-
1901
Dynamic taxonomy generation for future skills identification using a named entity recognition and relation extraction pipeline
Published 2025-07-01“…A custom pipeline was used for PDF text extraction, tokenization, and lemmatization to standardize the data. The models were trained and evaluated using over 1,700 annotated documents, with the training process optimized for both entity recognition and relationship prediction accuracy.ResultsThe NER and RE models demonstrated promising performance. …”
Get full text
Article -
1902
Enhancing Skin Disease Diagnosis Through Fine-Tune Convolutional Neural Network: A Comparative Study with Multi-class Approach
Published 2023-09-01“…It was found that fine-tune Xception performed exceptionally well, with an accuracy rate of 99.14%. It was closely followed by DenseNet201 and InceptionV3, each with different processing speeds, 98.74% and 98.46%, respectively. …”
Get full text
Article -
1903
Enhancing Skin Disease Diagnosis Through Fine-Tune Convolutional Neural Network: A Comparative Study with Multi-class Approach
Published 2023-09-01“…It was found that fine-tune Xception performed exceptionally well, with an accuracy rate of 99.14%. It was closely followed by DenseNet201 and InceptionV3, each with different processing speeds, 98.74% and 98.46%, respectively. …”
Get full text
Article -
1904
-
1905
Privacy protection of sexually transmitted infections information from Chinese electronic medical records
Published 2025-01-01“…The research was conducted at a national healthcare data center, where a committee of experts designed rule-based protocols utilizing natural language processing techniques to extract STI information. …”
Get full text
Article -
1906
Anomaly Detection in Elderly Health Monitoring via IoT for Timely Interventions
Published 2025-06-01“…The collected data for average heart rate (AR), minimum (mR), maximum (MR), number of steps (S), deep sleep time (DST), and superficial sleep time (SST) is processed in real-time through a health anomaly detection algorithm (HADA), based on the dimensionality reduction method using PCA. …”
Get full text
Article -
1907
-
1908
Comparative assessment of the state of digitalisation in higher education institutions
Published 2024-09-01“…The main research methods involved morphological analysis, index, and matrix and score-rating methods. On the basis of the morphological matrix, the rating of a higher education institution was formed as an integral assessment, taking into account the weight values of its spheres. …”
Get full text
Article -
1909
-
1910
Out-of-hospital cardiac arrest: assessing the problem status and identifying priority areas for improving the care provision. Data from the 2020-2022 Crimean registry
Published 2024-02-01“…An analysis of the data from the "Crimean registry of cases of OHCA and cardiopulmonary resuscitation" was performed. …”
Get full text
Article -
1911
GPS Phase Integer Ambiguity Resolution Based on Eliminating Coordinate Parameters and Ant Colony Algorithm
Published 2025-01-01“…When solving the float solution of ambiguity based on the double-difference model epoch by epoch, the common method for resolving the integer ambiguity needs to solve the coordinate parameter information, due to the influence of limited GNSS phase data observations. This type of method will lead to an increase in the ill-posedness of the double-difference solution equation, so that the fixed success rate of the integer ambiguity is not high. …”
Get full text
Article -
1912
UAV Trajectory Control and Power Optimization for Low-Latency C-V2X Communications in a Federated Learning Environment
Published 2024-12-01“…Since vehicles’ sensors generate immense amount of data, the latency in processing these applications also increases, particularly when the data are not independently identically distributed (non-i.i.d.). …”
Get full text
Article -
1913
Data on transgenerational memory effects of photosynthetic efficiency of twelve wheat varieties under elevated carbon dioxide concentration and reduced soil water availabilityZenod...
Published 2025-06-01“…We provide photosynthetic raw data as well as processed (merged) and derived (extracted ACi fit) data. …”
Get full text
Article -
1914
Application of the RUSLE model to estimate water erosion in the southwestern basins of Akre Mountain
Published 2022-12-01Get full text
Article -
1915
Using Compact 1H NMR, NIR, and Raman Spectroscopy Combined with Multivariate Data Analysis to Monitor a Biocatalyzed Reaction in a Microreaction System
Published 2018-01-01“…The data obtained were interpreted in terms of a first-order kinetic model, and corresponding reaction rate constants were extracted. …”
Get full text
Article -
1916
Classifying Divorce Cases in Iranian Judiciary Courts Using Machine Learning: A Predictive Perspective
Published 2024-04-01“…Key socioeconomic factors influencing divorce cases, such as unemployment rate and urbanization rate, are identified. The findings provide actionable insights for policymakers to develop data-driven strategies for social policy and resource allocation.…”
Get full text
Article -
1917
High capacity reversible hiding in encrypted domain based on cipher-feedback secret sharing
Published 2023-09-01“…To improve the security, robustness and embedding rate of reversible hiding in encrypted domain in the distributed environment, a multiple embedding algorithm based on cipher-feedback secret sharing was proposed.Firstly, the additional data were embedded into the polynomial coefficients redundancy generated in the process of secret image sharing.Secondly, the extra secrets were embedded by using the additive homomorphism of secret sharing.Experimental results demonstrate that a better security and robustness has been obtained by improving the diffusion characteristic of secret sharing using the feedback mechanism.In the (3,4) and (3,5) threshold, the embedding rates can reach 6.00 bit per pixel and 4.80 bit per pixel respectively.The proposed algorithm can not only maintain the strong security and separability, but also obtain a better embedding capacity.Meanwhile, the embedding rate of the scheme is not affected by the carrier image and is only related to the selection of algorithm parameters.…”
Get full text
Article -
1918
Mi-maml: classifying few-shot advanced malware using multi-improved model-agnostic meta-learning
Published 2024-11-01“…These approaches do not consider the integration of both processes or tailor the neural network and learning rate schedules to the specific task. …”
Get full text
Article -
1919
Tribological performance of graphene oxide reinforced PEEK nanocomposites with machine learning approach
Published 2024-12-01“…Polymer specimens were produced by incorporating varying concentrations of graphene oxide (GO) (1, 3, and 5 wt percent) into the PEEK matrix using the Sol-Gel process. Wear rate and friction coefficient of the polymer Nano composite (PEEK-GO) were evaluated using a pin-on-disk machine at room temperature under different loads (20, 30, and 60) and track diameters (60, 90, and 100). …”
Get full text
Article -
1920