-
12861
How to crack a SMILES: automatic crosschecked chemical structure resolution across multiple services using MoleculeResolver
Published 2025-08-01“…MoleculeResolver systematically crosschecks structures retrieved from multiple reputable chemical databases, implements rigorous identifier plausibility checks, standardizes molecular structures, and intelligently selects the most accurate representation based on a unique resolution algorithm. Scientific contribution Benchmarks across diverse datasets confirm that MoleculeResolver significantly enhances precision, recall, and overall reliability compared to traditional single-source methods, proving its utility as a valuable resource for chemists, data scientists, and researchers engaged in high-quality molecular data analysis and predictive model development. …”
Get full text
Article -
12862
Three-Dimensional Impact Time and Angle Control Guidance Based on MPSP
Published 2019-01-01“…The guidance law is devised using the model predictive static programming (MPSP) method, and the control saturation constraint is incorporated in the MPSP algorithm. …”
Get full text
Article -
12863
HMS-PAU-IN: A heterogeneous multi-scale spatiotemporal interaction network model for population analysis units
Published 2025-06-01“…To validate the model, we developed a population prediction model that integrates the multi-scale features of PAUs and introduced Leiden-IES-PMS, a community detection method based on the Leiden algorithm, which integrates internal and external environmental semantics and adopts a proximity merging strategy. …”
Get full text
Article -
12864
Real-time monitoring of soil moisture in cotton fields using electromagnetic induction technology
Published 2025-05-01“…Currently, electromagnetic induction technology provides a non-destructive alternative, using the inversion simulation of soil apparent electrical conductivity (ECa) to construct an empirical θg model, but the prediction accuracy of the constructed model is questioned when dealing with dynamic or highly uncertain data, resulting in large errors in the prediction results and cannot meet the needs of practical applications. …”
Get full text
Article -
12865
Collaborative optimization of signals and ecological driving speed guidance for buses without dedicated bus lanes in the connected environment
Published 2024-12-01“…Initially, an Extended Kalman Filter is employed to predict the arrival time of buses at intersections and the signal status. …”
Get full text
Article -
12866
Computer Vision-Based Robotic System Framework for the Real-Time Identification and Grasping of Oysters
Published 2025-04-01“…In order to capture oyster motion dynamically on a conveyor belt, a Kalman filter (KF) combined with a Low-Pass filter algorithm was employed to predict oyster trajectories, thereby improving noise reduction and motion stability. …”
Get full text
Article -
12867
Tumor associated neutrophils promote prostate cancer progression by mediating neutrophil trap secretion through PSMA1- NF-κB-HIF-1α signaling axis
Published 2025-08-01“…Prostate cancer (PCa) is a common and deadly cancer in men, and despite its low specificity, PSA testing is the main method that is used to predict prognosis. Effective methods for predicting prognosis in clinical practice are lacking. …”
Get full text
Article -
12868
Grey Wolf Resampling-Based Rao-Blackwellized Particle Filter for Mobile Robot Simultaneous Localization and Mapping
Published 2021-01-01“…In addition, we propose an adaptive local data association (Range-SLAM) scheme to improve the computational efficiency for the algorithm of the nearest neighbor (NN) data association in the iteration of the RBPF prediction. …”
Get full text
Article -
12869
Efficient signcryption scheme based on Cocks’ identity cryptosystem
Published 2020-12-01“…Most of the existing identity-based signcryption schemes are based on bilinear or multilinear pairing operations construction.To solve the problem of low efficiency caused by complex pair operation, a new efficient signcryption scheme based on the identity cryptosystem of Cocks was proposed.Firstly, the security model of the proposed scheme was formalized, and the definition of confidentiality and unforgeability was given.Secondly, the quadratic residue problem was used to realize the concrete construction of the proposed scheme, and the signature algorithm was designed in a logical step by combining Jacobi symbol operation.Finally, the security proofed that the scheme satisfied the confidentiality and unforgeability was given under the random prediction model.The efficiency analysis shows that compared with the existing identity-based signcryption scheme, the proposed scheme greatly improves the computing efficiency and has good characteristics of identity-based cryptosystem.…”
Get full text
Article -
12870
Complexity control method of random forest based HEVC
