Showing 781 - 800 results of 1,436 for search '((((mode OR (model OR made)) OR made) OR made) OR more) screening algorithm', query time: 0.20s Refine Results
  1. 781

    AI-driven biomarker discovery: enhancing precision in cancer diagnosis and prognosis by Esther Ugo Alum

    Published 2025-03-01
    “…Existing gaps include data quality, algorithmic transparency, and ethical concerns around privacy, among others. …”
    Get full text
    Article
  2. 782

    Play, watch, share: the dissemination of the cultural presence of games on video-based social media by Qiaohe Zhang, Yixuan Shao, Xu Li

    Published 2025-07-01
    “…Finally, text proctyessing is performed via manual coding, screening, classification and summarization. We obtain the IR dissemination model of digital cultural presence. 1. …”
    Get full text
    Article
  3. 783

    Callback time preference for prescreening visits among Black residents in the Boston area: findings from two randomized controlled trials by Ruth Zeto, Oluwagbemisola Ibikunle, Jingyi Cao, Hannah Col, Dhrumil Patil, Ruth-Alma Turkson-Ocran, Mingyu Zhang, Timothy B. Plante, Stephen P. Juraschek

    Published 2025-08-01
    “…Staff call attempts and participant screening status were logged prospectively. Gender was estimated based on first name, using a published algorithm. …”
    Get full text
    Article
  4. 784

    Analysis of Facial Areas to Identify CHD Risks Based on Facial Textures by Budi Sunarko, Agung Adi Firdaus, Yudha Andriano Rismawan, Anan Nugroho

    Published 2025-02-01
    “…Early screening for coronary heart disease (CHD) remains insufficiently addressed, underscoring the need for a more effective screening tool. …”
    Get full text
    Article
  5. 785

    A hybrid super learner ensemble for phishing detection on mobile devices by Routhu Srinivasa Rao, Cheemaladinne Kondaiah, Alwyn Roshan Pais, Bumshik Lee

    Published 2025-05-01
    “…Abstract In today’s digital age, the rapid increase in online users and massive network traffic has made ensuring security more challenging. Among the various cyber threats, phishing remains one of the most significant. …”
    Get full text
    Article
  6. 786

    EDITORIAL: ARTIFICIAL INTELLIGENCE AND ITS TRANSFORMATIVE IMPACT ON SCIENTIFIC PUBLISHING by Abubakar Munir

    Published 2025-03-01
    “…Conventional software such as Turnitin and iThenticate have come a long way, using deep learning algorithms to identify more evolved instances of academic fraud, including paraphrasing plagiarism and AI-generated content. …”
    Get full text
    Article
  7. 787

    Cheetah optimized CNN: A bio-inspired neural network for automated diabetic retinopathy detection by V. K. U. Ahamed Gani, N. Shanmugasundaram

    Published 2025-05-01
    “…The proposed CO-CNN approach shows superior performance compared to that of state-of-the-art methods, offering potential applications in telemedicine, treatment planning, early detection, screening, and patient education. Integrating fuzzy logic enhances the model’s interpretability and robustness, paving the way for improved healthcare outcomes in diabetic retinopathy management.…”
    Get full text
    Article
  8. 788

    Chinese AI tool ERNIE Bot Textual Exploration of False Information by Fu Yue

    Published 2024-01-01
    “…In order to improve the accuracy of detection, this paper proposes countermeasures to improve the AI detection algorithm, enhance data training and model optimisation, and human-machine collaboration. …”
    Get full text
    Article
  9. 789

    Maternal factors associated with early-onset neonatal sepsis among caesarean-delivered babies at Mbarara Regional Referral Hospital, Uganda: a case-control study by James M. Maisaba, Richard Migisha, Asiphas Owaraganise, Leevan Tibaijuka, David Collins Agaba, Joy Muhumuza, Joseph Ngonzi, Stella Kyoyagala, Musa Kayondo

    Published 2024-10-01
    “…We enrolled mother-baby pairs for both groups, obtaining maternal data via structured questionnaires The diagnosis of EONS was made using the WHO Young Infant Integrated Management of Childhood Illnesses algorithm. …”
    Get full text
    Article
  10. 790

    Fecal occult blood affects intestinal microbial community structure in colorectal cancer by Wu Guodong, Wu Yinhang, Wu Xinyue, Shen Hong, Chu Jian, Qu Zhanbo, Han Shuwen

    Published 2025-01-01
    “…Characteristic gut bacteria were screened, and various machine learning algorithms were applied to construct CRC risk prediction models. …”
    Get full text
    Article
  11. 791

    Explainable machine learning for predicting lung metastasis of colorectal cancer by Zhentian Guo, Zongming Zhang, Limin Liu, Yue Zhao, Zhuo Liu, Chong Zhang, Hui Qi, Jinqiu Feng, Peijie Yao

