Search alternatives:
method » methods (Expand Search)
Showing 6,221 - 6,240 results of 22,078 for search 'visualization method', query time: 0.17s Refine Results
  1. 6221

    THE FORMATION OF IT COMPETENCE OF THE ACADEMIC STAFF IN A THREE LEVEL SYSTEM OF HIGHER EDUCATION by T. A. Boronenko, V. S. Fedotova

    Published 2016-01-01
    “…The aim of the study is to discuss organizational and methodical bases of formation of ICT competence graduate in the third stage of higher education.Methods. …”
    Get full text
    Article
  2. 6222

    A novel solid phase synthesis of an estradiol derivative and preclinical evaluation for targeting estrogen-receptor positive breast cancer by Subhani M. Okarvi

    Published 2025-08-01
    “…This study introduces an innovative and effective method for synthesizing the DOTA-coupled estradiol derivative and evaluating its preclinical potential. 68Ga/177Lu-labeled estradiol derivative was evaluated in vitro for its stability in human plasma, and binding capacity was determined using the ER-positive MCF-7 breast cancer cell line. …”
    Get full text
    Article
  3. 6223

    Developing a Socioculturally Nuanced Systems Model of Childhood Obesity in Manhattan’s Chinese American Community via Group Model Building by Ewelina Swierad, Terry T.-K. Huang, Ellis Ballard, Karen Flórez, Sheng Li

    Published 2020-01-01
    “…GMB represents a novel method to understand the complexity of childhood obesity in culturally specific populations and contexts. …”
    Get full text
    Article
  4. 6224

    One stage correction of anorectal malformations in newborns. by I. O. Makedonsky

    Published 2015-06-01
    “…Available merits of the described method: only one operation and general anesthesia is per­for­med, no risk of prolonged contamination by pathogenic flora of the urinary system through the fistula, potential risk of complications of laparotomy and colostomy decreases, fistula visualization in cystoscopy allows to avoid the X-ray.…”
    Get full text
    Article
  5. 6225

    Use of Artificial Intelligence in the Digital Economy by N. A. Olimov

    Published 2025-05-01
    “…One of the simplest options is trend analysis using the regression method. Here is an example of simple code for market analysis using linear regression. …”
    Get full text
    Article
  6. 6226

    Improving Cerebrovascular Imaging with Deep Learning: Semantic Segmentation for Time-of-Flight Magnetic Resonance Angiography Maximum Intensity Projection Image Enhancement by Tomonari Yamada, Takaaki Yoshimura, Shota Ichikawa, Hiroyuki Sugimori

    Published 2025-03-01
    “…Using DeepLab v3+, a convolutional neural network model optimized for segmentation accuracy, the method achieved an average Dice Similarity Coefficient (DSC) of 0.9615 and an Intersection over Union (IoU) of 0.9261 across five-fold cross-validation. …”
    Get full text
    Article
  7. 6227

    Statistical analysis of spatial patterns in tumor microenvironment images by Mohamed M. Benimam, Vannary Meas-Yedid, Suvadip Mukherjee, Astri Frafjord, Alexandre Corthay, Thibault Lagache, Jean-Christophe Olivo-Marin

    Published 2025-03-01
    “…Abstract Advances in tissue labeling, imaging, and automated cell identification now enable the visualization of immune cell types in human tumors. However, a framework for analyzing spatial patterns within the tumor microenvironment (TME) is still lacking. …”
    Get full text
    Article
  8. 6228

    Preventing unrecognized esophageal intubation in the emergency department by John C. Sakles, Christopher Ross, George Kovacs

    Published 2023-06-01
    “…Capnography has been shown to be the most accurate method to determine tube placement after intubation. …”
    Get full text
    Article
  9. 6229

    Failure Detection in Sensors via Variational Autoencoders and Image-Based Feature Representation by Luis Miguel Moreno Haro, Adaiton Oliveira-Filho, Bruno Agard, Antoine Tahan

    Published 2025-03-01
    “…The results demonstrate the potential of the proposed method in detecting multiple sensor failures.…”
    Get full text
    Article
  10. 6230

    Rancang Bangun Aplikasi Augmented Reality Sebagai Media Promosi Model Tatanan Rambut Pada Barbershop Berbasis Android by Putu Adistyanda Timoti Raja Karda, I Made Arsa Suyadnya, Duman Care Khrisne

