-
161
Evaluation of deep learning and convolutional neural network algorithms accuracy for detecting and predicting anatomical landmarks on 2D lateral cephalometric images: A systematic...
Published 2023-07-01“…Machine learning (ML) algorithms have been used to accurately identify cephalometric landmarks and detect irregularities related to orthodontics and dentistry. …”
Get full text
Article -
162
Evaluation of a 1-hour troponin algorithm for diagnosing myocardial infarction in high-risk patients admitted to a chest pain unit: the prospective FAST-MI cohort study
Published 2019-11-01“…This algorithm recommend by current guidelines was previously developed in cohorts with a prevalence of MI of less than 20%.Design Prospective cohort study from November 2015 until December 2016.Setting Dedicated chest pain unit of a single referral centre.Participants Consecutive patients with suspected MI were screened. …”
Get full text
Article -
163
-
164
A Blockchain Solution for the Internet of Vehicles with Better Filtering and Adaptive Capabilities
Published 2025-02-01“…To solve this problem, we propose a gradually accelerating environment adaptive consensus algorithm, AE-PBFT, that can be applied to IoV. It includes a trust management model that achieves gradual acceleration by recording the historical continuous behavior of nodes, thereby improving the efficiency of screening nodes with different intentions, accelerating the consensus process, and reducing latency. …”
Get full text
Article -
165
Integrating machine learning and multi-omics analysis to unveil key programmed cell death patterns and immunotherapy targets in kidney renal clear cell carcinoma
Published 2025-05-01“…We utilized a combination of 101 machine learning algorithms to analyze the TCGA-KIRC cohort and the GSE22541 KIRC patients, screening for cell death patterns closely associated with prognosis from 18 potential modes. …”
Get full text
Article -
166
The taming of sociodigital anticipations: AI in the digital welfare state
Published 2025-05-01“…“Tamed” anticipations of advanced algorithms are rooted within challenging working conditions (insufficient resources and time for clients), reconfigurations of roles and agencies (administration of systems instead of supporting clients) and nested within transformations of techno-bureaucratic regimes (from street- over screen- to system-level bureaucracies), which they envision to rectify and repair. …”
Get full text
Article -
167
Reflective Distributed Denial of Service Detection: A Novel Model Utilizing Binary Particle Swarm Optimization—Simulated Annealing for Feature Selection and Gray Wolf Optimization-...
Published 2024-09-01“…The BPSO-SA algorithm enhances the global search capability of Particle Swarm Optimization (PSO) using the SA mechanism and effectively screens out the optimal feature subset; the GWO algorithm optimizes the hyperparameters of LightGBM by simulating the group hunting behavior of gray wolves to enhance the detection performance of the model. …”
Get full text
Article -
168
Artificial Intelligence in the Non-Invasive Detection of Melanoma
Published 2024-12-01“…The use of artificial intelligence (AI)-based technologies in dermatology has emerged in recent years to assist in the diagnosis of melanoma that may be more accessible to all patients and more accurate than current methods of screening. …”
Get full text
Article -
169
Predictive Models for Educational Purposes: A Systematic Review
Published 2024-12-01“…The findings show that ML algorithms consistently outperform traditional models due to their capacity to handle large, non-linear datasets and continuously enhance predictive accuracy as new patterns emerge. …”
Get full text
Article -
170
Short-term Wind Power Forecasting Based on BWO‒VMD and TCN‒BiGRU
Published 2025-05-01“…This combination model aims to use the advantages of TCN and BiGRU to process data and make more accurate predictions. Finally, the pre-dicted values of each subsequence are sequentially stacked to obtain the result, which is expected to provide reliable predictions for wind power generation.Results and DiscussionsThe RF algorithm is strategically employed to screen meteorological features and systematically rank their importance, enabling the accurate selection of features that significantly impact wind power forecasting. …”
Get full text
Article -
171
A Small-Sample Scenario Optimization Scheduling Method Based on Multidimensional Data Expansion
