Showing 881 - 900 results of 21,823 for search '(composition OR computational) data analysis', query time: 0.38s Refine Results
  1. 881

    Diagnosing Intraductal Papillary Mucinous Neoplasm of the Bile Duct with Computed Tomography: A Clinical Case Analysis by Xinzheng WANG, Jinzhi FANG, Dafei YU, Jianbing ZENG, Yuzhong ZHANG, Linning E

    Published 2025-01-01
    “…Methods: A retrospective analysis was conducted on the clinical data and CT findings of three patients with surgically and pathologically confirmed IPMN-B. …”
    Get full text
    Article
  2. 882

    A comparative analysis of resource allocation schemes for real-time services in high-performance computing systems by Muhammad Shuaib Qureshi, Muhammad Bilal Qureshi, Muhammad Fayaz, Wali Khan Mashwani, Samir Brahim Belhaouari, Saima Hassan, Asadullah Shah

    Published 2020-08-01
    “…Resource allocation schemes for the real-time services have been designed with various architectures (static, dynamic, centralized, or distributed) and quality of service criteria (cost efficiency, completion time minimization, energy efficiency, and memory optimization). In this analysis, numerous resource allocation schemes for real-time services in various high-performance computing (distributed and non-distributed) domains have been studied and compared on the basis of common parameters such as application type, operational environment, optimization goal, architecture, system size, resource type, optimality, simulation tool, comparison technique, and input data. …”
    Get full text
    Article
  3. 883

    Digital identification and adulteration analysis of Codonopsis Radix and Stellariae Radix based on the “digital identity” of chemical compositions by Xianrui Wang, Jiating Zhang, Wenguang Jing, Xiaohan Guo, Minghua Li, Xianlong Cheng, Feng Wei

    Published 2024-11-01
    “…Moreover, 1 of the 12 batches of market samples was identified as an adulterated sample.ConclusionIt proved that the identification and adulteration analysis of two herbs can be realized efficiently and quickly through the “digital identities” of chemical compositions. …”
    Get full text
    Article
  4. 884

    Encouraging reusability of computational research through Data-to-Knowledge Packages - A hydrological use case [version 2; peer review: 2 approved] by Markus Konkol, Sami Domisch, Astra Labuce, Vanessa Bremerich, Merret Buurman

    Published 2025-07-01
    “…Users still need to make considerable efforts to understand the data and analysis code before they can reuse these components in other contexts. …”
    Get full text
    Article
  5. 885

    A novel computational approach for predicting complex phenotypes in Drosophila (starvation-sensitive and sterile) by deriving their gene expression signatures from public data. by Dobril K Ivanov, Gerrit Bostelmann, Benoit Lan-Leung, Julie Williams, Linda Partridge, Valentina Escott-Price, Janet M Thornton

    Published 2020-01-01
    “…The data were combined using a linear-mixed effects model with the inclusion of consecutive principal components to account for variability between experiments in conjunction with Gene Ontology enrichment analysis. …”
    Get full text
    Article
  6. 886

    MITSGRN: A Novel Computational Framework for Reconstructing Sleep Rhythm Gene Regulatory Networks Based on Mutual Information and Time-Series Big Data by Zhenyu Liu, Jiangqian Zuo, Qian Cao, Zheng Lu, Tao Li

    Published 2025-01-01
    “…In this study, we propose an innovative computational framework for gene regulatory network (GRN) reconstruction based on mutual information and large-scale time-series data. …”
    Get full text
    Article
  7. 887
  8. 888
  9. 889

    XGBoost Algorithm for Cervical Cancer Risk Prediction: Multi-dimensional Feature Analysis by Sudi Suryadi, Masrizal

    Published 2025-06-01
    “…The model was developed using data from 858 patients at the Hospital Universitario de Caracas. …”
    Get full text
    Article
  10. 890
  11. 891
  12. 892
  13. 893

    Formal Description of Trusted Bebavior Oriented Security System for Big Data by Zhi Yan, Jing Zhan

    Published 2014-07-01
    “…Usually the process of storing and analyzing with big data is under the framework of Hadoop within the environment of cloud computing while the risks of big data application on cloud derive from cloud service providers and remote users who access data without authorization. …”
    Get full text
    Article
  14. 894
  15. 895
  16. 896
  17. 897

    Dataset and machine learning-based computer-aided tools for modeling working sorption isotherms in dried parchment and green coffee beansMendeley Data by Gentil A. Collazos-Escobar, Andrés F. Bahamón-Monje, Nelson Gutiérrez-Guzmán

    Published 2025-08-01
    “…The dataset also provides computer-aided tools for the mathematical modeling of working sorption isotherms and infrared data of coffee. …”
    Get full text
    Article
  18. 898

    CEREBRAL ARTERY FENESTRATIONS: INCIDENCE, ASSOCIATION WITH CEREBRAL ARTERIAL ANEURYSMS AND OTHER VASCULAR DISEASES ACCORDING TO THE DATA OF MULTISLICE SPIRAL COMPUTED TOMOGRAPHY AN... by M. Yu. Kalmykov

    Published 2016-02-01
    “…Four hundred and eighty-six persons who had undergone brachiocephalic artery (BA) CTA for different clinical indications were selected for retrospective analysis. Postprocessor data processing was made to detect extra- and intracranial artery fenestrations. …”
    Get full text
    Article
  19. 899

    Thematic and Methodological Trends of Computational Thinking Skills-Related Graduate Theses in Turkey by Mithat Elçiçek

    Published 2020-12-01
    “…However, it has been seen that the data collected by using a scale, interview, and observation data collection tools are analysed in accordance with predictive analysis techniques. …”
    Get full text
    Article
  20. 900