-
1141
The Accuracy of Diagnostic Tests for Lyme Disease in Humans, A Systematic Review and Meta-Analysis of North American Research.
Published 2016-01-01“…Recent studies examining the sensitivity and specificity of various test protocols noted that the Immunetics® C6 B. burgdorferi ELISA™ and the two tier approach have superior specificity compared to proposed replacements, and the CDC recommended western blot algorithm has equivalent or superior specificity over other proposed test algorithms. …”
Get full text
Article -
1142
Seismic Damage Quantification of RC Short Columns from Crack Images Using the Enhanced U-Net
Published 2025-01-01“…It is of great importance to quantify the seismic damage of reinforced concrete (RC) short columns since they often experience severe damage due to likely excessive shear deformation. …”
Get full text
Article -
1143
Forecasting the vapor pressure deficit in vertical farming facilities aiming to provide optimal indoor conditions
Published 2025-07-01“…This research develops and validates a prediction model based on NeuralProphet algorithm to assess the vapor pressure deficit in a vertical farming facility. …”
Get full text
Article -
1144
PEMANFAATAN DIGITAL TERRAIN MODEL HASIL FOTOGRAMETRI UNMANED AERIAL VEHICLE UNTUK ESTIMASI KETINGGIAN GENANGAN AIR BANJIR HASIL DETEKSI CITRA SYNTHETIC APPERTURE RADAR
Published 2021-05-01“…This study has produced 4 sets of DTMs; 2 sets of DTMs with different grid resolution which are 2 cm & 40 cm, also the 2 other sets of DTM with extra fine nature algorithm and set of filtering parameters adjustment; bulge, offset, spike and standard deviation. …”
Get full text
Article -
1145
Multi-Scale Multi-Domain Hybrid Finite Element Modeling of Light Propagation
Published 2024-12-01“…Since the computational time is inversely proportional to the number of decomposed subdomains (N) under the parallel computing configuration, the computational time in our work is approximately reduced to \begin{document}${1}/{3N}$\end{document} of that using standard FEM for the two examples.…”
Get full text
Article -
1146
A framework for locating multiple RFID tags using RF hologram tensors
Published 2025-04-01“…We also present an intuitive peak finding algorithm to obtain estimated locations using the sanitized hologram tensors. …”
Get full text
Article -
1147
A lightweight hardware implementation of CRYSTALS-Kyber
Published 2024-03-01“…Since December 2016, the National Institute of Standards and Technology (NIST) has begun to solicit post-quantum cryptographic (PQC) algorithms worldwide. …”
Get full text
Article -
1148
Diaphragm injuries in a mature trauma system: still a diagnostic challenge
Published 2024-12-01“…Even more, despite major improvement in diagnostic modalities over the past 2 decades, the algorithm for detection of diaphragmatic injuries has not changed nor has its outcome. …”
Get full text
Article -
1149
Toward Automated Air Leak Localization: A Machine Learning-Enhanced Ultrasonic and LiDAR-SLAM Framework for Industrial Environments
Published 2025-01-01“…Typically ultrasonic microphone arrays are used to detect the leaks, since the escaping air causes turbulences around the leak opening. …”
Get full text
Article -
1150
Phenotypic heterogeneity and diagnostic features of transthyretin amyloidosis with polyneuropathy
Published 2021-12-01“…Early diagnosis is critically important for patients with ATTR polyneuropathy, since the early prescription of Vyndaqel (tafamidis), registered in the Russian Federation in 2017, allows a significant clinical effect to be obtained. …”
Get full text
Article -
1151
Polarimetric Identification of 3D-Printed Nano Particle Encoded Optical Codes
Published 2020-01-01“…Recently, this concept was extended to optical codes: we demonstrated that the combined use of optical techniques and machine learning algorithms might be able to distinguish among different classes of samples. …”
Get full text
Article -
1152
Restoration of Hardware Function of Spectral Colorimeters Using Regularization Methods
Published 2021-12-01“…An algorithm for restoring the hardware function of a spectral device based on regular methods for solving ill-posed problems is proposed. …”
Get full text
Article -
1153
Detection of anthropogenic noise pollution as a possible chronic stressor in Antarctic Specially Protected Area N°150, Ardley Island
Published 2025-07-01“…Anthropogenic noise pollution is emerging as an important environmental stressor with the potential effect of disrupting natural ecosystems, since many taxa rely on acoustic signals for social interaction and communication. …”
Get full text
Article -
1154
Text mining of hypertension researches in the west Asia region: a 12-year trend analysis
Published 2024-12-01“…Present analysis uses Latent Dirichlet allocation (LDA) as an algorithm of topic modeling (TM) in text mining, to obtain subjective topic-word distribution from the 2790 studies over the EMRO. …”
Get full text
Article -
1155
Efficient Bayesian inference for stochastic agent-based models.
Published 2022-10-01“…However, we find that while some methods generally produce more robust results than others, no algorithm offers a one-size-fits-all solution when attempting to infer model parameters from observations. …”
Get full text
Article -
1156
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
1157
DTIP-WINDGRU a novel drug-target interaction prediction with wind-enhanced gated recurrent unit
Published 2025-07-01“…Finally, the Wind Driven Optimization (WDO) algorithm is utilized to optimally choose the hyperparameters involved in the GRU model. …”
Get full text
Article -
1158
Constructing a web recommender system using web usage mining and user’s profiles
Published 2014-12-01“…Following the creation of user profiles, users are categorized in clusters using the Fuzzy C-means clustering algorithm and S(c) criterion based on their similarities. …”
Get full text
Article -
1159
Leveraging stacking machine learning models and optimization for improved cyberattack detection
Published 2025-05-01“…There are high hurdles in managing high-dimensional network traffic since current methodologies are limited in dealing with imbalanced data issues of minority classes versus the majority and high false positive rate in classification accuracy. …”
Get full text
Article -
1160
UAV-Based SAR-Imaging of Objects From Arbitrary Trajectories Using Weighted Backprojection
Published 2025-01-01“…Both the distance between radar and targets as well as the viewing angle of the radar change significantly during flight. A common imaging algorithm for close-range and nonlinear flightpaths is therefore backprojection (BP), since it respects the nonlinear flightpath. …”
Get full text
Article