Showing 7,281 - 7,300 results of 10,044 for search 'Datchet~', query time: 2.80s Refine Results
  1. 7281

    Identification of as a Hypermethylated Gene in Colorectal Cancers by Jongbum Kim, Sangsoo Kim

    Published 2014-12-01
    “…We downloaded publicly available DNA methylation and gene expression datasets of matched cancer and normal pairs from the Cancer Genome Atlas Data Portal and performed a systematic computational analysis. …”
    Get full text
    Article
  2. 7282

    Comprehensive Analysis of Face Recognition Technologies by Liu Bowei

    Published 2025-01-01
    “…The review highlights the practical applications of face recognition in contemporary contexts and summarizes key datasets and preprocessing methods used in the field. …”
    Get full text
    Article
  3. 7283

    Multi-adversarial domain adaptation method based on feature correction by Yong ZHANG, Haoshuang LIU, Qi ZHANG, Wenzhe LIU

    Published 2024-01-01
    “…Domain adaptation can transfer labeled source domain information to an unlabeled but related target domain by aligning the distribution of source domain and target domain.However, most existing methods only align the low-level feature distributions of the source and target domains, failing to capture fine-grained information within the samples.To address this limitation, a feature correction-based multi-adversarial domain adaptation method was proposed.An attention mechanism to highlight transferable regions was introduced in this method and a feature correction module was deployed to align the high-level feature distributions between the two domains, further reducing domain discrepancies.Additionally, to prevent individual classifiers from overfitting their own noisy pseudo-labels,dual classifier co-training was proposed and the feature aggregation property of graph neural networks was utilized to generate more accurate source domain labels.Extensive experiments on three benchmark datasets for transfer learning demonstrate the effectiveness of the proposed method.…”
    Get full text
    Article
  4. 7284

    ChartMaster: An End-to-End Method to Recognize, Redraw, and Redesign Chart by Lingmei Zhang, Guangxia Wang, Lingyu Chen

    Published 2021-01-01
    “…Besides, we also introduce two datasets, UCCD and UCID, to train deep models to classify and recognize charts. …”
    Get full text
    Article
  5. 7285

    Review of the Empirical Evidence for Superluminal Particles and the 3 + 3 Model of the Neutrino Masses by Robert Ehrlich

    Published 2019-01-01
    “…Furthermore, this dark matter model is supported by several datasets: γ-rays from the galactic center, and the Kamiokande-II neutrino data on the day of SN 1987A. …”
    Get full text
    Article
  6. 7286

    Few-shot cybersecurity event detection method by data augmentation with prompting question answering by TANG Mengmeng, GUO Yuanbo, ZHANG Han, BAI Qingchun, CHEN Qingli, ZHANG Bowen

    Published 2024-08-01
    “…Experimental verification was conducted on two datasets in cybersecurity. The result showes that the proposed method’s substantial superiority in low-resource network security event detection tasks compared to other baseline methods.…”
    Get full text
    Article
  7. 7287

    Persistent Topological Laplacians—A Survey by Xiaoqi Wei, Guo-Wei Wei

    Published 2025-01-01
    “…Persistent topological Laplacians have demonstrated superior performance over persistent homology in the analysis of large-scale protein engineering datasets. In this survey, we offer a pedagogical review of persistent topological Laplacians formulated in various mathematical settings, including simplicial complexes, path complexes, flag complexes, digraphs, hypergraphs, hyperdigraphs, cellular sheaves, and <i>N</i>-chain complexes.…”
    Get full text
    Article
  8. 7288

    Tea disease identification based on ECA attention mechanism ResNet50 network by Lanting Li, Yingding Zhao

    Published 2025-02-01
    “…This model not only accurately identifies tea diseases in gardens but also possesses excellent generalization capabilities, performing outstandingly on datasets of other plant categories. These results indicate that ECA-ResNet50 can effectively mitigate the interference of complex backgrounds and precisely recognize tea disease targets.…”
    Get full text
    Article
  9. 7289

    Performance Evaluation and Implications of Large Language Models in Radiology Board Exams: Prospective Comparative Analysis by Boxiong Wei

    Published 2025-01-01
    “…The study emphasizes the need for domain-specific training datasets to enhance large language models’ effectiveness in specialized fields like radiology.…”
    Get full text
    Article
  10. 7290

    CC-MRSJ:Cache Conscious Star Join Algorithm on Hadoop Platform by Guoliang Zhou, Yongli Zhu, Guilan Wang

    Published 2013-10-01
    “…A cache-conscious MapReduce star join algorithm was presented,each column of fact table was separately stored,and dimension table was divided into several column families according to dimension hierarchy.Fact table foreign key column and corresponding dimension table was co-location storage,thus reducing data movement in the join process.CC-MRSJ consists of two phases:firstly each foreign key column and the corresponding dimension table were joined; then the intermediate results were joined and random accessed measure columns,and so got the final result.CC-MRSJ read only the data needed,and cache utilization is high,so it has good cache conscious feature; it also takes advantage of late materialization,avoiding unnecessary data access and movement.CC-MRSJ has higher performance comparing to hive system based on SSB datasets.…”
    Get full text
    Article
  11. 7291

    IDS Transposer: A Users Guide by Emily Klancher Merchant, George Alter, Jane Wang, Ashok Bhargav

    Published 2017-05-01
    “…The IDS Transposer is a software tool that automates this process for source data in any format, allowing database administrators to specify how their datasets are to be represented in IDS. This article describes how the IDS Transposer works, first by going through an example step-bystep, and then by discussing each part of the process and potential options and exceptions in detail. …”
    Get full text
    Article
  12. 7292