    Published 2025-04-01
    “…We selected the best algorithm and visualized it using SHAP. We conducted a validation of the model utilizing data from a Chinese hospital to assess its practicality. …”
    Get full text
    Article
  12. 792

    Android malware detection based on APK signature information feedback by Xin-yu LIU, Jian WENG, Yue ZHANG, Bing-wen FENG, Jia-si WENG

    Published 2017-05-01
    “…A new malware detection method based on APK signature of information feedback (SigFeedback) was proposed.Based on SVM classification algorithm,the method of eigenvalue extraction adoped heuristic rule learning to sig APK information verify screening,and it also implemented the heuristic feedback,from which achieved the purpose of more accurate detection of malicious software.SigFeedback detection algorithm enjoyed the advantage of the high detection rate and low false positive rate.Finally the experiment show that the SigFeedback algorithm has high efficiency,making the rate of false positive from 13% down to 3%.…”
    Get full text
    Article
  13. 793

    Android malware detection based on APK signature information feedback by Xin-yu LIU, Jian WENG, Yue ZHANG, Bing-wen FENG, Jia-si WENG

    Published 2017-05-01
    “…A new malware detection method based on APK signature of information feedback (SigFeedback) was proposed.Based on SVM classification algorithm,the method of eigenvalue extraction adoped heuristic rule learning to sig APK information verify screening,and it also implemented the heuristic feedback,from which achieved the purpose of more accurate detection of malicious software.SigFeedback detection algorithm enjoyed the advantage of the high detection rate and low false positive rate.Finally the experiment show that the SigFeedback algorithm has high efficiency,making the rate of false positive from 13% down to 3%.…”
    Get full text
    Article
  14. 794

    Machine learning in dentistry and oral surgery: charting the course with bibliometric insights by Shuangwei Liu, Yuquan Hao, Shijie Zhu, Liyao Wan, Zhe Yi, Zhichang Zhang

    Published 2025-06-01
    “…Moreover, challenges, such as data availability and security, algorithmic biases, and “black-box models”, must be addressed. …”
    Get full text
    Article
  15. 795
  16. 796

    Multi-Class Classification Using Improved Mahalanobis-Taguchi System Based on Binary Tree and Its Application by Niu Junlei

    Published 2025-06-01
    “…Aiming at the inadequacy of Mahalanobis-Taguchi System(MTS), an improved MTS optimization model(MTSO) is proposed. The core idea is that a number of optimization objectives are proposed based on the purpose and characteristics of the data classification problem and optimization model is used for screening important variables instead of orthogonal arrays and signal-noise-ratio. …”
    Get full text
    Article
  17. 797

    A statistical method for high-throughput emergence rate calculation for soybean breeding plots based on field phenotypic characteristics by Yan Sun, Mengqi Li, Meiling Liu, Jingyi Zhang, Yingli Cao, Xue Ao

    Published 2025-03-01
    “…Then, a soybean seedling counting algorithm was constructed: by establishing a soybean seedling growth model, the idea of “growth normalization” was proposed, and the expansion-compression factor was defined to eliminate the influence of soybean seedling growth inconsistency on counting. …”
    Get full text
    Article
  18. 798

    Hydraulic Pump Fault Diagnosis Method Based on EWT Decomposition Denoising and Deep Learning on Cloud Platform by Wanlu Jiang, Zhenbao Li, Sheng Zhang, Teng Wang, Shuqing Zhang

    Published 2021-01-01
    “…Compared with ensemble empirical mode decomposition (EEMD) and complementary ensemble empirical mode decomposition (CEEMD), the results show that the axial piston pump fault diagnosis algorithm based on EWT and 1D-CNN has higher fault identification accuracy.…”
    Get full text
    Article
  19. 799

    Research on Feature Extraction of Performance Degradation for Flexible Material R2R Processing Roller Based on PCA by Yaohua Deng, Huiqiao Zhou, Kexing Yao, Zhiqi Huang, Chengwang Guo

    Published 2020-01-01
    “…The Jacobi iteration method was introduced to derive the algorithm for solving eigenvalue and eigenvector of the covariance matrix. …”
    Get full text
    Article
  20. 800

    AI-Powered Synthesis of Structured Multimodal Breast Ultrasound Reports Integrating Radiologist Annotations and Deep Learning Analysis by Khadija Azhar, Byoung-Dai Lee, Shi Sub Byon, Kyu Ran Cho, Sung Eun Song

    Published 2024-09-01
    “…Additionally, the deep-learning-based algorithm, utilizing DenseNet-121 as its core model, achieved an overall accuracy of 0.865, precision of 0.868, recall of 0.847, F1-score of 0.856, and area under the receiver operating characteristics of 0.92 in classifying tissue stiffness in breast US shear-wave elastography (SWE-mode) images. …”
    Get full text
    Article