Showing 10,401 - 10,420 results of 12,239 for search 'algorithm detection', query time: 0.22s Refine Results
  1. 10401

    Discrimination of the Skin Cells from Cellular-Resolution Optical Coherence Tomography by Deep Learning by Jui-Yun Yi, Sheng-Lung Huang, Shiun Li, Yu-You Yen, Chun-Yeh Chen

    Published 2025-02-01
    “…The deep learning algorithm is successfully and efficiently applied to discriminate the OCT skin cell images.…”
    Get full text
    Article
  2. 10402

    Future Climate Predicts Range Shifts and Increased Global Habitat Suitability for 29 <i>Aedes</i> Mosquito Species by Xueyou Zhang, Hongyan Mei, Peixiao Nie, Xiaokang Hu, Jianmeng Feng

    Published 2025-04-01
    “…We detected expanded ranges in most <i>Aedes</i> mosquito species, and a substantial increase in the index of habitat suitability overlap was detected in more than 70% of the global terrestrial area, particularly in Europe, North America, and Africa. …”
    Get full text
    Article
  3. 10403

    Genetic Diversity of Apis spp. in Thailand Inferred from 28S rRNA Nuclear and Cytochrome b Mitochondrial Gene Sequences by Thitipan Meemongkolkiat, Atsalek Rattanawannee, Chanpen Chanchao

    Published 2019-01-01
    “…For 28S rRNA, a low genetic variation was detected within species (haplotype diversity ranging from 0.212 to 0.394), while 19 polymorphic sites were detected between species. …”
    Get full text
    Article
  4. 10404

    Radiation hematologic toxicity prediction in rectal cancer: a comparative radiomics-based study on CT image and dose map by Yingpeng Liu, Liping Guo, Yi Wang, Qingtao Xu, Jingfeng Zhang, Xianyun Meng

    Published 2025-03-01
    “…However, whether the dose map has enough prediction value for detecting hematologic toxicity (HT) is still unknown.MethodsIn this study, the pre-treatment CT images and the in-treatment dose map were collected from a discovery dataset of 299 patients and a validation dataset of 65 patients from another center. …”
    Get full text
    Article
  5. 10405

    Vaginal dysbiosis as a factor contributing to the development of recurrent lower urinary tract infections by I. V. Kosova, V. A. Barsegian, L. A. Sinyakova, I. V. Lukianov, D. N. Kolbasov

    Published 2023-04-01
    “…Vaginal dysbiosis was detected in 47/75 (62.7%) women with recurrent UTIs: moderate vaginal dysbiosis was detected in 25/75 (33.3%) women and severe dysbiosis — in 22/75 (29.3%) women. …”
    Get full text
    Article
  6. 10406

    Abbreviated protocol for ultrasound duplex scanning of the carotid arteries in the evaluation of preclinical atherosclerosis in order to clarify cardiovascular risk by T. V. Balakhonova, O. A. Pogorelova, M. I. Tripoten, A. I. Ershova, M. V. Koshurnikova, А. N. Rogoza

    Published 2019-06-01
    “…The work showed a decrease in DS time when conducting a abbreviated protocol 2 by 32,1% or 1,5 times, a shortened protocol 1 — by 72,1% or approximately 3,5 times compared with the standard DS protocol, while the efficiency of atheroma detecting has not decreased. A decision-making algorithm has been developed on the basis of conducting an ultrasound SA examination using abbreviated protocols.Conclusion. …”
    Get full text
    Article
  7. 10407

    Color and Grey-Level Co-Occurrence Matrix Analysis for Predicting Sensory and Biochemical Traits in Sweet Potato and Potato by Judith Ssali Nantongo, Edwin Serunkuma, Gabriela Burgos, Mariam Nakitto, Joseph Kitalikyawe, Thiago Mendes, Fabrice Davrieux, Reuben Ssali

    Published 2024-01-01
    “…High correlations between sensory panel aroma and flavor with instrumental color were detected (up to r=0.66), although the validity of these correlations needs to be tested. …”
    Get full text
    Article
  8. 10408

    Estimation of Wind Turbine Blade Icing Volume Based on Binocular Vision by Fangzheng Wei, Zhiyong Guo, Qiaoli Han, Wenkai Qi

    Published 2024-12-01
    “…Icing on wind turbine blades in cold and humid weather has become a detrimental factor limiting their efficient operation, and traditional methods for detecting blade icing have various limitations. Therefore, this paper proposes a non-contact ice volume estimation method based on binocular vision and improved image processing algorithms. …”
    Get full text
    Article
  9. 10409

