocols are applied when constructing SSLs, it is necessary to examine harmonization techniques to merge the data. …”
    Get full text
    Article