Showing 12,121 - 12,140 results of 25,328 for search 'research algorithm', query time: 0.32s Refine Results
  1. 12121

    Clinical Variations of Uveitis in Immuno-Inflammatory Diseases. Review of the Literature. Part 1 by G. A. Davydova, T. A. Lisitsyna, L. A. Kovaleva, E. S. Sorozhkina, A. A. Zaitseva, A. A. Baisangurova

    Published 2022-10-01
    “…Despite the currently existing diagnostic and therapeutic schemes, further study of the pathogenesis of uveitis associated with immune-inflammatory diseases is required, the research of a personalized approach and an algorithm for joint multidisciplinary diagnosis by specialists in various fields. …”
    Get full text
    Article
  2. 12122
  3. 12123
  4. 12124
  5. 12125

    18F-FLUORODEOXYGLUCOSE POSITRON EMISSION TOMOGRAPHY COMBINED WITH COMPUTED TOMOGRAPHY IN EVALUATION OF EFFECTIVENESS OF TARGETED THERAPY OF RADIOACTIVE IODINE-REFRACTORY DIFFERENT... by A. A. Odzharova, M. B. Dolgushin, A. M. Mudunov, I. S. Romanov, R. E. Tulin, D. I. Nevzorov

    Published 2017-11-01
    “…Blokhin National Medical Research Oncology Center, Ministry of Health of Russia; 24 Kashirskoe Shosse, Moscow 115478, Russia Positron emission tomography (PET) with 18F-fluorodeoxyglucose is included in the algorithm of examination and monitoring in patients with radioactive iodine-refractory differentiated thyroid cancer. …”
    Get full text
    Article
  6. 12126

    LI-RADS CT/MRI Treatment Response Assessment Update in 2024 by Jaeseung Shin, Kyowon Gu, Ji Hye Min

    Published 2025-05-01
    “…Initially introduced in 2017, it was revised in 2024 to reflect advances in research. The updated LI-RADS CT/MRI TRA v2024 presents a bifurcated algorithm based on the mechanisms underlying loco-regional therapy and introduces distinct assessment criteria with which to evaluate treatment response after radiation therapy. …”
    Get full text
    Article
  7. 12127
  8. 12128
  9. 12129

    Rough decision rules extraction and reduction based on granular computing by Hong-can YAN, Feng ZHANG, Bao-xiang LIU

    Published 2016-10-01
    “…Rule mining was an important research content of data mining,and it was also a hot research topic in the fields of decision support system,artificial intelligence,recommendation system,etc,where attribute reduction and minimal rule set extraction were the key links.Most importantly,the efficiency of extraction was determined by its application.The rough set model and granular computing theory were applied to the decision rule reduction.The decision table was granulated by granulation function,the grain of membership and the concept granular set construction algorithm gener-ated the initial concept granular set.Therefore,attribute reduction could be realized by the distinguish operator of concept granule,and decision rules extraction could be achieved by visualization of concept granule lattice.Experimental result shows that the method is easier to be applied to computer programming and it is more efficient and practical than the existing methods.…”
    Get full text
    Article
  10. 12130

    Block ciphers identification scheme based on the distribution character of randomness test values of ciphertext by Yang WU, Tao WANG, Meng XING, Jin-dong LI

    Published 2015-04-01
    “…By researching deficiency of current encryption algorithms identification schemes,a block ciphers identification scheme is proposed based on the distribution character of randomness test values for ciphertext.Firstly,the numbers of randomness test values for AES,Camellia,DES,3DES,SMS4 are respectively calculated based on the frequency test,frequency test in block,run test and originally clustered by the k-means algorithm.Secondly,in order to identify the block ciphers in each clustering,the dimensions of eigenvectors to the frequency test,frequency test in block,run test are calculated on the principle of reducing the comparability between eigenvectors.Eventually,the experimental results of AES,Camellia,DES,3DES,SMS4 demonstrate that the proposed scheme effectively identified the above representative block ciphers,and the correlative research can promote the further encryption algorithms identification research.…”
    Get full text
    Article
  11. 12131
  12. 12132
  13. 12133

    Solutions of Nonlinear Operator Equations by Viscosity Iterative Methods by Mathew Aibinu, Surendra Thakur, Sibusiso Moyo

    Published 2020-01-01
    “…Finding the solutions of nonlinear operator equations has been a subject of research for decades but has recently attracted much attention. …”
    Get full text
    Article
  14. 12134

    The threshold of the residual pitch in three-component inharmonic stimuli by Adam Mielczarek

    Published 2014-01-01
    “…The paper presents the research results of the first effect of pitch shift in three-component inharmonic complexes. …”
    Get full text
    Article
  15. 12135
  16. 12136
  17. 12137
  18. 12138

    Psychological Stress Identification and Evaluation Method Based on Mobile Human-Computer Interaction Equipment by Na Zhang

    Published 2022-01-01
    “…Since the 1980s, the research of artificial neural networks in the field of artificial intelligence has become more and more common. …”
    Get full text
    Article
  19. 12139
  20. 12140