    Published 2018-04-01
    “…In this research will be developed an Augmented Reality based promotion media to promote hair model model with 3 dimensional object visualization using marker based tracking method. Development of this application starts from the stage of concept creation, application design, 3-dimensional object creation, application assembly, application testing, until the application distribution stage. …”
    Get full text
    Article
  11. 6231

    Retrospective analysis of ultrasound criteria for newly diagnosed extragenital endometriosis detected during preventive examinations by O. E. Nechaeva, I. S. Gruzdev, Yu. V. Popov, A. G. Kedrova, V. N. Lesnyak, N. S. Nosenko

    Published 2020-11-01
    “…We evaluated location, size, contours, and structure of foci. We propose a method of extended ultrasound examination in women with suspected extragenital endometriosis.…”
    Get full text
    Article
  12. 6232
  13. 6233

    Urinary Bladder and Posterior Urethral Morphology in Voiding Cystourethrogram and Its Implications in Management and Prognosis of Posterior Urethral Valves by Manita Tamang, Manoj Kumar Mohanty, Aditya Arvind Manekar, Subrat Kumar Sahoo, Bikasha Bihary Tripathy

    Published 2025-03-01
    “…The diagnosis of PUV is made by visualization of the valve by cystoscopy, and for documenting PUV, voiding cystourethrogram (VCUG) remains the gold standard imaging method. …”
    Get full text
    Article
  14. 6234
  15. 6235

    RETRACTED: Simplicial Complex-Enhanced Manifold Embedding of Spatiotemporal Data for Structural Health Monitoring by Nan Xu, Zhiming Zhang, Yongming Liu

    Published 2023-03-01
    “…The proposed methodology effectively represents both intra-series and inter-series correlations in the low-dimensional embeddings, making it useful for classification and visualization. Numerical simulations and two benchmark experimental datasets validate the high accuracy of the proposed method in classifying different damage scenarios and preserving useful information for structural identification. …”
    Get full text
    Article
  16. 6236

    ELECTRONIC CONTROL FOR FUEL SUPPLY OF DIESEL ENGINE ON THE BASIS OF PROGRAMMABLE PID-REGULATOR by A. G. Bakhanovich, V. A. Kusyak, A. N. Gurin, Van Ngia Le

    Published 2017-01-01
    “…Governor’s setting (proportional, integral and differential component) performed empirically using the classical Ziegler – Nichols method, based on the analysis of the safety factor of automatic control system. …”
    Get full text
    Article
  17. 6237

    Exploring the primary drivers of innovation in fintech startups: a case of Sasai by M. Nyabeze, J. Muvingi

    Published 2025-03-01
    “…The literature and visualization research do not adequately address the role of financial regulations, the impact of fintech advancements in payments and financial services, or their future trajectory. …”
    Get full text
    Article
  18. 6238

    Sentiment Analysis of Suicide on X Using Support Vector Machine and Naive Bayes Classifier Algorithms by M. Fariz Fadillah Mardianto, Bagas Shata Pratama, Marfa Audilla, Elly Pusporani

    Published 2025-02-01
    “…The findings are expected to raise public awareness and provide policy recommendations to support mental health initiatives. Methods: One method used to understand public perception regarding the issue of suicide is text mining. …”
    Get full text
    Article
  19. 6239

    MODEL OF THE PROCESS OF FUNCTIONING OF THE INFORMATION PROTECTION SYSTEM FROM UNAUTHORIZED ACCESS CREATED IN THE SOFTWARE ENVIRONMENT OF IMITATION MODELING "CPN TOOLS" by O. I. Bokova, I. G. Drovnikov, A. D. Popov, E. A. Rogozin

    Published 2019-07-01
    “…In order to analyze, obtain and study the probabilistic-time characteristics of this system, it is necessary to develop a mathematical model of its operation using an imitational modeling tool.Method. One of the methods for solving this problem is a computational experiment, which is based on the construction of a simulation model. …”
    Get full text
    Article
  20. 6240

    The Task of Detecting Unacceptable Information Security Events in the Information Infrastructure by Darya A. Evdokimova, Andrey A. Mikryukov

    Published 2025-03-01
    “…As cyber threats grow more complex and diverse, traditional detection methods are becoming increasingly ineffective, necessitating improvements in existing technologies to protect information systems.The novelty of the proposed solutions lies in improving the accuracy of detecting unacceptable events through the use of machine learning methods and a neural network classifier, as well as reducing response time by utilizing the Elastic Stack tool for data collection, processing, aggregation, and visualization.Materials and methods. …”
    Get full text
    Article