    Construction of College Students’ Mental Health Assessment and Art Therapy System Aided by the Internet of Things and Big Data by Qing Li

    Published 2022-01-01
    “…In addition, this paper uses four datasets to conduct clustering experiments and compares the CS indicator with several other indicators. …”
    Get full text
    Article
  13. 7293

    Prediction of Compressive Strength of Concrete and Rock Using an Elementary Instance-Based Learning Algorithm by Shun-Chieh Hsieh

    Published 2021-01-01
    “…Results on applying this method to datasets from literature studies show that the values of RMSE for k-NN are modest, indicating adequacy to predict compressive strength with comprehensive range values of predictors. …”
    Get full text
    Article
  14. 7294

    Urban Vitality Measurement Through Big Data and Internet of Things Technologies by Young-Long Kim

    Published 2025-01-01
    “…This approach offers a more dynamic and comprehensive picture of urban vitality, facilitated by advanced analytical tools such as machine learning and predictive analytics, which can interpret complex datasets to offer real-time insights and better decision-making for urban planning. …”
    Get full text
    Article
  15. 7295

    Privacy-utility tradeoff method using multi-variable source coding by Yong-hao GU, Jiu-chuan LIN

    Published 2015-12-01
    “…In the age of big data,data providers need to ensure their privacy,while data analysts need to mine the value of data.So,how to find the privacy-utility tradeoff has become a research hotspot.Current works mostly focus on privacy preserving methods,ignoring the data utility.Based on the current research of privacy utility equilibrium methods,a privacy-utility tradeoff method using multi-variable source coding was proposed to solve the problem that different public datasets in the same database have different privacy requirements.Two results are obtained by simulations.The first result is that the greater the association degree between the private information and public information,the increase of the distortion degree of public information will significantly improve the effect of privacy preservation.The second result is that public information with larger variance should be less distorted to ensure more utility.…”
    Get full text
    Article
  16. 7296

    Access to water and sanitation among people with disabilities: results from cross-sectional surveys in Bangladesh, Cameroon, India and Malawi by Islay Mactaggart, Hannah Kuper, Sarah Polack, Mahfuzar Rahman, Wolf-Peter Schmidt, Kristof Bostoen, Joseph Chunga, Lisa Danquah, Amal Krishna Halder, Saira Parveen Jolly, Marielle Snel, Adam Biran

    Published 2018-06-01
    “…Objectives To assess access to adequate water, sanitation and hygiene (WASH) among people with disabilities at the household and individual level.Design Cross-sectional surveys.Setting Data were included from five district-level or regional-level surveys: two in Bangladesh (Bangladesh-1, Bangladesh-2), and one each in Cameroon, Malawi and India.Participants 99 252 participants were sampled across the datasets (range: 3567–75 767), including 2494 with disabilities (93–1374).Outcome Prevalence of access to WASH at household and individual level.Data analysis Age/sex disaggregated disability prevalence estimates were calculated accounting for survey design. …”
    Get full text
    Article
  17. 7297

    Prediction of digestible energy requirement in growing finishing stage of pigs using machine learning models by Nibas Chandra Deb, Jayanta Kumar Basak, Sijan Karki, Elanchezhian Arulmozhi, Dae Yeong Kang, Niraj Tamrakar, Eun Wan Seo, Junghoo Kook, Myeong Yong Kang, Hyeon Tae Kim

    Published 2025-03-01
    “…While evaluating the model's performance under different datasets, it was observed that the RFR model exhibited the best performance with DS4, explaining over 97 % and 95 % of actual and predicted data during the training and testing phases, respectively, while MLR model demonstrated the worst accuracy (R2 < 0.93 and RMSE >6.1 MJ/pig day) compared to the other models. …”
    Get full text
    Article
  18. 7298

    Highly proliferating cancer cells function as novel prognostic biomarkers for lung adenocarcinoma with particular usefulness for stage IA risk stratification by Yanlu Xiong, Yongfu Ma, Jie Lei, Jianfei Zhu, Nianlin Xie, Feng Tian, Qiang Lu, Miaomiao Wen, Qian Zheng, Yong Han, Tao Jiang, Yang Liu

    Published 2025-01-01
    “…Then, we quantified the content of HPCs in nine LUAD datasets by single-sample gene set enrichment analysis and evaluated the relationship between the percentage of HPCs and overall survival (OS). …”
    Get full text
    Article
  19. 7299

    Risk Values of Weight and Body Mass Index for Chest Wall Thickness in Patients Requiring Needle Thoracostomy Decompression by Chia-Hung Hsu, Tzu-Yin Lin, Ju-Chi Ou, Jiann Ruey Ong, Hon-Ping Ma

    Published 2020-01-01
    “…Emergency decompression is needed in patients with tension pneumothorax, a life-threatening condition. The catheter-based needle thoracostomy was suggested using a 5 cm catheter inserted into the 2nd intercostal space (ICS) and 5th ICS according to the ninth and tenth editions of Advanced Trauma Life Support, respectively. …”
    Get full text
    Article
  20. 7300

    Risk factors and prediction model construction of urinary tract infection in elderly patients with diabetic nephropathy by Cong Feng, Bo Yang, Linlang Liang

    Published 2025-01-01
    “…[Conclusion] Female, urinary catheter, HbA1c>7.5%, high Cys-C and low eGFR are the risk factors of urinary tract infection in elderly patients with diabetic nephropathy.The prediction model has clinical advantages in accuracy and consistency.…”
    Get full text
    Article