-
7261
Surface water quality assessment for drinking and pollution source characterization: A water quality index, GIS approach, and performance evaluation utilizing machine learning anal...
Published 2025-07-01“…Overall, the LOR, KNN, ANN, and SVM algorithms were all surpassed by the RF algorithm. Additionally, the prediction and simulation results show an increasing tendency in the changes in water quality over the examined time. …”
Get full text
Article -
7262
Seasonal to decadal variability and persistence properties of the Euro-Atlantic jet streams characterized by complementary approaches
Published 2025-06-01“…</p> <p>First, we apply the self-organizing map (SOM) clustering algorithm to create a 2D distance-preserving discrete feature space for the tropopause-level summer wind field over the North Atlantic. …”
Get full text
Article -
7263
Komparasi Data Mining Naive Bayes dan Neural Network memprediksi Masa Studi Mahasiswa S1
Published 2020-05-01“…By using the data mining algorithm Naive bayes and neural network, the student graduation in STMIK Widya Cipta Dharma (WiCiDa) can be predicted. …”
Get full text
Article -
7264
Contagious infection-free medical interaction system with machine vision controlled by remote hand gesture during an operation
Published 2024-12-01“…A proposed depth enhancement algorithm is combined with a deep learning hand landmark detector to generate hand landmarks. …”
Get full text
Article -
7265
Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing
Published 2022-06-01“…Methods:Firstly,an efficient attribute vector and policy vector generation algorithm is proposed using vector compression technology, which judges whether user attributes satisfy the access policy through the inner product operation result of attribute vector and policy vector.Afterwards, the prime order bilinear group and attribute encryption technology were used to achieve fine-grained access control while avoiding the leakage of user attribute values; using the interstellar file system to store the ciphertext and storing the hash address of the ciphertext on the blockchain through a smart contract,it realizes distributed and reliable access control and reduces the storage overhead of the blockchain. …”
Get full text
Article -
7266
Epidemiological and clinical characteristics of bacterial co-detection in respiratory syncytial virus-positive children in Wenzhou, China, 2021 to 2023
Published 2025-05-01“…Predictive features were selected via the Boruta algorithm and modeled using XGBoost, with SHAP applied for interpretability. …”
Get full text
Article -
7267
Soil Organic Matter Content Prediction Using Multi-Input Convolutional Neural Network Based on Multi-Source Information Fusion
Published 2025-06-01“…The top 15 spectral bands with the highest correlation were selected from 260 spectral bands using the Correlation Coefficient Method (CCM), Boruta algorithm, and Successive Projections Algorithm (SPA). …”
Get full text
Article -
7268
Hepatocentric approach to achieving compensation of diabetes mellitus in people with non-alcoholic steatohepatitis
Published 2024-09-01“…After 3 months of treatment, group I showed a tendency toward normalization of glycemic control parameters, while the level of glycated hemoglobin significantly decreased (∆ –22.92 %, p < 0.001) in group II. …”
Get full text
Article -
7269
Comparative evaluation of slide scanners, scan settings, and cytopreparations for digital urine cytology
Published 2024-12-01“…These advanced focus methods do not impact the number of atypical cells or their coverage rate. While Z-stacking enhances the AI algorithm's inferred quantity and coverage rates of atypical cells, it simultaneously results in longer scanning times and larger image file sizes.…”
Get full text
Article -
7270
Using Calibration Transfer Strategy to Update Hyperspectral Model for Quantitating Soluble Solid Content of Blueberry Across Different Batches
Published 2025-07-01“…Model updating is a challenging task with regard to maintaining the performance of non-destructive detection models while using hyperspectral imaging techniques for detecting the internal quality of fresh fruits like blueberries. …”
Get full text
Article -
7271
A Feasibility Study on Indoor Localization and Multiperson Tracking Using Sparsely Distributed Camera Network With Edge Computing
Published 2023-01-01“…To ensure the privacy of individuals, a real-time multiperson pose estimation algorithm runs on the TPU of the computing camera system. …”
Get full text
Article -
7272
THE RISK OF OSTEOPOROTIC FRACTURES IN PATIENTS WITH RHEUMATOID ARTHRITIS: RESULTS OF THE PROGRAM «OSTEOSCREENING RUSSIA»
Published 2018-07-01“…In the male patients with RA, the FRAX® algorithm could reveal only 8% of persons at high risk for fractures, while 58% of them had two or more additional RFs that can negatively affect bone mineral density and increase the risk of fracture. …”
Get full text
Article -
7273
Deep learning assisted analysis of biomarker changes in refractory neovascular AMD after switch to faricimab
Published 2025-04-01“…By enabling objective and reproducible analysis of OCT biomarkers, deep learning algorithms provide critical insights into treatment response. …”
Get full text
Article -
7274
Analisis Pengaruh Citra Terhadap Kombinasi Kriptografi RSA dan STEGANOGRAFi LSB
Published 2022-02-01“…In this study, the technique is Rivest Shamir Adleman (RSA) Cryptographic algorithm and the Least Significant Bit (LSB) Steganography algorithm for message security. …”
Get full text
Article -
7275
An optimization based framework for water quality assessment and pollution source apportionment employing GIS and machine learning techniques for smart surface water governance
Published 2025-08-01“…With a sensitivity of 99.87%, a specificity of 74.56%, and an accuracy of 90.50%, the RF algorithm performs better than any other classifier. …”
Get full text
Article -
7276
Peningkatan Performa Pengelompokan Siswa Berdasarkan Aktivitas Belajar pada Media Pembelajaran Digital Menggunakan Metode Adaptive Moving Self-Organizing Maps
Published 2022-02-01“…The results showed that there was a statistically significant difference between the quantization error and the topographic error of the AMSOM algorithm and the SOM algorithm. The AMSOM method produces an average quantization error 27 times smaller and an average topographic error 54 times smaller than the SOM method. …”
Get full text
Article -
7277
MAP17 is a Novel NASH Progression Biomarker Associated with Macrophage Infiltration, Immunotherapy Response, and Oxidative Stress
Published 2025-01-01“…Our further analyses included differential expression evaluation, protein-protein interaction (PPI) network analysis, and Venn diagram analysis to discover novel targets. The CIBERSORT algorithm assessed the correlation between MAP17 and immune cell infiltration within the tumor microenvironment (TME), while the TIDE algorithm predicted responses to immunotherapy. …”
Get full text
Article -
7278
Unsupervised Feature Selection via a Dual-Graph Autoencoder with <inline-formula><math display="inline"><semantics><mrow><msub><mi mathvariant="bold-script">l</mi><mrow><mn mathvar...
Published 2025-05-01“…In the era of big data, high-dimensional datasets have become increasingly common in fields such as biometrics, computer vision, and medical imaging. While such data contain abundant information, they are often accompanied by substantial noise, high redundancy, and complex intrinsic structures, posing significant challenges for analysis and modeling. …”
Get full text
Article -
7279
UeDiff-GAN-based target detection and twin synchronization mapping for fully mechanized mining faces
Published 2025-03-01“…The diffusion model was used to add noise into high-quality samples to generate samples of varying levels, which were then used to train a generative adversarial network (GAN) model. A smooth diffusion algorithm was designed to regulate the diffusion step sizes, while an imbalanced diffusion module was incorporated to obtain a detection algorithm model that matches pre-identified samples. …”
Get full text
Article -
7280
PSTR: A Test Case Reuse Method Based on Path Similarity
Published 2025-01-01“…Finally, the path similarity algorithm compares paths between the old and new versions, allowing test cases associated with the most similar paths to be reused for the new version. …”
Get full text
Article