Showing 5,041 - 5,060 results of 20,442 for search '(functional OR function) data analysis', query time: 0.28s Refine Results
  1. 5041

    mbX: An R Package for Streamlined Microbiome Analysis by Utsav Lamichhane, Jeferson Lourenco

    Published 2025-05-01
    “…Here, we introduce the mbX package: an R-based tool designed to streamline 16S rRNA gene microbiome data analysis following taxonomic classification. …”
    Get full text
    Article
  2. 5042

    Eye-tracking Analysis of Interactive 3D Geovisualization by Lukas Herman, Stanislav Popelka, Vendula Hejlova

    Published 2017-05-01
    “…This paper describes a new tool for eye-tracking data and their analysis with the use of interactive 3D models. …”
    Get full text
    Article
  3. 5043

    Clinicopathological analysis of IgA nephropathy combined with hyperuricemia by CAI Wei-cheng, HAN Shu-lian, GUO Xiao-dan, LING Yi-sheng, LIU Jun-lan, GUAN Tian-jun

    Published 2016-01-01
    “…Objective To investigate the clinicopathological characteristics of IgA nephropathy combined with hyperuricemia in order to reveal the clinical significance of IgA nephropathy associated with hyperuricemia.Methods We retrospectively reviewed the clinical data of 270 patients with IgA nephropathy diagnosed by renal biopsy from June 2006 to December 2012.The patients were divided into the two groups:IgA nephropathy patients with or without hyperuricemia.The sex,age,systolic blood pressure,24-h urine protein,serum uric acid,and serum creatinine were measured.All patients underwent renal pathological examination and Lee’s classification.A comparative analysis of clinical manifestations and renal pathological injuries was performed between the two groups,and the pathological parameters of patients with normal renal function were further analyzed.Results The prevalence of hyperuricemia in patients with IgA nephropathy was 25.19%.The systolic blood pressure,24-h urine protein and serum creatinine level were higher in the hyperuricemia group than in the normal group.The renal pathological changes in the hyperuricemia group were more severe than those in the normal uric acid group.The proportion of renal tubular interstitial lesions and renal artery lesions in the hyperuricemia group was higher than in the normal renal function group.The proportion of renal artery stenosis and renal tubular interstitial chronic lesions in the patients with hyperuricemia group was higher than in normal serum uric acid group.Conclusions The clinical manifestations and renal pathological changes of patients with IgA nephropathy combined with hyperuricemia are more serious than those with normal serum uric acid level,in particular,the effects of renal tubular interstitial lesions and renal vascular lesions were more obvious,and the clinical prognosis is not good.Timely and effective treatments are needed.…”
    Get full text
    Article
  4. 5044

    Analysis of Factors Affecting the Innovation Level of Agricultural Operators by Ender Kaya, Zeki Bayramoğlu

    Published 2024-02-01
    “…In this research, considering the characteristics of the data collected by the questionnaire, the linear regression model, which uses functional forms in regression models, was used. …”
    Get full text
    Article
  5. 5045
  6. 5046

    Population pharmacokinetic analysis of intravenous voriconazole in cancer patients. by Zunaira Akbar, Muhammad Usman, Muhammad Aamir, Zikria Saleem, Muhammad Rehan Khan, Abdulwahab Alamri, Mohammed Salem Alharbi, Gamal Eldin Mohamed Osman

    Published 2025-01-01
    “…<h4>Purpose</h4>The pharmacokinetics of voriconazole have been studied across various populations but data specific to the Pakistani cancer population has not yet been reported. …”
    Get full text
    Article
  7. 5047
  8. 5048

    Acupuncture for the Treatment of Liver Cirrhosis: A Meta-analysis by Lu Qi, Shuang Li, Jun Xu, Jie Xu, Wangzouyang Lou, Liangbin Cheng, Chizhi Zhang

    Published 2020-01-01
    “…Further, we used Review Manager 5.3 software for the analysis of the data and Stata 14.0 software for the Egger test to assess publication bias. …”
    Get full text
    Article
  9. 5049

    Transcription Analysis of the Myometrium of Labouring and Non-Labouring Women. by Gemma C Sharp, James L Hutchinson, Nanette Hibbert, Tom C Freeman, Philippa T K Saunders, Jane E Norman

    Published 2016-01-01
    “…In agreement with previous studies, functional analysis suggested that labour was characterised by an increase in the expression of inflammatory genes and network analysis suggested a strong neutrophil signature. …”
    Get full text
    Article
  10. 5050

    Gene circuit analysis of the terminal gap gene huckebein. by Maksat Ashyraliyev, Ken Siggens, Hilde Janssens, Joke Blom, Michael Akam, Johannes Jaeger

    Published 2009-10-01
    “…We show how considering variability in the data combined with analysis of parameter determinability significantly improves the biological relevance and consistency of the approach. …”
    Get full text
    Article
  11. 5051

    The cancer stem cells characteristics analysis of LGR5 + cells that influence lung cancer risk by using single cell RNA-seq analysis by Ge Wen, Shaoqing Niu, Shiqi Mei, Senming Wang

    Published 2025-05-01
    “…The FindMarkers function and “ClusterProlifer” package was used for differentially expressed genes (DEGs) and function enrichment analysis. …”
    Get full text
    Article
  12. 5052
  13. 5053

    Hardcoded vulnerability detection approach for IoT device firmware by Chao MU, Xin WANG, Ming YANG, Heng ZHANG, Zhenya CHEN, Xiaoming WU

    Published 2022-10-01
    “…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
    Get full text
    Article
  14. 5054

    Wearable Sensors and Computational Intelligence in Alpine Skiing Analysis by Ales Prochazka, Hana Charvatova

    Published 2025-01-01
    “…This paper focuses on motion analysis in alpine skiing using real accelerometric, gyroscopic, positioning, and video data to evaluate ski movement patterns. …”
    Get full text
    Article
  15. 5055
  16. 5056
  17. 5057
  18. 5058
  19. 5059

    A different perspective on studying stroke predictors: joint models for longitudinal and time-to-event data in a type 2 diabetes mellitus cohort by F. J. San Andrés-Rebollo, J. Cárdenas-Valladolid, J. C. Abanades-Herranz, P. Vich-Pérez, J. M. de Miguel-Yanes, M. Guillán, M. A. Salinero-Fort, the MADIABETES

    Published 2025-04-01
    “…Both submodels were then combined into a joint model. To optimize the analysis, a univariate analysis was first performed for each longitudinal predictor to select the functional form that gave the best fit via the deviance information criterion. …”
    Get full text
    Article
  20. 5060

    Prognostic analysis of bladder cancer with neddylation-related genes by Huang Xiaolong, Deng Min, Zhang Sizhou, Hu Daorong, Pan Juncheng, Wang Yanjian, Li Jie Gu Hong, Zheng Ji, Wu Qingjian

    Published 2025-06-01
    “…Additionally, a protein–protein interaction (PPI) network, gene set enrichment analysis (GSEA), and BLCA single-cell sequencing data were utilized to explore the functional roles of hub genes in BLCA and their impact on biological pathways. …”
    Get full text
    Article