Showing 781 - 800 results of 1,420 for search '((((model OR made) OR (made OR made)) OR made) OR more) screening algorithm', query time: 0.21s Refine Results
  1. 781

    Fecal occult blood affects intestinal microbial community structure in colorectal cancer by Wu Guodong, Wu Yinhang, Wu Xinyue, Shen Hong, Chu Jian, Qu Zhanbo, Han Shuwen

    Published 2025-01-01
    “…Characteristic gut bacteria were screened, and various machine learning algorithms were applied to construct CRC risk prediction models. …”
    Get full text
    Article
  2. 782

    Explainable machine learning for predicting lung metastasis of colorectal cancer by Zhentian Guo, Zongming Zhang, Limin Liu, Yue Zhao, Zhuo Liu, Chong Zhang, Hui Qi, Jinqiu Feng, Peijie Yao

    Published 2025-04-01
    “…We selected the best algorithm and visualized it using SHAP. We conducted a validation of the model utilizing data from a Chinese hospital to assess its practicality. …”
    Get full text
    Article
  3. 783

    Android malware detection based on APK signature information feedback by Xin-yu LIU, Jian WENG, Yue ZHANG, Bing-wen FENG, Jia-si WENG

    Published 2017-05-01
    “…A new malware detection method based on APK signature of information feedback (SigFeedback) was proposed.Based on SVM classification algorithm,the method of eigenvalue extraction adoped heuristic rule learning to sig APK information verify screening,and it also implemented the heuristic feedback,from which achieved the purpose of more accurate detection of malicious software.SigFeedback detection algorithm enjoyed the advantage of the high detection rate and low false positive rate.Finally the experiment show that the SigFeedback algorithm has high efficiency,making the rate of false positive from 13% down to 3%.…”
    Get full text
    Article
  4. 784

    Android malware detection based on APK signature information feedback by Xin-yu LIU, Jian WENG, Yue ZHANG, Bing-wen FENG, Jia-si WENG

    Published 2017-05-01
    “…A new malware detection method based on APK signature of information feedback (SigFeedback) was proposed.Based on SVM classification algorithm,the method of eigenvalue extraction adoped heuristic rule learning to sig APK information verify screening,and it also implemented the heuristic feedback,from which achieved the purpose of more accurate detection of malicious software.SigFeedback detection algorithm enjoyed the advantage of the high detection rate and low false positive rate.Finally the experiment show that the SigFeedback algorithm has high efficiency,making the rate of false positive from 13% down to 3%.…”
    Get full text
    Article
  5. 785

    Multi-Class Classification Using Improved Mahalanobis-Taguchi System Based on Binary Tree and Its Application by Niu Junlei

    Published 2025-06-01
    “…Aiming at the inadequacy of Mahalanobis-Taguchi System(MTS), an improved MTS optimization model(MTSO) is proposed. The core idea is that a number of optimization objectives are proposed based on the purpose and characteristics of the data classification problem and optimization model is used for screening important variables instead of orthogonal arrays and signal-noise-ratio. …”
    Get full text
    Article
  6. 786

    A statistical method for high-throughput emergence rate calculation for soybean breeding plots based on field phenotypic characteristics by Yan Sun, Mengqi Li, Meiling Liu, Jingyi Zhang, Yingli Cao, Xue Ao

    Published 2025-03-01
    “…Then, a soybean seedling counting algorithm was constructed: by establishing a soybean seedling growth model, the idea of “growth normalization” was proposed, and the expansion-compression factor was defined to eliminate the influence of soybean seedling growth inconsistency on counting. …”
    Get full text
    Article
  7. 787

    Cost-effectiveness analysis of best management practices for non-point source pollution in watersheds: A review by CHANG Jian, YU Jie, WANG Fei’er, ZHENG Siyuan

    Published 2017-03-01
    “…According to the accounting results, two optimization criteria, namely cost minimization and benefit maximization, were employed to screen for the most cost effective measures. Application of cost-effectiveness analysis method included three categories, coupling NPS model with empirical calculation methods, coupling NPS model with economic model and cost-effectiveness analysis based on optimization algorithm. …”
    Get full text
    Article
  8. 788

    Artificial Intelligence in Identifying Patients With Undiagnosed Nonalcoholic Steatohepatitis by Onur Baser, Gabriela Samayoa, Nehir Yapar, Erdem Baser

    Published 2024-09-01
    “…We performed a claims data analysis using a machine learning algorithm. To build our model, the study population was randomly divided into an 80% training subset and a 20% testing subset and tested and trained using a cross-validation technique. …”
    Get full text
    Article
  9. 789

    Road Perception for Autonomous Driving: Pothole Detection in Complex Environments Based on Improved YOLOv8 by Siyuan Kong, Qiao Meng, Xin Li, Zhijie Wang, Xin Liu, Bingyu Li

