-
41
Evaluation of a peer support group programme for vulnerable host population and refugees living with diabetes and/or hypertension in Lebanon: a before-after study
Published 2025-01-01“…The first wave was implemented from December 2022 to July 2023, and the second wave from July 2023 to January 2024. For the control group on clinical outcomes, we used data collected from January 2023 to January 2024. …”
Get full text
Article -
42
-
43
Mining 3D Patterns from Gene Expression Temporal Data: A New Tricluster Evaluation Measure
Published 2014-01-01“…Clustering techniques are applied to create groups of genes that exhibit a similar behavior. Biclustering emerges as a valuable tool for microarray data analysis since it relaxes the constraints for grouping, allowing genes to be evaluated only under a subset of the conditions. …”
Get full text
Article -
44
INVESTIGATION OF LOGISTIC PERFORMANCE OF G-20 COUNTRIES USING DATA ENVELOPMENT ANALYSIS AND MALMQUIST TOTAL FACTOR PRODUCTIVITY ANALYSIS
Published 2020-11-01“…In this study, the analysis was made according to the CCR and the BCC input-based models by the Data Envelopment Analysis method. …”
Get full text
Article -
45
A dataset of annotated free comments on the sensory perception of madeleines for benchmarking text mining techniquesRecherche.Data.Gouv
Published 2025-02-01“…A total of 200 consumers were recruited and divided into two groups of 100. Each group evaluated six madeleine samples (five distinct samples and one replicate) in a sensory analysis laboratory, using different free comment data collection modes. …”
Get full text
Article -
46
-
47
-
48
Network threat situation assessment based on unsupervised multi-source data feature analysis
Published 2020-02-01“…Aiming at the limitations of supervised neural network in the network threat testing task relying on data category tagging,a network threat situation evaluation method based on unsupervised multi-source data feature analysis was proposed.Firstly,a variant auto encoder-generative adversarial network (V-G) for security threat assessment was designed.The training data set containing only normal network traffic was input to the network collection layer of V-G to perform the model training,and the reconstruction error of the network output of each layer was calculated.Then,the reconstruction error learning was performed by the three-layer variation automatic encoder of the output layer,and the training abnormal threshold was obtained.The packet threat was tested by using the test data set containing the abnormal network traffic,and the probability of occurrence of the threat of each group of tests was counted.Finally,the severity of the network security threat was determined according to the probability of threat occurrence,and the threat situation value was calculated according to the threat impact to obtain the network threat situation.The simulation results show that the proposed method has strong characterization ability for network threats,and can effectively and intuitively evaluate the overall situation of network threat.…”
Get full text
Article -
49
SMS seed customers mining model and algorithm based on content analysis
Published 2016-02-01“…Secondly,the optimal seed customers mining model was generated by definition and application of comprehensive evaluation function,and SMS seed customers mining was realized based on the concept of close group. …”
Get full text
Article -
50
-
51
-
52
The Protective Role of Ambient Ultraviolet Radiation Against Dementia: An Ecological Analysis of Global Data
Published 2025-01-01“…Methods An ecological analysis across 204 countries was conducted using country‐specific data on UVR levels and dementia incidence rates. …”
Get full text
Article -
53
-
54
BIOMECHANICAL EVALUATIONS OF IMPLANTO-PROSTHETIC RESTORATIONS
Published 2024-10-01“…Aim of the study: This study aims to evaluate the biomechanical effects of various prosthetic configurations in cases of severe bone atrophy. …”
Get full text
Article -
55
Automated delamination detection in concrete bridge decks using 1D-CNN and GPR data
Published 2025-07-01Get full text
Article -
56
-
57
-
58
Evaluation of the ABC pathway in patients with atrial fibrillation: A machine learning cluster analysis
Published 2025-04-01“…We utilized 45 baseline variables for cluster analysis. We evaluated the management patterns and adverse outcomes of identified phenotypes. …”
Get full text
Article -
59
Preliminary analysis of patient assessment within a study on the impact of hydrokinetotherapy on body composition and metabolic disease risk in an adult population segment
Published 2025-12-01“…Results: The interpretation of BMI data for women aged 40-60 revealed significant variability in this group’s body composition, as was also observed in women aged 61-80. …”
Get full text
Article -
60