Showing 11,881 - 11,900 results of 20,442 for search '(functional OR function) data analysis', query time: 0.37s Refine Results
  1. 11881

    Sociopragmatic insights into verbal taboos and euphemisms in the Angkola language: A pathway to cultural diplomacy by Jamaluddin Nasution, Mhd. Pujiono, T. Silvana Sinar, Nurlela Nurlela

    Published 2025-05-01
    “…Respondents represented diverse demographic and occupational backgrounds within the Angkola-speaking regions of North Sumatra. To analyze the data, the study applied thematic analysis, categorizing expressions based on domains such as kinship, religion, body, social status, and supernatural beliefs. …”
    Get full text
    Article
  2. 11882

    A personalized query method for spatial keywords in indoor environments by Liping Zhang, Chunhong Li, Song Li

    Published 2024-11-01
    “…Finally, a comprehensive scoring function that considers text similarity, spatial proximity, and user preferences is introduced to score and rank the pruned data points, thereby filtering out the optimal query results that meet users’ personalized requirements. …”
    Get full text
    Article
  3. 11883

    Peranan Sekretaris Desa dalam Menunjang Kinerja Kepala Desa di Desa Sembahe Baru Kecamatan Pancur Batu Kabupaten Deli Serdang by Elvida Br Tarigan, Muhammad Husni Thamrin Nasution, Rosmala Dewi

    Published 2017-07-01
    “…The data used is more dominant secondary data fitted with interviews and observations and research was conducted in the village and the Sembahe Baru village office. …”
    Get full text
    Article
  4. 11884

    Fusion of Focal Loss’s cyber threat intelligence entity extraction by Yuanbo GUO, Yongfei LI, Qingli CHEN, Chen FANG, Yangyang HU

    Published 2022-07-01
    “…Cyber threat intelligence contains a wealth of knowledge of threat behavior.Timely analysis and process of threat intelligence can promote the transformation of defense from passive to active.Nowadays, most threat intelligence that exists in the form of natural language texts contains a large amount of unstructured data, which needs to be converted into structured data for subsequent processing using entity extraction methods.However, since threat intelligence contains numerous terminology such as vulnerability names, malware and APT organizations, and the distribution of entities are extremely unbalanced, the performance of extraction methods in general field are severely limited when applied to threat intelligence.Therefore, an entity extraction model integrated with Focal Loss was proposed, which improved the cross-entropy loss function and balanced sample distribution by introducing balance factor and modulation coefficient.In addition, for the problem that threat intelligence had a complex structure and a wide range of sources, and contained a large number of professional words, token and character features were added to the model, which effectively improved OOV (out of vocabulary) problem in threat intelligence.Experiment results show that compared with existing mainstream model BiLSTM and BiLSTM-CRF, the F1 scores of the proposed model is increased by 7.07% and 4.79% respectively, which verifies the effectiveness of introducing Focal Loss and character features.…”
    Get full text
    Article
  5. 11885

    BOOTSTRAP METHODS FOR INVESTIGATING THE ROCK MASS ZONAL FRACTURE AROUND UNDERGROUND WORKINGS by A. S. Losev

    Published 2021-04-01
    “…The primary tool used is numerical resampling methods, namely randomization, bootstrap, and Monte Carlo methods, which allow increasing the sample size, according to the available field data, to the required size for conducting a statistically sound analysis.Results. …”
    Get full text
    Article
  6. 11886

    Adaptability of the Novice School Heads on the Dimensions of Leadership Practices in SDO City of Malolos: Basis for Technical Assistance by Risalita C. Nalla, Dulce M. Camaya

    Published 2023-03-01
    “…This research study employed the mixed-method approach. Quantitative data were tabulated and treated using the SPSS. Meanwhile, the qualitative data were subjected to Thematic Analysis. …”
    Get full text
    Article
  7. 11887

    Mitigating information asymmetry in 5G networks by Hermann Bergmann Garcia e Silva, Rúben Manuel Nunes Santos, Manuel Ricardo

    Published 2024-05-01
    “…In response, this paper proposes an innovative application of the standardised network data analytics function (NWDAF) to facilitate the assessment of internet traffic differentiation. …”
    Get full text
    Article
  8. 11888

    Faktor-Faktor Yang Mempengaruhi Pertumbuhan Ekonomi Di Jawa Timur Dengan Pendekatan Spatial Regression by Rendra Erdkhadifa

    Published 2022-12-01
    “…The research sample was processed using spatial regression analysis techniques. The research results show that the weighting function used is fixed gaussian, and the spatial model has a coefficient of determination of 92.97%. …”
    Get full text
    Article
  9. 11889

    A Neural Network Constitutive Model and Automatic Stiffness Evaluation for Multiscale Finite Elements by Aliki D. Mouratidou, Georgios E. Stavroulakis

    Published 2025-03-01
    “…The loss function, without and including the Sobolev metrics, is considered. …”
    Get full text
    Article
  10. 11890

