-
1841
-
1842
New non-primitive codes formed from primitive BCH and Hamming codes and their norm evaluation
Published 2019-06-01Get full text
Article -
1843
Evaluation of reference genes for qPCR in human liver and kidney tissue from individuals with obesity
Published 2025-02-01Get full text
Article -
1844
Comparative study of different machine learning models in landslide susceptibility assessment: A case study of Conghua District, Guangzhou, China
Published 2024-01-01“…Machine learning is currently one of the research hotspots in the field of landslide prediction. To clarify and evaluate the differences in characteristics and prediction effects of different machine learning models, Conghua District, which is the most prone to landslide disasters in Guangzhou, was selected for landslide susceptibility evaluation. …”
Get full text
Article -
1845
-
1846
-
1847
A Combined Approach Using T2*-Weighted Dynamic Susceptibility Contrast MRI Perfusion Parameters and Radiomics to Differentiate Between Radionecrosis and Glioma Progression: A Proof...
Published 2025-04-01“…These features were combined into a single dataset and 14 classification algorithms were evaluated with GroupKFold cross-validation (k = 4). …”
Get full text
Article -
1848
-
1849
-
1850
Estimation and evaluation of iron reserves in the eastern area of Eileh1 mine, Razavi Khorasan province
Published 2024-12-01“…This is attributed to Kriging’s ability to account for the spatial structure of the deposit, its unbiased nature, and its lower estimation variance. Introduction The evaluation of mineral reserves is conducted using various methods, which differ in calculation algorithms, accuracy, speed, the state of the mineral, and the characteristics of exploration activities (Madani, 1997; Ahmadi, 2010). …”
Get full text
Article -
1851
-
1852
Providing a Framework for Assessing and Evaluating Network Data Studies in the Fight Against Social Anomalies
Published 2024-09-01“…Additionally, clustering techniques, such as k-means, were employed to identify different forms of theft crimes. Classification algorithms, including neural networks, Bayesian rules, Bayesian navigation, and support vector machines, were used to predict theft crimes. …”
Get full text
Article -
1853
-
1854
Construction of teaching quality evaluation model of online dance teaching course based on improved PSO-BPNN
Published 2025-05-01“…However, traditional teaching quality evaluation methods such as neural network models have low efficiency, insufficient accuracy, and are prone to ignoring individual differences, making it difficult to better adapt to the online dance teaching mode. …”
Get full text
Article -
1855
Evaluation of the Finis Swimsense® and the Garmin Swim™ activity monitors for swimming performance and stroke kinematics analysis.
Published 2017-01-01“…<h4>Aims</h4>The study aims were to evaluate the validity of two commercially available swimming activity monitors for quantifying temporal and kinematic swimming variables.…”
Get full text
Article -
1856
Identification and evaluation of metabolic mRNAs and key miRNAs in colorectal cancer liver metastasis
Published 2025-07-01“…By implementing LASSO and SVM algorithms, we pinpointed six core mRNAs from the key mRNAs. …”
Get full text
Article -
1857
-
1858
Structural and population-based evaluations of TBC1D1 p.Arg125Trp.
Published 2013-01-01Get full text
Article -
1859
A dataset of annotated free comments on the sensory perception of madeleines for benchmarking text mining techniquesRecherche.Data.Gouv
Published 2025-02-01“…A total of 200 consumers were recruited and divided into two groups of 100. Each group evaluated six madeleine samples (five distinct samples and one replicate) in a sensory analysis laboratory, using different free comment data collection modes. …”
Get full text
Article -
1860
Determining the Factors that Influence the Effectiveness of the Health Sector in the OECD Countries
Published 2020-10-01“…Within the scope of this study, it is also aimed to select the factors influencing the efficiency of the health systems in OECD countries by employing Heuristic Algorithm methods such as Artificial Bee Colony Algorithm, Genetic Algorithm, and Differential Evolution Algorithm. …”
Get full text
Article