-
16021
Decoding cortical folding patterns in marmosets using machine learning and large language model
Published 2025-03-01“…Utilizing advanced machine learning algorithm and large language model (LLM), we identified genes with significant transcriptomic differences between concave (sulci) and convex (gyri) cortical patterns. …”
Get full text
Article -
16022
Road Pavement Information Modeling through Maintenance Scenario Evaluation
Published 2021-01-01“…The database associated to the BIM model is a collection of three years of data derived from laboratory investigation on bituminous mixtures’ samples adopted for the maintenance of four main roads located in southern Italy. An algorithm that interacts with the three-dimensional road model has been implemented in order to give road administrations an easy-to-read alert signal for the road pavement structure of the road network that may present the most critical conditions due to poor mechanical and physical features.…”
Get full text
Article -
16023
Instantaneous Frequency Identification Using Adaptive Linear Chirplet Transform and Matching Pursuit
Published 2016-01-01“…The matching pursuit algorithm is employed to select optimal chirplets, and a modified version of chirplet transform is presented to estimate nonlinear varying frequencies. …”
Get full text
Article -
16024
Stall Flutter Control of a Smart Blade Section Undergoing Asymmetric Limit Oscillations
Published 2016-01-01“…Then, for the design of the stall flutter controller, the potential sensor signal for the stall flutter, the microtab control capability of the stall flutter, and the control algorithm for the stall flutter are studied. The improvement and the superiority of the proposed adaptive stall flutter controller are shown by comparison with a simple stall flutter controller.…”
Get full text
Article -
16025
The Adjustment of Covariates in Cox’s Model under Case-Cohort Design
Published 2020-01-01“…For calculating the maximum likelihood estimates of the regression coefficients subject in Cox’s model, a minorization-maximization (MM) algorithm is developed. Simulation studies are performed to compare the estimations with the covariates undistorted, distorted, and adjusted to illustrate the proposed methods.…”
Get full text
Article -
16026
Validation and Refinement of the Baveno VI Criteria for Ruling Out High-Risk Varices
Published 2020-01-01“…The Baveno VI criteria recommend the use of a simple algorithm based on a liver stiffness measurement<20 kPa through transient elastography and a platelet count>150×109/L for ruling out high-risk varices in patients with compensated advanced chronic liver disease. …”
Get full text
Article -
16027
A Hybrid Multiuser Detector Based on MMSE and AFSA for TDRS System Forward Link
Published 2014-01-01“…Minimum mean square error (MMSE) is a low complexity multiuser detection method, but MMSE detector cannot achieve satisfactory bit error ratio and near-far resistance, whereas artificial fish swarm algorithm (AFSA) is expert in optimization and it can realize the global convergence efficiently. …”
Get full text
Article -
16028
Indoor Mobile Localization in Wireless Sensor Network under Unknown NLOS Errors
Published 2013-02-01“…Simulation results show that the LC-MKHF algorithm has higher estimate accuracy in comparison with no-filter, Kalman filter, and H -infinity filter methods. …”
Get full text
Article -
16029
Formulation of Scientific Concepts as a Component of the Research Competence of Future Teachers
Published 2019-07-01“…The authors consider three types of tasks for the formulation of scientific concepts of different levels of complexity, describe an algorithm for performing by students tasks of each type. …”
Get full text
Article -
16030
Design and Analysis of a Stand-Alone PV System for a Rural House in Pakistan
Published 2019-01-01“…Perturbation and observation-based algorithm has been used for maximum power extraction from PV. …”
Get full text
Article -
16031
Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing
Published 2014-01-01“…Thirdly, we present the algorithm of detecting privacy conflict in the process of cloud service composition and prove the correctness and feasibility of this method by case study and experiment analysis. …”
Get full text
Article -
16032
Komparasi Data Mining Naive Bayes dan Neural Network memprediksi Masa Studi Mahasiswa S1
Published 2020-05-01“…By using the data mining algorithm Naive bayes and neural network, the student graduation in STMIK Widya Cipta Dharma (WiCiDa) can be predicted. …”
Get full text
Article -
16033
Easy Data Augmentation untuk Data yang Imbalance pada Konsultasi Kesehatan Daring
Published 2023-10-01“…We employ the Indonesian thesaurus for changing synonyms in the EDA and do empirical experiments on parameters required by the algorithm to obtain optimal results of text augmentation. …”
Get full text
Article -
16034
Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing
Published 2022-06-01“…Conclusions: The ciphertext policy hiding access control scheme based on blockchain and supporting data sharing constructed in this paper solves the problems of single point of failure, low efficiency, non-support for data sharing and privacy leakage in traditional attribute-based encryption schemes.Firstly,the attribute vector and policy vector generation algorithm proposed in this paper not only supports AND-gates on+/-,but also supports AND-gates on multi-valued attributes by extension. …”
Get full text
Article -
16035
Penggunaan Internet Dikalangan Siswa SD di Kota Ternate: Suatu Survey, Penerapan Algoritma Clustering dan Validasi DBI
Published 2020-12-01“…In addition, the data from the survey results are then clustered using the k-means clustering algorithm. Then the clustering validation was performed with the bouldin index davies. …”
Get full text
Article -
16036
Klasifikasi Aktivitas Manusia Menggunakan Algoritme Computed Input Weight Extreme Learning Machine dengan Reduksi Dimensi Principal Component Analysis
Published 2022-12-01“…The best hyperparameter obtained for the PCA algorithm is with a value of k = 207, and for the CIW-ELM algorithm with the number of hidden neurons = 600 and the sigmoid activation function. …”
Get full text
Article -
16037
Peningkatan Performa Pengelompokan Siswa Berdasarkan Aktivitas Belajar pada Media Pembelajaran Digital Menggunakan Metode Adaptive Moving Self-Organizing Maps
Published 2022-02-01“…The results showed that there was a statistically significant difference between the quantization error and the topographic error of the AMSOM algorithm and the SOM algorithm. The AMSOM method produces an average quantization error 27 times smaller and an average topographic error 54 times smaller than the SOM method. …”
Get full text
Article -
16038
MAP17 is a Novel NASH Progression Biomarker Associated with Macrophage Infiltration, Immunotherapy Response, and Oxidative Stress
Published 2025-01-01“…Our further analyses included differential expression evaluation, protein-protein interaction (PPI) network analysis, and Venn diagram analysis to discover novel targets. The CIBERSORT algorithm assessed the correlation between MAP17 and immune cell infiltration within the tumor microenvironment (TME), while the TIDE algorithm predicted responses to immunotherapy. …”
Get full text
Article -
16039
Identification of PET/CT radiomic signature for classification of locally recurrent rectal cancer: A network-based feature selection approach
Published 2025-01-01“…Feature selection was performed using a novel approach derived from gene expression analysis, based on the DNetPRO algorithm. The prediction was done using a Support Vector Classifier (SVC) with a 10-fold cross-validation. …”
Get full text
Article -
16040
Classification and diagnosis of cervical lesions based on colposcopy images using deep fully convolutional networks: A man-machine comparison cohort study
Published 2025-01-01“…Moreover, image-based and population-based diagnostic performances of the AI algorithm and physicians with different levels of specialist experience were compared. …”
Get full text
Article