    Pengaruh tingkat literasi media terhadap tingkat self-esteem pada peserta didik di SMP Negeri 214 Jakarta by Dwi Fitriyani

    Published 2019-06-01
    “…The method used in this study is a quantitative method with a clause associative approach. Data analysis technique is done by tabulating data according to students' answers to the questionnaire, then calculated using the Simple Linear Regression formula. …”
    Get full text
    Article
  11. 11891

    Retina Modeling by Artificial Neural Networks by Amelia Stewart

    Published 2024-03-01
    “…The objective of this article is to provide a theoretical framework for the structure and function of the retina. The first focus of this article is the examination of the physiological aspects of the retina. …”
    Get full text
    Article
  12. 11892

    La santé des migrants internationaux dans la province d’Almería : indicateur de différenciations et d’inégalités. by Betty Rouland

    Published 2017-03-01
    “…Moreover, participant observation in collaboration with Almeria’s Red Cross has allowed for overcoming the gap between official and real populations (Forbes & Wainwright, 2001). The analysis of the empirical data (sanitary and epidemiological data) as well as of public health policies (national, regional and local), has shown the local reconstruction of the mosaic of states in the world. …”
    Get full text
    Article
  13. 11893
  14. 11894

    Trametinib alters contractility of paediatric Noonan syndrome‐associated hypertrophic myocardial tissue slices by Jules Hamers, Payel Sen, Sarala Raj Murthi, Laura Papanakli, Maria vonStumm, Francesca Baessato, Julie Cleuziou, Christian Meierhofer, Peter Ewert, Andreas Dendorfer, Daphne Merkus, Cordula M. Wolf

    Published 2025-06-01
    “…Conclusions Ex vivo analysis of cultivated and electrically stimulated RV myocardial tissue slices of a patient with RAS‐CM showed decreased contractility and improved sarcoplasmic reticulum function after addition of trametinib and in part after addition of rapamycin, but not after addition of dasatinib.…”
    Get full text
    Article
  15. 11895

    Research on the Digital Twin System for Rotation Construction Monitoring of Cable-Stayed Bridge Based on MBSE by Yuhan Zhang, Yimeng Zhao, Zhiyi Li, Wei He, Yi Liu

    Published 2025-04-01
    “…A V-model architecture for the digital twin system, based on requirements analysis, functional analysis, logical design, and physical design analysis (RFLP), is proposed. …”
    Get full text
    Article
  16. 11896

    Deciphering the integrated immunogenomic landscape of colorectal cancer: insights from Mendelian randomization and immune-stratified molecular subtyping by Ke-Jie He, Guoyu Gong

    Published 2025-03-01
    “…Consensus clustering stratified 619 TCGA CRC patients by immunome expression. Functional assays examined the tumor suppressor GPD1L. …”
    Get full text
    Article
  17. 11897

    SEQSIM: A novel bioinformatics tool for comparisons of promoter regions—a case study of calcium binding protein spermatid associated 1 (CABS1) by Joy Ramielle L. Santos, Weijie Sun, A. Dean Befus, Marcelo Marcet-Palacios

    Published 2025-06-01
    “…Despite the significance of these regions, genome-wide characterization remains a challenge due to data complexity and computational constraints. Traditional bioinformatics tools like Clustal Omega face limitations in handling extensive datasets, impeding comprehensive analysis. …”
    Get full text
    Article
  18. 11898

    A new Tec family-based clinical model predicts survival in differentiated thyroid cancer patients via machine learning by Ziyu Luo, Wenhan Li, Jianhui Li, Ying Zhang

    Published 2025-05-01
    “…Therefore, the model can be used to predict the OS of DTC patients. Functional annotation analysis revealed characteristics similar to those of other Tec kinases. …”
    Get full text
    Article
  19. 11899

    Correlation between abnormal leaf color phenomenon and endophytic bacteria of Loropetalum chinense var. rubrum by HUO Wenwen1,2, HOU Jiayi1,2, GAO Min1,2, XIA Wei1,2, LI Yanlin1,2, YU Xiaoying1,2, XU Lu1,2*

    Published 2024-10-01
    “…In this study, in order to to investigate the correlation between endophytic bacteria in the leaves of Loropetalum chinense var. rubrum and the seasonal abnormal leaf coloration phenomenon of this plant, we performed plate isolation and culturing and subsequent 16S rDNA sequence analysis to isolate and identify endophytic bacteria from five types of abnormally colored leaves and normally red-colored leaves of L. chinense var. rubrum; we also analyzed differences in bacterial diversity, community structure, and functional levels among differently colored leaves. …”
    Get full text
    Article
  20. 11900

    Protocol to identify genes important for Candida albicans fitness in diverse environmental conditions using pooled bar-seq screening approach by Emily H. Xiong, Xiang Zhang, Nicole Robbins, Chad L. Myers, Leah E. Cowen

    Published 2025-03-01
    “…We then detail the computational analysis of data to determine effect size and statistical significance.For complete details on the use and execution of this protocol, please refer to Xiong et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
    Get full text
    Article