Search alternatives:
spatial research » pain research (Expand Search)
Showing 1,821 - 1,840 results of 4,583 for search '((\ spatial research algorithm\ ) OR ((\ pain OR \ main) research algorithm\ ))', query time: 0.30s Refine Results
  1. 1821
  2. 1822
  3. 1823
  4. 1824
  5. 1825

    Enhancing Security of Databases through Anomaly Detection in Structured Workloads by Charanjeet Dadiyala, Faijan Qureshi, Kritika Anil Bhattad, Sourabh Thakur, Nida Tabassum Sharif Sheikh, Kushagra Anil Kumar Singh

    Published 2025-02-01
    “…The main contribution and novelty of this research lies in leveraging the Isolation Forest algorithm for structured database workloads to proactively identify and mitigate potential security threats. …”
    Get full text
    Article
  6. 1826
  7. 1827

    Enhancing Security of Databases through Anomaly Detection in Structured Workloads by Charanjeet Dadiyala, Faijan Qureshi, Kritika Anil Bhattad, Sourabh Thakur, Nida Tabassum Sharif Sheikh, Kushagra Anil Kumar Singh

    Published 2025-02-01
    “…The main contribution and novelty of this research lies in leveraging the Isolation Forest algorithm for structured database workloads to proactively identify and mitigate potential security threats. …”
    Get full text
    Article
  8. 1828
  9. 1829

    Host Circulating Immunometabolism-Associated Biomarkers for Early Diagnosis of Active Tuberculosis: Multi-Omics Screening with Experimental Validation by Yang Z, Dong Y, Shang Y, Li H, Ren W, Li S, Pang Y

    Published 2025-08-01
    “…Four metabolism-related hub genes (GCH1, GK, MTHFD2, and SLC7A6) were identified using machine learning algorithms for the diagnosis of active TB with high accuracy and verified using external datasets. …”
    Get full text
    Article
  10. 1830
  11. 1831

    4SQR-Code: A 4-state QR code generation model for increasing data storing capacity in the Digital Twin framework by Ababil Islam Udoy, Muhammad Aminur Rahaman, Md. Jahidul Islam, Anichur Rahman, Zulfiqar Ali, Ghulam Muhammad

    Published 2024-12-01
    “…The structural flexibility of QR Code architecture opens many more possibilities for researchers in the domain of the Industrial Internet of Things (IIoT). …”
    Get full text
    Article
  12. 1832
  13. 1833
  14. 1834
  15. 1835
  16. 1836
  17. 1837

    Investigation of the Relation between South and Southwest Iran\'s Heavy Rainfall with Atmospheric Rivers (ARs). by Nesa sepandar, kamal omidvar

    Published 2021-06-01
    “…In this study, we tried to identify the sources of moisture and its direction of heavy rainfall in south and southwest of Iran by using a new algorithm based on atmospheric rivers. For this purpose, daily rainfall of 17 synoptic stations in the period 1986 to 2015 in south and southwestern Iran that have a common time span and fully cover the study area is used.Also from the data set of the National Center for Environmental Prediction / National Center for Atmospheric Research (NCEP / NCAR) European Mid-Term Forecast Center (ECMWF) and ERA-interim data with spatial resolution of 0.75 It was used at 0.75 latitude and longitude with 6 hour resolution. …”
    Get full text
    Article
  18. 1838

    Bile acids in follicular fluid: potential new therapeutic targets and predictive markers for women with diminished ovarian reserve by Shu Ding, Wenyan Li, Xianglei Xiong, Manfei Si, Chuyu Yun, Yuqian Wang, Lixuan Huang, Sen Yan, Xiumei Zhen, Jie Qiao, Xinyu Qi

    Published 2024-12-01
    “…Setting Reproductive medicine center within a hospital and university research laboratory. Population A total of 182 patients undergoing assisted reproductive technology were enrolled and categorized into the NOR group (n = 91) or the DOR group (n = 91). …”
    Get full text
    Article
  19. 1839
  20. 1840

    A New Asymmetric Fully Homomorphic Encryption Scheme for Cloud Banking Data by Zana Thalage Omar, Fadhil Salman Abed, Shaimaa Khamees Ahmed

    Published 2021-01-01
    “…The time it takes to encrypt and decrypt data is one of the main barriers it faces. Our current research provides a new algorithm for a publicly-keyed encryption system to keep bank data from tampering and theft when stored on the cloud computing platform, and our new system achieves fully Homomorphic Encryption, which allows mathematical operations to be performed on the encrypted text without the need for the original text. …”
    Get full text
    Article