Showing 7,261 - 7,280 results of 12,962 for search 'while algorithm', query time: 0.19s Refine Results
  1. 7261

    Surface water quality assessment for drinking and pollution source characterization: A water quality index, GIS approach, and performance evaluation utilizing machine learning anal... by Abhijeet Das

    Published 2025-07-01
    “…Overall, the LOR, KNN, ANN, and SVM algorithms were all surpassed by the RF algorithm. Additionally, the prediction and simulation results show an increasing tendency in the changes in water quality over the examined time. …”
    Get full text
    Article
  2. 7262

    Seasonal to decadal variability and persistence properties of the Euro-Atlantic jet streams characterized by complementary approaches by H. Banderier, H. Banderier, A. Tuel, T. Woollings, O. Martius, O. Martius, O. Martius

    Published 2025-06-01
    “…</p> <p>First, we apply the self-organizing map (SOM) clustering algorithm to create a 2D distance-preserving discrete feature space for the tropopause-level summer wind field over the North Atlantic. …”
    Get full text
    Article
  3. 7263

    Komparasi Data Mining Naive Bayes dan Neural Network memprediksi Masa Studi Mahasiswa S1 by Azahari Azahari, Yulindawati Yulindawati, Dewi Rosita, Syamsuddin Mallala

    Published 2020-05-01
    “…By using the data mining algorithm Naive bayes and neural network, the student graduation in STMIK Widya Cipta Dharma (WiCiDa) can be predicted. …”
    Get full text
    Article
  4. 7264

    Contagious infection-free medical interaction system with machine vision controlled by remote hand gesture during an operation by Van Doi Truong, Hyun-Kyo Lim, Seongje Kim, Than Trong Khanh Dat, Jonghun Yoon

    Published 2024-12-01
    “…A proposed depth enhancement algorithm is combined with a deep learning hand landmark detector to generate hand landmarks. …”
    Get full text
    Article
  5. 7265

    Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing by Ruizhong DU, Tianhe ZHANG, Pengliang SHI

    Published 2022-06-01
    “…Methods:Firstly,an efficient attribute vector and policy vector generation algorithm is proposed using vector compression technology, which judges whether user attributes satisfy the access policy through the inner product operation result of attribute vector and policy vector.Afterwards, the prime order bilinear group and attribute encryption technology were used to achieve fine-grained access control while avoiding the leakage of user attribute values; using the interstellar file system to store the ciphertext and storing the hash address of the ciphertext on the blockchain through a smart contract,it realizes distributed and reliable access control and reduces the storage overhead of the blockchain. …”
    Get full text
    Article
  6. 7266

    Epidemiological and clinical characteristics of bacterial co-detection in respiratory syncytial virus-positive children in Wenzhou, China, 2021 to 2023 by Xiaoxiao Qu, Xuanmei Ye, Jian Yu, Feifei Zheng, Yatian Tang, Fangling Yuan, Qipeng Xie

    Published 2025-05-01
    “…Predictive features were selected via the Boruta algorithm and modeled using XGBoost, with SHAP applied for interpretability. …”
    Get full text
    Article
  7. 7267

    Soil Organic Matter Content Prediction Using Multi-Input Convolutional Neural Network Based on Multi-Source Information Fusion by Li Guo, Qin Gao, Mengyi Zhang, Panting Cheng, Peng He, Lujun Li, Dong Ding, Changcheng Liu, Francis Collins Muga, Masroor Kamal, Jiangtao Qi

    Published 2025-06-01
    “…The top 15 spectral bands with the highest correlation were selected from 260 spectral bands using the Correlation Coefficient Method (CCM), Boruta algorithm, and Successive Projections Algorithm (SPA). …”
    Get full text
    Article
  8. 7268

    Hepatocentric approach to achieving compensation of diabetes mellitus in people with non-alcoholic steatohepatitis by N.M. Protas, I.O. Kostitska, M.V. Bielinskyi

    Published 2024-09-01
    “…After 3 months of treatment, group I showed a tendency toward norma­lization of glycemic control parameters, while the level of glycated hemoglobin significantly decreased (∆ –22.92 %, p < 0.001) in group II. …”
    Get full text
    Article
  9. 7269

    Comparative evaluation of slide scanners, scan settings, and cytopreparations for digital urine cytology by Jen-Fan Hang, Yen-Chuan Ou, Wei-Lei Yang, Tang-Yi Tsao, Cheng-Hung Yeh, Chi-Bin Li, En-Yu Hsu, Po-Yen Hung, Yi-Ting Hwang, Tien-Jen Liu, Min-Che Tung

    Published 2024-12-01
    “…These advanced focus methods do not impact the number of atypical cells or their coverage rate. While Z-stacking enhances the AI algorithm's inferred quantity and coverage rates of atypical cells, it simultaneously results in longer scanning times and larger image file sizes.…”
    Get full text
    Article
  10. 7270

    Using Calibration Transfer Strategy to Update Hyperspectral Model for Quantitating Soluble Solid Content of Blueberry Across Different Batches by Biao Chen, Xuhuang Huang, Shenwen Tan, Guangjun Qiu, Huaiyin Lin, Xuejun Yue, Junzhi Chen, Wenshan Zhong, Xuantian Li, Le Zhang

