-
2581
Role of Artificial Intelligence and Personalized Medicine in Enhancing HIV Management and Treatment Outcomes
Published 2025-05-01“…Advances in machine learning, deep neural networks, and multi-omics data analysis enable precise prognostication, tailored antiretroviral therapy, and early detection of drug resistance. …”
Get full text
Article -
2582
-
2583
Current Topics on the Integration of Artificial Intelligence in the Histopathological and Molecular Diagnosis of Uveal Melanoma
Published 2025-04-01“…<b>Background:</b> This review examines the expanding influence of artificial intelligence (AI) in the detection and management of uveal melanoma (UM). <b>Methods:</b> This work delves into the application of AI technologies such as machine learning (ML), deep learning (DL), and convolutional neural networks (CNNs) in various diagnostic procedures, molecular profiling, and predictive analysis. …”
Get full text
Article -
2584
Configuring Transmission Thresholds in IIoT Alarm Scenarios for Energy-Efficient Event Reporting
Published 2025-01-01“…Industrial Internet of Things (IIoT) applications involve real-time monitoring, detection, and data analysis. However, the intermittent activity of IIoT devices and limited battery capacity pose critical challenges. …”
Get full text
Article -
2585
Convolutional Neural Network for the Classification of the Control Mode of Grid-Connected Power Converters
Published 2024-12-01Get full text
Article -
2586
Efficient Brain Tumor Segmentation for MRI Images Using YOLO-BT
Published 2025-06-01Get full text
Article -
2587
AI-Powered IoT: A Survey on Integrating Artificial Intelligence With IoT for Enhanced Security, Efficiency, and Smart Applications
Published 2025-01-01“…These things or devices connected to IoT generate, gather and process a massive volume of binary data. This massive volume of data generated from these devices is analyzed and learned by AI algorithms and techniques that aid in providing users with better services. …”
Get full text
Article -
2588
-
2589
Population-based colorectal cancer risk prediction using a SHAP-enhanced LightGBM model
Published 2025-07-01“…BackgroundColorectal cancer (CRC) is a highly frequent cancer worldwide, and early detection and risk stratification playing a critical role in reducing both incidence and mortality. we aimed to develop and validate a machine learning (ML) model using clinical data to improve CRC identification and prognostic evaluation.MethodsWe analyzed multicenter datasets comprising 676 CRC patients and 410 controls from Guigang City People’s Hospital (2020-2024) for model training/internal validation, with 463 patients from Laibin City People’s Hospital for external validation. …”
Get full text
Article -
2590
Research and Implementation of Travel Aids for Blind and Visually Impaired People
Published 2025-07-01“…To address embedded device computational constraints, we developed a lightweight object detection and segmentation algorithm. Key innovations include a multi-scale attention feature extraction backbone, a dual-stream fusion module incorporating the Mamba architecture, and adaptive context-aware detection/segmentation heads. …”
Get full text
Article -
2591
Toward an Accurate Liver Disease Prediction Based on Two-Level Ensemble Stacking Model
Published 2024-01-01“…In this study, single and ensemble machine learning (ML) algorithms are applied to the Indian Liver Patient Dataset (ILPD) dataset, and their results, without and with feature selection techniques, are compared between each other and to the existing studies. …”
Get full text
Article -
2592
Occlusion Vehicle Target Recognition Method Based on Component Model
Published 2024-11-01Get full text
Article -
2593
An unsupervised underwater image enhancement method based on generative adversarial networks with edge extraction
Published 2024-12-01“…Obtaining such paired datasets in natural conditions is challenging, leading to performance issues in these algorithms. To address this issue, we propose an unsupervised generative adversarial network with edge detection for enhancing underwater images without needing paired data. …”
Get full text
Article -
2594
Dataset of noise signals generated by smart attackers for disrupting state of health and state of charge estimations of battery energy storage systemsMendeley
Published 2025-02-01“…Using Deep Reinforcement Learning (DRL) agent known as Proximal Policy Optimization (PPO), noise signals in the form of subtle millivolt and milliampere variations are strategically created to represent realistic cases of False Data Injection Attacks (FDIA). …”
Get full text
Article -
2595
Maintenance Time Prediction for Predictive Maintenance of Ship Engines
Published 2025-04-01“…Researchers are attempting to equip ships with predictive maintenance technology, which is used proactively in other modes of transportation to predict the maintenance time of machines through data monitoring and analysis. However, due to the nature of ship operation, data collection is difficult, and most studies focus on fault detection, hindering the application of predictive maintenance to ships. …”
Get full text
Article -
2596
MEMS and IoT in HAR: Effective Monitoring for the Health of Older People
Published 2025-04-01“…The analysis methods employed include machine learning algorithms to identify movement patterns, statistical analysis to assess the frequency and quality of movements, and data visualization to track changes over time. …”
Get full text
Article -
2597
Prediction and Assessment of Myocardial Infarction Risk on the Base of Medical Report Text Collection
Published 2024-12-01“…This underscores the significant potential of leveraging textual data and machine learning methods in medical diagnostics. …”
Get full text
Article -
2598
Magnetic resonance imaging of cruciate ligament disorders: current updates
Published 2025-07-01Get full text
Article -
2599
Making JavaScript Render Decisions to Optimize Security-Oriented Crawler Process
Published 2024-01-01“…The widespread use of web applications requires important changes in cybersecurity to protect online services and data. In the process of identifying security vulnerabilities in web applications, a systematic approach is employed to detect and mitigate cybersecurity risks. …”
Get full text
Article -
2600