Published 2025-06-01“…Firstly, based on spatial correlation, the daily power curves of PV power plants with measured power are screened, and the meteorological similarity is calculated using multicore maximum mean difference (MK-MMD) to generate new energy output historical data of the target distributed PV system through the capacity conversion method; secondly, based on the existing daily load data of different types, the load historical data are generated using the stochastic and simultaneous sampling methods to construct the full historical dataset; subsequently, for the sample imbalance problem in the small-sample scenario, an oversampling method is used to enhance the data for the scarce samples, and the XGBoost PV output prediction model is established; finally, the optimal scheduling model is transformed into a Markovian decision-making process, which is solved by using the Deep Deterministic Policy Gradient (DDPG) algorithm. …”
Get full text
Article -
172
State-of-the-Art Review on the Application of Unmanned Aerial Vehicles (UAVs) in Power Line Inspections: Current Innovations, Trends, and Future Prospects
Published 2025-03-01“…Unmanned aerial vehicles (UAVs) make power line inspections more safe, efficient, and cost-effective, replacing risky manual checks and expensive helicopter surveys while overcoming challenges like stability and regulations. …”
Get full text
Article -
173
Identification and Validation of Circadian Rhythm‐Related Genes Involved in Intervertebral Disc Degeneration and Analysis of Immune Cell Infiltration via Machine Learning
Published 2025-06-01“…Results Six hub genes related to CRs (CCND1, FOXO1, FRMD8, NTRK2, PRRT1, and TFPI) were screened out. Immune infiltration analysis revealed that the IVDD group had significantly more M0 macrophages and significantly fewer follicular helper T cells than those of the control group. …”
Get full text
Article -
174
Exploring patterns in pediatric type 1 diabetes care and the impact of socioeconomic status
Published 2025-04-01“…Higher socioeconomic status is associated with care that more closely adheres to clinical guidelines.…”
Get full text
Article -
175
A Dual-Variable Selection Framework for Enhancing Forest Aboveground Biomass Estimation via Multi-Source Remote Sensing
Published 2025-07-01“…The dual-variable selection strategy integrates SHAP with the Pearson correlation coefficient (PC), RF, EN, and Lasso to enhance feature screening robustness and interpretability. The results of the study showed that Lasso-SHAP dual-variate screening was more stable than SHAP univariate screening. …”
Get full text
Article -
176
-
177
Android malware detection based on APK signature information feedback
Published 2017-05-01“…A new malware detection method based on APK signature of information feedback (SigFeedback) was proposed.Based on SVM classification algorithm,the method of eigenvalue extraction adoped heuristic rule learning to sig APK information verify screening,and it also implemented the heuristic feedback,from which achieved the purpose of more accurate detection of malicious software.SigFeedback detection algorithm enjoyed the advantage of the high detection rate and low false positive rate.Finally the experiment show that the SigFeedback algorithm has high efficiency,making the rate of false positive from 13% down to 3%.…”
Get full text
Article -
178
Android malware detection based on APK signature information feedback
Published 2017-05-01“…A new malware detection method based on APK signature of information feedback (SigFeedback) was proposed.Based on SVM classification algorithm,the method of eigenvalue extraction adoped heuristic rule learning to sig APK information verify screening,and it also implemented the heuristic feedback,from which achieved the purpose of more accurate detection of malicious software.SigFeedback detection algorithm enjoyed the advantage of the high detection rate and low false positive rate.Finally the experiment show that the SigFeedback algorithm has high efficiency,making the rate of false positive from 13% down to 3%.…”
Get full text
Article -
179
Predicting Affinity Through Homology (PATH): Interpretable binding affinity prediction with persistent homology.
Published 2025-06-01“…Compared to current binding affinity prediction algorithms, PATH+ shows similar or better accuracy and is more generalizable across orthogonal datasets. …”
Get full text
Article -
180
Play, watch, share: the dissemination of the cultural presence of games on video-based social media
Published 2025-07-01“…This study examines the dissemination mode of the cultural presence of digital games through interactive ritual (IR) theory, which is helpful for understanding the components of the cultural phenomena formed by it. …”
Get full text
Article