Search alternatives:
pattern » patterns (Expand Search)
Showing 2,521 - 2,540 results of 2,894 for search 'features development pattern', query time: 0.12s Refine Results
  1. 2521

    Spatiotemporal regulation of alginate sub-structures at multiple scales revealed by monoclonal antibodies by Catherine T. Jones, Cassie Bakshani, Ieva Lelenaite, Jozef Mravec, Stjepan Krešimir Kračun, Jeff Pearson, Mathew D. Wilcox, Kevin Hardouin, Sonia Kridi, Cécile Hervé, William G.T. Willats

    Published 2025-06-01
    “…Alginates are comprised of D-mannuronic acid (M) and L-guluronic acid (G) and the ratios and distribution patterns of M and G profoundly impact their physiological and rheological properties. …”
    Get full text
    Article
  2. 2522

    Protocol for ‘Re: CBT Dialysis’: a realist evaluation—why, for whom and in what circumstances does cognitive behaviour therapy work for people with depressive symptoms receiving di... by Joanne Greenhalgh, Kara Schick-Makaroff, Scott Klarenbach, Megan Kennedy, Richard Sawatzky, Katrin Micklitz, Daniel Cukor, Hubert Wong, Charlotte Berendonk, Loretta Lee, Lori Suet Hang Lo

    Published 2025-06-01
    “…Realist methodology is a theory-driven approach that seeks to explain how generative mechanisms are shaped by contextual features, giving rise to outcome patterns. We will begin by developing an initial programme theory (IPT) from the literature and interviews with CBT therapists to understand how CBT is intended to work and for whom. …”
    Get full text
    Article
  3. 2523

    An algorithm for annotation and classification of T. cruzi MASP sequences: towards a better understanding of the parasite genetic variability by Aldana Alexandra Cepeda Dean, Luisa Berná, Carlos Robello, Carlos Andrés Buscaglia, Virginia Balouz

    Published 2025-02-01
    “…On the contrary, structural features of canonical MASPs, MASP-related sequences, and MASP-chimeras were largely conserved across parasite genomes. …”
    Get full text
    Article
  4. 2524

    Advanced artificial intelligence with federated learning framework for privacy-preserving cyberthreat detection in IoT-assisted sustainable smart cities by Mahmoud Ragab, Ehab Bahaudien Ashary, Bandar M. Alghamdi, Rania Aboalela, Naif Alsaadi, Louai A. Maghrabi, Khalid H. Allehaibi

    Published 2025-02-01
    “…Deep learning (DL) focused cyberthreat detection has developed as a powerful and effective approach to identifying abnormal patterns or behaviours in the data field. …”
    Get full text
    Article
  5. 2525

    Unobtrusive Sleep Posture Detection Using a Smart Bed Mattress with Optimally Distributed Triaxial Accelerometer Array and Parallel Convolutional Spatiotemporal Network by Zhuofu Liu, Gaohan Li, Chuanyi Wang, Vincenzo Cascioli, Peter W. McCarthy

    Published 2025-06-01
    “…Accurate identification of sleep postures can offer valuable insights into an individual’s sleep patterns, comfort levels, and potential health risks. …”
    Get full text
    Article
  6. 2526

    Exploring the potential of deep learning models integrating transformer and LSTM in predicting blood glucose levels for T1D patients by Xin Xiong, XinLiang Yang, Yunying Cai, Yuxin Xue, JianFeng He, Heng Su

    Published 2025-04-01
    “…The Transformer Encoder captures long-range dependencies, while the LSTM models short-term patterns. To improve feature extraction, we integrate Bidirectional LSTM and Transformer Encoder layers at multiple stages. …”
    Get full text
    Article
  7. 2527

    Fine-Tuning Retrieval-Augmented Generation with an Auto-Regressive Language Model for Sentiment Analysis in Financial Reviews by Miehleketo Mathebula, Abiodun Modupe, Vukosi Marivate

    Published 2024-11-01
    “…Additionally, the pre-training of a larger language model (PTLM) struggles to capture bidirectional contextual knowledge learnt through word dependency because the sentence-level representation fails to take broad features into account. We develop a novel structure called language feature extraction and adaptation for reviews (LFEAR), an advanced natural language model that amalgamates retrieval-augmented generation (RAG) with a conversation format for an auto-regressive fine-tuning model (ARFT). …”
    Get full text
    Article
  8. 2528

    Event-based landslide inventory through very high-resolution optical images and field surveys by P. Confuorto, R. Franceschini, L. Scarpitta, N. Casagli, S. Morelli, F. Raspini, V. Tofani, S. Moretti

    Published 2025-07-01
    “…Objectives This study aims to develop a detailed post-event landslide inventory of the Misa basin and to analyze the spatial distribution, the main morphological features, and the environmental context of the triggered landslides. …”
    Get full text
    Article
  9. 2529

    Efficient Anomaly Detection for Edge Clouds: Mitigating Data and Resource Constraints by Javad Forough, Hamed Haddadi, Monowar Bhuyan, Erik Elmroth

    Published 2024-01-01
    “…This enables the model to benefit from the learned features and patterns from related tasks such as network intrusion detection, resulting in improved detection accuracy. …”
    Get full text
    Article
  10. 2530