Published 2019-02-01“…High efficiency video coding (HEVC) has high computational complexity,and fast algorithm cannot perform video coding under restricted coding time.Therefore,a complexity control method of HEVC based on random forest was proposed.Firstly,three random forest classifiers with different prediction accuracy were trained to provide various coding configurations for coding tree unit (CTU).Then,an average depth-complexity model was built to allocate CTU complexity.Finally,the CTU coding configuration,determined by the smoothness,average depth,bit,and CTU-level accumulated coding error,was used to complete complexity control.The experimental results show that the proposed method has better complexity control precision,and outperforms the state-of-the-art method in terms of video quality.…”
Get full text
Article -
12871
基于改进Kriging模型的主动学习可靠性分析方法
Published 2021-01-01“…,the differential evolution algorithm is introduced to explore the optimal parameter of Kriging model and improve the accuracy of Kriging prediction information.As a result,the training point in each iteration is guaranteed to be the global optimal one and the efficiency of ALK model is largely improved.…”
Get full text
Article -
12872
Efficient signcryption scheme based on Cocks’ identity cryptosystem
Published 2020-12-01“…Most of the existing identity-based signcryption schemes are based on bilinear or multilinear pairing operations construction.To solve the problem of low efficiency caused by complex pair operation, a new efficient signcryption scheme based on the identity cryptosystem of Cocks was proposed.Firstly, the security model of the proposed scheme was formalized, and the definition of confidentiality and unforgeability was given.Secondly, the quadratic residue problem was used to realize the concrete construction of the proposed scheme, and the signature algorithm was designed in a logical step by combining Jacobi symbol operation.Finally, the security proofed that the scheme satisfied the confidentiality and unforgeability was given under the random prediction model.The efficiency analysis shows that compared with the existing identity-based signcryption scheme, the proposed scheme greatly improves the computing efficiency and has good characteristics of identity-based cryptosystem.…”
Get full text
Article -
12873
Echo state networks for modeling turbulent convection
Published 2024-12-01“…Even for this highly turbulent flow, it is challenging to distinguish predictions from the ground truth. The statistical convergence of the ESN goes beyond the velocity values and is represented in secondary aspects of the flow dynamics, such as spatial and temporal derivatives and vortices. …”
Get full text
Article -
12874
Post-Pandemic Urban Future: Identification of the main trends of change in Latin America, through the application of the Delphi method
Published 2022-05-01“…Additionally, it employs machine learning algorithms to transform them into predictions. The sample is made up of 26 panelists from different Latin American countries, who participated in successive questionnaires until stable results were reached. …”
Get full text
Article -
12875
Advanced Solar Irradiance Forecasting Using Hybrid Ensemble Deep Learning and Multisite Data Analytics for Optimal Solar-Hydro Hybrid Power Plants
Published 2025-01-01“…A novel hybrid decomposed residual ensembling model for deep learning (SBLTSRARW) using models such as autoregressive integrated moving average (ARIMA) and seasonal-trend decomposition using loess (STL) along with prediction and optimization models such as Bidirectional LSTM (Bi-LSTM), and Whale Optimization Algorithm (WOA) methods are used to predict the irradiances. …”
Get full text
Article -
12876
An Empirical Configuration Study of a Common Document Clustering Pipeline
Published 2023-09-01“…The results suggest that BERT embeddings combined with UMAP dimension reduction to no less than 15 dimensions provides a good basis for clustering, regardless of the specific clustering algorithm used. …”
Get full text
Article -
12877
Enhanced flux potential analysis links changes in enzyme expression to metabolic flux
Published 2025-02-01“…Abstract Algorithms that constrain metabolic network models with enzyme levels to predict metabolic activity assume that changes in enzyme levels are indicative of flux variations. …”
Get full text
Article -
12878
High-confidence assessment of functional impact of human mitochondrial non-synonymous genome variations by APOGEE.
Published 2017-06-01“…Since these tools proved to be rather incongruent, we have designed and implemented APOGEE, a machine-learning algorithm that outperforms all existing prediction methods in estimating the harmfulness of mitochondrial non-synonymous genome variations. …”
Get full text
Article -
12879
Characteristics of gut and lung microbiota in patients with lung masses and their relationship with clinical features
Published 2025-08-01“…For differentiating benign and malignant masses, the combination of Megasphaera and norank_p__Saccharibacteria in BALF demonstrated superior predictive performance, with an AUC reaching 0.8 (95% CI 0.59-1). …”
Get full text
Article -
12880
Machine learning-based radiomics for differentiating lung cancer subtypes in brain metastases using CE-T1WI
Published 2025-06-01“…The models’ performance was evaluated using receiver operating characteristic (ROC) analysis and area under the curve (AUC) calculations, complemented by additional metrics such as accuracy, specificity, sensitivity, positive predictive value (PPV), and negative predictive value (NPV).ResultsA total of 833 radiomic features were extracted from the ROIs. …”
Get full text
Article