    Published 2025-01-01
    “…To address this, this paper proposes an innovative improved algorithm, which is based on the YOLOv8 model, and introduces the MSF-HFEB module in the innovative design. …”
    Get full text
    Article
  10. 790

    Increasing comprehensiveness and reducing workload in a systematic review of complex interventions using automated machine learning by Olalekan A Uthman, Rachel Court, Jodie Enderby, Lena Al-Khudairy, Chidozie Nduka, Hema Mistry, GJ Melendez-Torres, Sian Taylor-Phillips, Aileen Clarke

    Published 2022-11-01
    “…Background As part of our ongoing systematic review of complex interventions for the primary prevention of cardiovascular diseases, we have developed and evaluated automated machine-learning classifiers for title and abstract screening. The aim was to develop a high-performing algorithm comparable to human screening. …”
    Get full text
    Article
  11. 791

    Wavelet Transform-Based 3D Landscape Design and Optimization for Digital Cities by Yang Chen, Xiaolin Wang, Chang Zhang

    Published 2022-01-01
    “…The algorithm extracts mixed feature information of local long path and local short path based on the information retention module, and decomposes the information by combining wavelet transform, inputs the different components obtained from the decomposition into the network for training, and removes the noise by subsequent feature screening of the network structure. …”
    Get full text
    Article
  12. 792

    A comparison of tools used for tuberculosis diagnosis in resource-limited settings: a case study at Mubende referral hospital, Uganda. by Adrian Muwonge, Sydney Malama, Barend M de C Bronsvoort, Demelash Biffa, Willy Ssengooba, Eystein Skjerve

    Published 2014-01-01
    “…The three-predictor screening algorithm with and without DZM classified 50% and 33% of the true cases respectively, while the adjusted algorithm with DZM classified 78% of the true cases.…”
    Get full text
    Article
  13. 793

    A Dynamic Adaptive Ensemble Learning Framework for Noninvasive Mild Cognitive Impairment Detection: Development and Validation Study by Aoyu Li, Jingwen Li, Yishan Hu, Yan Geng, Yan Qiang, Juanjuan Zhao

    Published 2025-01-01
    “…To address the challenges (eg, the curse of dimensionality and increased model complexity) posed by high-dimensional features, we developed a dynamic adaptive feature selection optimization algorithm to identify the most impactful subset of features for classification performance. …”
    Get full text
    Article
  14. 794

    The Chaotic Prediction for Aero-Engine Performance Parameters Based on Nonlinear PLS Regression by Chunxiao Zhang, Junjie Yue

    Published 2012-01-01
    “…At the same time, the forecast error is less than that of nonlinear PLS algorithm through bootstrap test screening.…”
    Get full text
    Article
  15. 795

    Predicting Affinity Through Homology (PATH): Interpretable binding affinity prediction with persistent homology. by Yuxi Long, Bruce R Donald

    Published 2025-06-01
    “…Compared to current binding affinity prediction algorithms, PATH+ shows similar or better accuracy and is more generalizable across orthogonal datasets. …”
    Get full text
    Article
  16. 796

    Breast cancer detection and classification with digital breast tomosynthesis: a two-stage deep learning approach by Yazeed Alashban

    Published 2025-05-01
    “…CLINICAL SIGNIFICANCE: The proposed two-tier DL algorithm, combining a modified VGG19 model for image classification and YOLOv5-CBAM for lesion detection, can improve the accuracy, efficiency, and reliability of breast cancer screening and diagnosis through innovative artificial intelligence-driven methodologies.…”
    Get full text
    Article
  17. 797
  18. 798

    A Three-Dimensional Phenotype Extraction Method Based on Point Cloud Segmentation for All-Period Cotton Multiple Organs by Pengyu Chu, Bo Han, Qiang Guo, Yiping Wan, Jingjing Zhang

    Published 2025-05-01
    “…Experimental data show that, in the task of organ segmentation throughout the entire cotton growth cycle, the ResDGCNN model achieved a segmentation accuracy of 67.55%, with a 4.86% improvement in mIoU compared to the baseline model. …”
    Get full text
    Article
  19. 799

    Design, Fabrication, and Application of Large-Area Flexible Pressure and Strain Sensor Arrays: A Review by Xikuan Zhang, Jin Chai, Yongfu Zhan, Danfeng Cui, Xin Wang, Libo Gao

    Published 2025-03-01
    “…The rapid development of flexible sensor technology has made flexible sensor arrays a key research area in various applications due to their exceptional flexibility, wearability, and large-area-sensing capabilities. …”
    Get full text
    Article
  20. 800

    RRBM-YOLO: Research on Efficient and Lightweight Convolutional Neural Networks for Underground Coal Gangue Identification by Yutong Wang, Ziming Kou, Cong Han, Yuchen Qin

    Published 2024-10-01
    “…Coal gangue identification is the primary step in coal flow initial screening, which mainly faces problems such as low identification efficiency, complex algorithms, and high hardware requirements. …”
    Get full text
    Article