-
9921
Possibilities of using artificial intelligence technologies in the morphological diagnosis of inflammatory bowel diseases (literature review)
Published 2025-04-01“…Endocytoscopy and real-time visualization algorithms improve the accuracy of early detection of mucosal dysplasia. …”
Get full text
Article -
9922
Analysis of multiple faults in induction motor using machine learning techniques
Published 2025-06-01“…In order to surpass these limitations, a new approach by using state-of-the-art machine learning algorithms such as Extreme Gradient Boosting (XGBoost) combined with Fuzzy Inference Systems (FIS) presents a new perspective towards improved accuracy and comprehensibility in fault detection. …”
Get full text
Article -
9923
From Genomics to AI: Revolutionizing Precision Medicine in Oncology
Published 2025-06-01“…It examines their roles in identifying genetic variants, assessing cancer risk, guiding targeted therapies and immunotherapy, predicting treatment response, and enabling early detection through liquid biopsies. Results: Genomics and AI are revolutionizing oncology by enabling personalized treatment strategies, improving early detection, and overcoming drug resistance. …”
Get full text
Article -
9924
Automated Segmentation of Breast Cancer Focal Lesions on Ultrasound Images
Published 2025-03-01“…Therefore, it is necessary to develop effective algorithms for the segmentation, classification, and analysis of US images. …”
Get full text
Article -
9925
Integrated Ultrasound‐Enrichment and Machine Learning in Colorimetric Lateral Flow Assay for Accurate and Sensitive Clinical Alzheimer's Biomarker Diagnosis
Published 2024-11-01“…The LFA device is integrated with a portable ultrasonic actuator to rapidly enrich microparticles using ultrasound, which is essential for sample pre‐enrichment to improve the sensitivity, followed by ML algorithms to classify and predict the enhanced colorimetric signals. …”
Get full text
Article -
9926
Intermittent Short Atrioventricular Delay in a Dual Chamber Pacemaker During Acute Pulmonary Edema
Published 2025-01-01“…As most cardiologists and emergency department physicians are not familiar with brand‐specific algorithms, we believe that this case report will make these noncompetitive atrial pacing algorithms more accessible to non‐cardiologists.…”
Get full text
Article -
9927
Energy-Efficient Node Selection for Target Tracking in Wireless Sensor Networks
Published 2013-01-01“…In the proposed method, the target detection probability is estimated by single-node processing based on particle filter. …”
Get full text
Article -
9928
Does the hepatologist still need to rely on aminotransferases in clinical practice? A reappraisal of the role of a classic biomarker in the diagnosis and clinical management of chr...
Published 2025-01-01“…Aminotransferases, particularly alanine aminotransferase (ALT), are commonly used in the detection, diagnosis, and management of chronic liver diseases. …”
Get full text
Article -
9929
Using intelligence techniques to automate Oracle testing
Published 2023-06-01“…The model was trained using the random forest algorithm and using the convolutional neural network. …”
Get full text
Article -
9930
An annotated high-content fluorescence microscopy dataset with EGFP-Galectin-3-stained cells and manually labelled outlineszenodo
Published 2025-02-01“…Many forms of bioimage analysis involve the detection of objects and their outlines. In the context of microscopy-based high-throughput drug and genomic screening and even in smaller scale microscopy experiments, the objects that most often need to be detected are cells. …”
Get full text
Article -
9931
Electronic Nose System Based on Metal Oxide Semiconductor Sensors for the Analysis of Volatile Organic Compounds in Exhaled Breath for the Discrimination of Liver Cirrhosis Patient...
