Suggested Topics within your search.
Suggested Topics within your search.
- Agriculture 1
- Soils 1
-
621
Infection after Acute Ischemic Stroke: Risk Factors, Biomarkers, and Outcome
Published 2011-01-01Get full text
Article -
622
Pengembangan Game Edukasi Berbasis Web Pada Materi Bangun Ruang Dengan Construct 2
Published 2021-12-01“…Game edukasi ini dibangun menggunakan model pengembangan Multimedia Development Life Cycle (MDLC) yang dikembangkan oleh Luther-Sutopo dengan tahap pengembangan game yang terdiri dari concept, design, material collecting, assembly, testing dan distribution. …”
Get full text
Article -
623
-
624
-
625
A Novel Artificial Intelligence–Enhanced Digital Network for Prehospital Emergency Support: Community Intervention Study
Published 2025-01-01“…When comparing the incidence of transport time outliers (>75%), which was the primary outcome of this study, the rate was higher in the intervention group in region 1, but significantly reduced in region 2, with the overall outlier rate being higher in the intervention group (27.5%-29.7%, P=.04). …”
Get full text
Article -
626
STUDY ON THE RELATIONSHIP BETWEEN BODY MASS INDEX AND WALKING SPEED IN ADOLESCENTS
Published 2024-06-01“…Preliminary analyses showed that the relationship is linear with both variables distributed normally, as evaluated by the Shapiro-Wilk test (p > 0.05), and there were no outlier values. There was a statistically significant positive correlation between BMI and the time obtainedin the shuttle run test, p < 0.001, r = 0,578. …”
Get full text
Article -
627
Perspective: Use of protein S100B as a quality assurance marker for endovascular therapy in acute ischemic stroke
Published 2025-02-01“…We aim to illustrate the advantages and drawbacks of measuring S100B after MT, reliably depicting the procedure’s quality and its use for comparison and identification of “outlier” patients in MT patient cohorts for further process and single-case analysis.…”
Get full text
Article -
628
A Review of Subsequence Time Series Clustering
Published 2014-01-01“…Subsequence time series clustering is used in different fields, such as e-commerce, outlier detection, speech recognition, biological systems, DNA recognition, and text mining. …”
Get full text
Article -
629
La dimension sociale de la mobilité quotidienne, oubliée du développement urbain durable ?
Published 2012-05-01“…Actors outside transport sector have adopted “orphaned issues” (Gauthier and Paulhiac, 2008) of transport policies since the middle of the 1990s and the 2000s, while the transport policies have remained faithful to the ideals of the “right to transport” and let play the “patrimonial transmission” (Scherrer, 1999). …”
Get full text
Article -
630
Robust identification for input non‐uniformly sampled Wiener model by the expectation‐maximisation algorithm
Published 2022-05-01“…Abstract The problems of inconsistent data sampling frequency, outliers, and coloured noise often exist in system identification, resulting in unsatisfactory identification results. …”
Get full text
Article -
631
Volatility Risk Premium, Return Predictability, and ESG Sentiment: Evidence from China’s Spots and Options’ Markets
Published 2022-01-01“…In addition, the statistically positive correlation between the volatility risk premium and aggregate returns is an outlier compared to the empirically negative pattern in developed markets. …”
Get full text
Article -
632
Compliance Risk Assessment in the Banking Sector: Application of a Novel Pairwise Comparison-Based PRISM Method
Published 2023-01-01“…The best-fitting and outlier experts can be identified based on testing the impact of individual expert rankings on the aggregated ranking. …”
Get full text
Article -
633
Research on Analyzing the Emotional Polarity of Malicious Swipe Comments on E-commerce Platforms Based on NPL
Published 2025-01-01“…The methodology involves utilizing the Word2Vec model to vectorize the text data, followed by principal component analysis (PCA) for outlier detection to identify potential malicious reviews based on their unique characteristics. …”
Get full text
Article -
634
Thermal Characteristics Testing and Analysis of Dry Gear Hobbing Machine on Multivariate Information Fusion
Published 2024-01-01“…Based on the IPO model, it put forward the sequential processing method of multi-source thermal data of dry-cutting and hobbing machine. using outlier replacement, moving average filtering, wavelet filtering, and data resampling, it realised the accurate analysis of multi-source thermal data. …”
Get full text
Article -
635
Analysis of the Consecutive Mean Excision Algorithms
Published 2010-01-01“…The backward and forward consecutive mean excision (CME/FCME) algorithms are diagnostic methods for outlier (signal) detection. Since they are computationally simple, they have applications for both narrowband signal detection in cognitive radios and interference suppression. …”
Get full text
Article -
636
Clustering Algorithm for Urban Taxi Carpooling Vehicle Based on Data Field Energy
Published 2018-01-01“…To realize the clustering of taxis, the central point, outlier, and data points of each cluster subset are discriminated according to the threshold value determined by the product of each data point field values and point spacing. …”
Get full text
Article -
637
Les structures pastorales des massifs du Sancy et du Cézallier (Puy-de-Dôme, France)
Published 2017-11-01“…Their specific use remains to be defined therefore calling for futher resaerch. Another major priority being their presservation from modern mechanical farming and logging.…”
Get full text
Article -
638
Guess and determine attack on E<sub>0</sub>algorithm
Published 2012-11-01“…A guess and determine attack on E<sub>0</sub>was presented,the stream cipher that was used in the short-range wireless technology Bluetooth.In the attack,an ingenious assumption by linear approximation to diminish the number of values that have to be guessed was made.Futher more,a test equation to reduce the number of the guessed candidates was used.The guess and determine attack on E<sub>0</sub>with time complexity of O(2<sup>76</sup>)required about 988 keystream bit.Compared with long keystream attacks,short keystream attacks were more threatening to E<sub>0</sub>cipher which require less than 2 745 bit.This attack which belongs to short keystream attack was the fastest state recovery attack on E<sub>0</sub>so far compared with any other existed short keystream attacks.…”
Get full text
Article -
639
Multistage System-Based Machine Learning Techniques for Intrusion Detection in WiFi Network
Published 2019-01-01“…Secondly, by combining a K-means algorithm and a measure of local density score, we propose a fast outlier detection algorithm, named FLDS. The complexity of FLDS is On1.5 while the results obtained are comparable with the algorithm LOF. …”
Get full text
Article -
640
The role of socially responsible human resource management in improving performance: An analysis of subjective well-being as a mediating variable
Published 2024-09-01“…Data were collected through a survey of SOE employees, and 524 complete and outlier-free responses were collected. Data analysis used structural equation model techniques. …”
Get full text
Article