    Cyberattack Monitoring Architectures for Resilient Operation of Connected and Automated Vehicles by Zulqarnain H. Khattak, Brian L. Smith, Michael D. Fontaine

    Published 2024-01-01
    “…The proposed algorithm was also compared to convolutional neural network (CNN) and other classical algorithms. …”
    Get full text
    Article
  10. 10410

    Tactical features of the scene inspection in the investigation of the taking of a government official or law enforcement officer as a hostage by O. Yu. Prokopenko

    Published 2023-12-01
    “…For each place of inspection, the peculiarities and the relevant algorithm of actions by the pre-trial investigation authorities have been identified. …”
    Get full text
    Article
  11. 10411

    Impact of rainy season on approach trajectories in high-altitude airport terminal maneuvering area: a clustering analysis by Jianxiong Chen, Jingtao Wang, Fan Li, Lin Zou

    Published 2025-08-01
    “…After data preprocessing, a clustering algorithm was used to identify trajectory patterns and detect outlier trajectories. …”
    Get full text
    Article
  12. 10412

    Calibration of h'Es from VIPIR2 ionosondes in Japan by Sorai Teraoka, Huixin Liu, Michi Nishioka, Susumu Saito, Toru Takahashi, Atsushi Kumamoto, Yuki Ashihara, Takumi Abe

    Published 2025-02-01
    “…By developing an automated image detecting algorithm, we were able to process a large amount of data and achieve a calibration with high accuracy. …”
    Get full text
    Article
  13. 10413

    Development and validation of machine learning models for young-onset colorectal cancer risk stratification by Junhai Zhen, Jiao Li, Fei Liao, Jixiang Zhang, Chuan Liu, Huabing Xie, Cheng Tan, Weiguo Dong

    Published 2024-10-01
    “…In temporal validation cohort, the RF ML model also exhibited good classification performance, achieving AUC of 0.888 and highest recall of 0.872. RF algorithm-based approach is effective and feasible in YOCRC risk stratification. …”
    Get full text
    Article
  14. 10414

    Automatic extraction of 3d building meshes from LiDAR data by Jan Voříšek, Bořek Patzák, Daniel Rypl

    Published 2022-03-01
    “…In this contribution, we present the design and concept of a C++ library that provides fundamental algorithmic tools for automated detection of the ground points, separation of buildings into individual point clouds, and segmentation of walls and roofs. …”
    Get full text
    Article
  15. 10415

    Estimation of the High-Frequency Feature Slope in Gravitational Wave Signals from Core Collapse Supernovae Using Machine Learning by Alejandro Casallas-Lagos, Javier M. Antelis, Claudia Moreno, Ramiro Franco-Hernández

    Published 2024-12-01
    “…The results showed that a DNN algorithm for regression exhibits the highest accuracy in estimating the slope of the HFF.…”
    Get full text
    Article
  16. 10416

    Sparse Online Gaussian Process Adaptive Control of Unmanned Aerial Vehicle with Slung Payload by Muhammed Rasit Kartal, Dmitry I. Ignatyev, Argyrios Zolotas

    Published 2024-11-01
    “…Our approach involves a combination of various algorithms: the incremental backstepping control algorithm (IBKS), integrator backstepping (IBS), Proportional–Integral–Derivative (PID), and the Sparse Online Gaussian Process (SOGP), a machine learning technique that identifies and mitigates disturbances. …”
    Get full text
    Article
  17. 10417

    Inclusion of Unicode Standard seamless characters to expand Arabic text steganography for secure individual uses by Norah Alanazi, Esam Khan, Adnan Gutub

    Published 2022-04-01
    “…Therefore, a secure, high-capacity strategy is needed to cover the data contained within media and make it difficult to detect. Due to the limited number of research studies that have achieved these ends through text steganography, we present an innovative approach for hiding secret bits in Arabic text with Unicode Standard seamless. …”
    Get full text
    Article
  18. 10418
  19. 10419

    Do we need to pay technical debt in blockchain software systems? by Yubin Qu, Tie Bao, Xiang Chen, Long Li, Xianzhen Dou, Meng Yuan, Hongmei Wang

    Published 2022-12-01
    “…Six types of technical debt are prevalent and there is not any algorithm debt. In addition, we find that the code comments containing technical debt are not entirely determined by task tags. …”
    Get full text
    Article
  20. 10420