    Published 2025-07-01
    “…Model updating is a challenging task with regard to maintaining the performance of non-destructive detection models while using hyperspectral imaging techniques for detecting the internal quality of fresh fruits like blueberries. …”
    Get full text
    Article
  11. 7271
  12. 7272

    THE RISK OF OSTEOPOROTIC FRACTURES IN PATIENTS WITH RHEUMATOID ARTHRITIS: RESULTS OF THE PROGRAM «OSTEOSCREENING RUSSIA» by O. A. Nikitinskaya, N. V. Toroptsova, N. V. Demin, A. Yu. Feklistov, E. L. Nasonov

    Published 2018-07-01
    “…In the male patients with RA, the FRAX® algorithm could reveal only 8% of persons at high risk for fractures, while 58% of them had two or more additional RFs that can negatively affect bone mineral density and increase the risk of fracture. …”
    Get full text
    Article
  13. 7273

    Deep learning assisted analysis of biomarker changes in refractory neovascular AMD after switch to faricimab by Michael Hafner, Franziska Eckardt, Jakob Siedlecki, Benedikt Schworm, Tina R. Herold, Ben Asani, Siegfried G. Priglinger, Johannes B. Schiefelbein

    Published 2025-04-01
    “…By enabling objective and reproducible analysis of OCT biomarkers, deep learning algorithms provide critical insights into treatment response. …”
    Get full text
    Article
  14. 7274

    Analisis Pengaruh Citra Terhadap Kombinasi Kriptografi RSA dan STEGANOGRAFi LSB by Agus Rakhmadi Mido, Erik Iman Heri Ujianto

    Published 2022-02-01
    “…In this study, the technique is Rivest Shamir Adleman (RSA) Cryptographic algorithm and the Least Significant Bit (LSB) Steganography algorithm for message security. …”
    Get full text
    Article
  15. 7275

    An optimization based framework for water quality assessment and pollution source apportionment employing GIS and machine learning techniques for smart surface water governance by Abhijeet Das

    Published 2025-08-01
    “…With a sensitivity of 99.87%, a specificity of 74.56%, and an accuracy of 90.50%, the RF algorithm performs better than any other classifier. …”
    Get full text
    Article
  16. 7276

    Peningkatan Performa Pengelompokan Siswa Berdasarkan Aktivitas Belajar pada Media Pembelajaran Digital Menggunakan Metode Adaptive Moving Self-Organizing Maps by Onky Prasetyo, Ahmad Afif Supianto, Syaiful Anam, Hilman Ferdinandus Pardede, Vicky Zilvan, R. Budiarianto Suryo Kusumo

    Published 2022-02-01
    “…The results showed that there was a statistically significant difference between the quantization error and the topographic error of the AMSOM algorithm and the SOM algorithm. The AMSOM method produces an average quantization error 27 times smaller and an average topographic error 54 times smaller than the SOM method. …”
    Get full text
    Article
  17. 7277

    MAP17 is a Novel NASH Progression Biomarker Associated with Macrophage Infiltration, Immunotherapy Response, and Oxidative Stress by Huang Z, Chen J, Liu S, Xiang X, Long Y, Tan P, Fu W

    Published 2025-01-01
    “…Our further analyses included differential expression evaluation, protein-protein interaction (PPI) network analysis, and Venn diagram analysis to discover novel targets. The CIBERSORT algorithm assessed the correlation between MAP17 and immune cell infiltration within the tumor microenvironment (TME), while the TIDE algorithm predicted responses to immunotherapy. …”
    Get full text
    Article
  18. 7278

    Unsupervised Feature Selection via a Dual-Graph Autoencoder with <inline-formula><math display="inline"><semantics><mrow><msub><mi mathvariant="bold-script">l</mi><mrow><mn mathvar... by Zhichao Song, Meiling Chen, Liang Xie, Xi Fang

    Published 2025-05-01
    “…In the era of big data, high-dimensional datasets have become increasingly common in fields such as biometrics, computer vision, and medical imaging. While such data contain abundant information, they are often accompanied by substantial noise, high redundancy, and complex intrinsic structures, posing significant challenges for analysis and modeling. …”
    Get full text
    Article
  19. 7279

    UeDiff-GAN-based target detection and twin synchronization mapping for fully mechanized mining faces by ZHANG Fan, YU Yang, QI Zhenming, LI Haijun, WANG Chunli, DU Xiao, WANG Bingyin, ZHANG Guanglei, SONG Hui, XI Chenrong

    Published 2025-03-01
    “…The diffusion model was used to add noise into high-quality samples to generate samples of varying levels, which were then used to train a generative adversarial network (GAN) model. A smooth diffusion algorithm was designed to regulate the diffusion step sizes, while an imbalanced diffusion module was incorporated to obtain a detection algorithm model that matches pre-identified samples. …”
    Get full text
    Article
  20. 7280

    PSTR: A Test Case Reuse Method Based on Path Similarity by Xinyue Xu, Sinong Chen, Zhonghao Guo, Xiangxian Chen

    Published 2025-01-01
    “…Finally, the path similarity algorithm compares paths between the old and new versions, allowing test cases associated with the most similar paths to be reused for the new version. …”
    Get full text
    Article