    Hyper IgE Syndromes: Understanding, Management, and Future Perspectives: A Narrative Review by Mohammad Salehi, Zeinab Neshati, Hamid Ahanchian, Rana Tafrishi, Alireza Pasdar, Mojtaba Safi, Ehsan Ghayoor Karimiani

    Published 2025-03-01
    “…In this review we aim to provide a comprehensive understanding of the condition and also discuss latest updates on pathological features, clinical spectrum and its variability, immunological abnormalities, inheritance patterns, new candidate genes, challenges, management strategies, epidemiology and future directions of HIES. …”
    Get full text
    Article
  11. 2531

    Explainability of Network Intrusion Detection Using Transformers: A Packet-Level Approach by Pahavalan Rajkumardheivanayahi, Ryan Berry, Nicholas U. Costagliola, Lance Fiondella, Nathaniel D. Bastian, Gokhan Kul

    Published 2025-01-01
    “…Machine learning based NIDS models leverage algorithms that learn from historical network traffic data to identify patterns and anomalies to capture complex relationships. …”
    Get full text
    Article
  12. 2532

    Surgical management and outcomes of corrosive esophageal injuries: a prospective study from Sana’a, Yemen by Mohammed Mohammed Al-Shehari, Yasser Abdurabo Obadiel, Ahmed Hamood Al-Helali, Haitham Mohammed Jowah

    Published 2025-07-01
    “…This study evaluated the demographic patterns, clinical presentations, management strategies, and outcomes of patients with corrosive esophageal injuries at a tertiary hospital in Sana’a, Yemen. …”
    Get full text
    Article
  13. 2533

    Deciphering transcriptomic signatures in schizophrenia, bipolar disorder, and major depressive disorder by Priyanka, Rajesh Kumar, Vinod Kumar, Ashwani Kumar, Sandeep Singh Rana

    Published 2025-07-01
    “…At the same time, each disorder also demonstrated unique transcriptional patterns, supporting the existence of disorder-specific mechanisms. …”
    Get full text
    Article
  14. 2534

    Roadblocks to ride: Unraveling barriers to access shared micromobility systems in the United States by Farzana Mehzabin Tuli, Suman Kumar Mitra

    Published 2025-03-01
    “…To elucidate the specific barriers faced by users, we employed the K-Prototype clustering methodology, an unsupervised machine learning technique capable of handling datasets with both numerical and categorical features. This approach enabled us to uncover distinct patterns and groupings among shared micromobility services based on these barriers. …”
    Get full text
    Article
  15. 2535

    A simulation-based network analysis of intervention targets for comorbid symptoms of depression and anxiety in Chinese healthcare workers in the post-dynamic zero-COVID policy era by Chao Zhang, Ruyong Li, Wei Zhang, Yanqiang Tao, Xiangping Liu, Yichao Lv

    Published 2025-05-01
    “…In this new phase, concerns related to work and family, rather than infection, may have become new sources of psychological issues such as depression and anxiety among healthcare workers, leading to new patterns of comorbidity. However, few studies have addressed these issues. …”
    Get full text
    Article
  16. 2536

    Latent Class Analysis of Gameplay Metrics from Youth Playing Robot ChampionsTM: Relations of Class Membership to Persistence and Intensity by Lawrence Scheier, William Hansen, Alex Stone, Jennifer Javornik

    Published 2025-07-01
    “…Impact: Findings are discussed in terms of ways game developers can utilize  log file data to learn more about the unique ways players engage in gameplay and what drives their actions during the game. …”
    Get full text
    Article
  17. 2537

    Relationship Between Heart Rate and Perceived Stress in Intensive Care Unit Residents: Exploratory Analysis Using Fitbit Data by Ruijing Wang, Olya Rezaeian, Onur Asan, Linghan Zhang, Ting Liao

    Published 2024-11-01
    “…The study used Spearman rank correlation, point-biserial correlation analysis, 2-tailed paired t tests, and mixed-effect models to analyze the relationship between heart rate features and stress indicators. ResultsThe findings reveal complex interactions between stress levels and heart rate patterns. …”
    Get full text
    Article
  18. 2538

    A practical temporal transfer learning model for multi-step water quality index forecasting using A CNN-coupled dual-path LSTM network by Kok Poh Wai, Chai Hoon Koo, Yuk Feng Huang, Woon Chan Chong, Ahmed El-Shafie, Mohsen Sherif, Ali Najah Ahmed

    Published 2025-08-01
    “…The CNN-LSTM model effectively extracts inter-parameter features and learns temporal patterns, achieving strong five-step ahead forecasting performance. …”
    Get full text
    Article
  19. 2539
  20. 2540

    Mitigating malicious denial of wallet attack using attribute reduction with deep learning approach for serverless computing on next generation applications by Amal K. Alkhalifa, Mohammed Aljebreen, Rakan Alanazi, Nazir Ahmad, Sultan Alahmari, Othman Alrusaini, Ali Alqazzaz, Hassan Alkhiri

    Published 2025-05-01
    “…The deep learning (DL) model, a part of the machine learning (ML) technique, has developed as an effectual device in cybersecurity, permitting more effectual recognition of anomalous behaviour and classifying patterns indicative of threats. …”
    Get full text
    Article