Published 2025-07-01“…The early detection of liver cirrhosis (LC) is crucial due to its high morbidity and mortality in advanced stages. …”
Get full text
Article -
9932
Advanced Interpretation of Bullet-Affected Chest X-Rays Using Deep Transfer Learning
Published 2025-06-01“…Special deep learning algorithms went through a process of optimization before researchers improved their ability to detect and place objects. …”
Get full text
Article -
9933
Identification of the Dominant Harmonic Source Type in the Distribution Network Using the Soft Computing Technique
Published 2022-01-01“…Detail power or harmonic power calculation at level 1 reduces the computational burden of the algorithm. The distinguishing harmonics concept can be used to detect a harmonic generating source from the distribution network. …”
Get full text
Article -
9934
Image Processing for Capturing Motions of Crowd and Its Application to Pedestrian-Induced Lateral Vibration of a Footbridge
Published 2007-01-01“…Then, motions of detected human-heads, together with the bridge response, are tracked. …”
Get full text
Article -
9935
Application of artificial intelligence in the diagnosis of malignant digestive tract tumors: focusing on opportunities and challenges in endoscopy and pathology
Published 2025-04-01“…Results In the field of endoscopy, multiple deep learning models have significantly improved detection rates in real-time polyp detection, early gastric cancer, and esophageal cancer screening, with some commercialized systems successfully entering clinical trials. …”
Get full text
Article -
9936
Analysing Time Series of Land Subsidence in the West of Tehran Province (Shahriar Plain) and its Relation to Groundwater Discharge by InSAR Technique
Published 2020-06-01“…The Small BAseline Subset (SBAS) algorithm was applied to analyze the time series of land surface displacement and to generate the mean displacement velocity map. …”
Get full text
Article -
9937
Quantitative method for network security situation based on attack prediction
Published 2017-10-01“…To predict the attack behaviors accurately and comprehensively as well as to quantify the threat of attack,a quantitative method for network security situation based on attack prediction was proposed.By fusing the situation factors of attacker,defender and network environment,the capability of attacker and the exploitability rate of vulnerability were evaluated utilizing the real-time detected attack events,and the expected time-cost for attack-defense were further calculated.Then an attack prediction algorithm based on the dynamic Bayesian attack graph was designed to infer the follow-up attack actions.At last,the attack threat was quantified as the security risk situation from two levels of the hosts and the overall network.Experimental analysis indicates that the proposed method is suitable for the real adversarial network environment,and is able to predict the occurrence time of attack accurately and quantify the attack threat reasonably.…”
Get full text
Article -
9938
基于透视不变二值特征描述子的图像匹配算法
Published 2015-04-01“…Current local feature based image matching algorithms are usually less robust to image perspective transformation.Aiming to solve this problem,a new perspective invariant binary code (PIBC) based image matching algorithm is proposed.Firstly,FAST corners are detected on the pyramid images,those corners with non-maximum Harris corner response value and the edge points are further eliminated.And then,by simulating the perspective transformations of images taken from different viewpoints,a single FAST corner is described with binary descriptors under different viewpoint transformations,which makes the descriptor could describe the identical feature point on different perspective transform images.Experimental results show its robustness to image perspective transformation,while its complexity is similar with SURF.…”
Get full text
Article -
9939
Quantitative method for network security situation based on attack prediction
Published 2017-10-01“…To predict the attack behaviors accurately and comprehensively as well as to quantify the threat of attack,a quantitative method for network security situation based on attack prediction was proposed.By fusing the situation factors of attacker,defender and network environment,the capability of attacker and the exploitability rate of vulnerability were evaluated utilizing the real-time detected attack events,and the expected time-cost for attack-defense were further calculated.Then an attack prediction algorithm based on the dynamic Bayesian attack graph was designed to infer the follow-up attack actions.At last,the attack threat was quantified as the security risk situation from two levels of the hosts and the overall network.Experimental analysis indicates that the proposed method is suitable for the real adversarial network environment,and is able to predict the occurrence time of attack accurately and quantify the attack threat reasonably.…”
Get full text
Article -
9940
Design of a Control Chart Based on COM-Poisson Distribution for the Uncertainty Environment
Published 2019-01-01“…The structure of the control chart under the neutrosophic statistical interval method will be given. The algorithm to determine the average run length under neutrosophic statistical interval system will be given. …”
Get full text
Article