Search alternatives:
evolution » evaluation (Expand Search)
Showing 1,001 - 1,020 results of 3,286 for search 'features evolution', query time: 0.16s Refine Results
  1. 1001

    Clonal divergence and genomic meltdown in prostatic pleomorphic giant cell adenocarcinoma by Xiaoshi Ma, Xiaoshi Ma, Kun Chen, Kun Chen, Jing Zhang, Liming Liu, Liming Liu, Jiping Luo, Kaipeng Huang, Hongying Zhang, Danni Liu, Jizhou Gou, Changyin Feng, Xia Zhao, Wanying Li, Lipeng Chen, Li Yin, Li Yin, Li Yin, Xianlin Meng, Zhiqiang Cheng, Zhiqiang Cheng

    Published 2025-08-01
    “…BackgroundPleomorphic giant cell adenocarcinoma (PGCA) of the prostate is a rare, aggressive variant characterized by multinucleated giant cells, sarcomatoid features, and resistance to conventional therapies. …”
    Get full text
    Article
  2. 1002
  3. 1003
  4. 1004

    Efficient Image Processing Technique for Detecting Spatio-Temporal Erosion in Boron Nitride Exposed to Iodine Plasma by Ahmed S. Afifi, Janith Weerasinghe, Karthika Prasad, Igor Levchenko, Katia Alexander

    Published 2025-06-01
    “…This study introduces an efficient image processing technique to monitor the evolution of the erosion depth in boron nitride (BN) subjected to multiple cycles of iodine plasma exposure. …”
    Get full text
    Article
  5. 1005

    Experience of Paleotectodynamic Analysis of Rank Components of Mesozoic-Cenozoic Movements and Deformations Using the Example of the Central Part of Bukharo-Khiva Region by R. A. Umurzakov, H. A. Akhmedov

    Published 2024-06-01
    “…The previously unknown features of the structural plans of different horizons and their evolution in the Mesozoic – Cenozoic history were established. …”
    Get full text
    Article
  6. 1006
  7. 1007

    Research on traffic representation in network anomaly detection by SUN Jianwen, ZHANG Bin, CHANG Heyu

    Published 2025-01-01
    “…Subsequently, the evolution of traffic representation in network anomaly detection was systematically reviewed, providing a comprehensive analysis of its forms, feature learning, and application in anomaly detection both globally and domestically. …”
    Get full text
    Article
  8. 1008

    Overview of detection techniques for malicious social bots by Rong LIU, Bo CHEN, Ling YU, Ya-shang LIU, Si-yuan CHEN

    Published 2017-11-01
    “…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
    Get full text
    Article
  9. 1009

    Nature of the creative class of a cognitive society: conceptual aspect by G.V. Smolonsky

    Published 2024-12-01
    “…The author has revealed the constructive features of the creative class, capable of playing a decisive role in the management segment. …”
    Get full text
    Article
  10. 1010

    Overview of detection techniques for malicious social bots by Rong LIU, Bo CHEN, Ling YU, Ya-shang LIU, Si-yuan CHEN

    Published 2017-11-01
    “…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
    Get full text
    Article
  11. 1011

    Spiral Dynamics of the Development of the Process of Intellectualization in the Context of Globalization Changes: Methodological Aspects by Shepelenko Svitlana M.

    Published 2024-06-01
    “…The article discusses the features of the development of the process of intellectualization in the context of globalization changes through the prism of the theory of spiral dynamics. …”
    Get full text
    Article
  12. 1012

    Specifics of Advertising Communication in the Second Half of 19<sup>th</sup> Century (by Example of “Nature and Hunting” Magazine) by A. V. Lyapina, O. Yu. Vasilyeva

    Published 2019-04-01
    “…An attempt is made to trace the evolution of the advertisement genre in the history of the Russian language, as a result of which the advertisement is qualified as a “secondary speech genre.” …”
    Get full text
    Article
  13. 1013

    Forensic Comparison of Acoustic Voice Samples Recorded in Different Mobile Phone Devices: A Preliminary Study by Bhavya Sharma, Bhuvnesh Yadav, Sanjeev Kumar, Gurvinder Singh Bumbrah, Aman Sharma

    Published 2025-01-01
    “…The widespread accessibility of mobile phone devices, be it Android, iOS, or Feature phone, has significantly increased the prevalence of voice evidence in criminal cases. …”
    Get full text
    Article
  14. 1014
  15. 1015

    Predictive performance and uncertainty analysis of ensemble models in gully erosion susceptibility assessment by Congtan Liu, Haoming Fan, Yixuan Wang

    Published 2025-06-01
    “…Gully erosion, as a significant natural process in geomorphological evolution, poses serious threats to natural environments and socio-economic stability. …”
    Get full text
    Article
  16. 1016

    Témoins archéologiques de l’estive médiévale et moderne : évolution typo-chronologique et spécificités de l’habitat agropastoral sur le haut Forez entre le xie s. et le xviiie s. (... by Antoine Scholtès, Priscille Chapuis, Jacques Verrier, Christian Le Barrier, Christophe Mathevot, Hervé Cubizolle

    Published 2024-07-01
    “…The typo-chronological evolution of the settlements and their architectural features reflects a progressive structuring of pastoralism closely linked to the needs and orientations of the regional economy (Forez, Dore, Limagne). …”
    Get full text
    Article
  17. 1017
  18. 1018
  19. 1019

    Clinical application of Baizhu Houpu Decoction in treatment of chronic kidney disease in the Ji Hai year by YUAN Song-zhu, GAO Xia, SI Ting-lin

    Published 2020-01-01
    “…Chronic kidney disease(CKD) is a slowly-progressing disease of chronic disorders of renal structures and functions arising from various causes(renal injury for more than 3 months),which may affect physiological functions of many systems in the human body.Our supervisor investigated the Qi running features and pathogenesis characteristics of patients with CKD,based on the theory of the doctrine of five evolutive phases and six climatic factors,and applied the six Ji-year recipe Baizhu Houpu Decoction to treatment of CKD patients and achieved good efficacy.The study has provided a new approach and method for treatment of CKD.…”
    Get full text
    Article
  20. 1020

    Evolution of Griffiths-like Anomaly in Isostructural Swedenborgite Compounds Ho<sub>1−<i>x</i></sub>Er<sub><i>x</i></sub>BaCo<sub>4</sub>O<sub>7+<i>δ</i></sub> by Biplab Pakhuria, Rafikul Ali Saha, Carlo Meneghini, Fabrice Bert, Shruti Kundu, Sugata Ray

    Published 2025-06-01
    “…To explore the curious disappearance of such an anomalous feature in <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi>ErBaCo</mi><mn>4</mn></msub></semantics></math></inline-formula><inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi mathvariant="normal">O</mi><mrow><mn>7</mn><mo>+</mo><mi>δ</mi></mrow></msub></semantics></math></inline-formula>, we prepared a series of compounds with varying compositions <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi>Ho</mi><mrow><mn>1</mn><mo>−</mo><mi>x</mi></mrow></msub></semantics></math></inline-formula><inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi>Er</mi><mi>x</mi></msub></semantics></math></inline-formula><inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi>BaCo</mi><mn>4</mn></msub></semantics></math></inline-formula><inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi mathvariant="normal">O</mi><mrow><mn>7</mn><mo>+</mo><mi>δ</mi></mrow></msub></semantics></math></inline-formula> (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>0</mn><mo>≤</mo><mi>x</mi><mo>≤</mo><mn>1</mn></mrow></semantics></math></inline-formula>) and systematically studied the evolution of various physical properties as a function of Er-doping. …”
    Get full text
    Article