Suggested Topics within your search.
Suggested Topics within your search.
- Visual communication 2
- computer 2
- Bildanalyse 1
- Bildwissenschaft 1
- COMPUTERS / Internet / General 1
- Children 1
- Cloud computing 1
- Computer scheduling 1
- Data processing 1
- Economic Policy 1
- Economic policy 1
- Economics, Mathematical 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Engineering mathematics 1
- Environmental Economics 1
- Environmental economics 1
- Industrial Organization 1
- Industrial organization 1
- Language 1
- Language disorders in children 1
- Linguistics 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- MEDICAL / Audiology & Speech Pathology 1
- Moral and ethical aspects 1
- Numerical analysis 1
- Parallel programs (Computer programs) 1
- Photography 1
-
1501
-
1502
Source Apportionment and Ecological-Health Risk Assessments of Potentially Toxic Elements in Topsoil of an Agricultural Region in Southwest China
Published 2025-06-01Subjects: Get full text
Article -
1503
-
1504
-
1505
A Unified Graph Theory Approach: Clustering and Learning in Criminal Data
Published 2024-12-01Get full text
Article -
1506
A comprehensive hematological dataset for dengue incidence in Bangladesh(Mendeley Data).
Published 2025-06-01Get full text
Article -
1507
Effects of aging and light-curing unit type on the volume and internal porosity of bulk-fill resin composite restoration
Published 2022-03-01“…Data were analyzed using a two-way ANOVA and Tukey’s test (p < 0.05). …”
Get full text
Article -
1508
InfoMat: Leveraging Information Theory to Visualize and Understand Sequential Data
Published 2025-03-01Get full text
Article -
1509
Research on the application of improved MCMC algorithm in the measurement of high-dimensional financial data
Published 2025-12-01“…In the face of high-dimensional financial data econometric analysis, numerous algorithms inevitably face problems such as difficult model identification, too slow convergence, and too long iteration time. …”
Get full text
Article -
1510
Emotional contagion in dyadic online video conferences—empirical evidence based on self-report and facial expression data
Published 2025-04-01“…The present study explored the degree to which emotional contagion occurs in dyadic online video conferences, using subjective self-report and automatically coded facial expression data.MethodsIn a lab-based experimental approach, 104 participants (in 52 dyads) interacted via synchronized computers. …”
Get full text
Article -
1511
“DTH 1.0”: TOWARDS AN ARTIFICIAL INTELLIGENCE DECISION SUPPORT SYSTEM FOR GEOGRAPHICAL ANALYSIS OF HEALTH DATA
Published 2013-10-01“…Artificial Intelligence methodologies incorporate approaches for knowledge retrieval and pattern discovery, which have been proven to be useful for data analysis in various disciplines. Decision trees methods belong to knowledge discovery methodologies and use computational algorithms for the extraction of patterns from data. …”
Get full text
Article -
1512
OpenStats: A robust and scalable software package for reproducible analysis of high-throughput phenotypic data.
Published 2020-01-01“…Reproducibility in the statistical analyses of data from high-throughput phenotyping screens requires a robust and reliable analysis foundation that allows modelling of different possible statistical scenarios. …”
Get full text
Article -
1513
“DTH 1.0”: TOWARDS AN ARTIFICIAL INTELLIGENCE DECISION SUPPORT SYSTEM FOR GEOGRAPHICAL ANALYSIS OF HEALTH DATA
Published 2013-10-01“…Artificial Intelligence methodologies incorporate approaches for knowledge retrieval and pattern discovery, which have been proven to be useful for data analysis in various disciplines. Decision trees methods belong to knowledge discovery methodologies and use computational algorithms for the extraction of patterns from data. …”
Get full text
Article -
1514
Bioelectrical impedance vector analysis in older adults: reference standards from a cross-sectional study
Published 2025-07-01“…Background and AimsThe bioelectrical impedance vector analysis (BIVA) requires population-specific references to correctly classify individuals based on body composition properties. …”
Get full text
Article -
1515
Finite element analysis of RC beams using static experimental data to predict static and dynamic behaviors
Published 2024-12-01“…Additionally, dynamic analysis is conducted, and results are presented in 3D graphical format. …”
Get full text
Article -
1516
Parameter Estimation of the Lomax Lifetime Distribution Based on Middle-Censored Data: Methodology, Applications, and Comparative Analysis
Published 2025-04-01“…After processing the data using the midpoint approach estimation, the parameter estimates are obtained by two computational methods: the Newton–Raphson iteration method and the fixed-point method. …”
Get full text
Article -
1517
-
1518
A meta fusion model combining geographic data and twitter sentiment analysis for predicting accident severity
Published 2025-07-01“…Building on these developments, this study introduces an innovative approach ConvoseqNet to improve traffic accident prediction by integrating traditional traffic data with real-time social media insights, specifically using geographic data and Twitter sentiment analysis. …”
Get full text
Article -
1519
Botnets’ similarity analysis based on communication features and D-S evidence theory
Published 2011-01-01“…A potential hidden relationship may exist among different zombie groups.A method to analyze the relationship among botnets was proposed based on the communication activities.The method extracted several communication fea-tures of botnet,including the number of flows per hour,the number of packets per flow,the number of flows per IP and the packet payloads.It defined similarity statistical functions of the communication features,and built the analysis model of botnets relationship based on the advanced dempster-shafer(D-S) evidence theory to synthetically evaluate the simi-larities between different zombie groups.The experiments were conducted using several botnet traces.The results show that the method is valid and efficient,even in the case of encrypted botnet communication messages.Moreover,the ideal processing results is achieved by applying our method to analyze the data captured from the security monitoring platform of computer network,as well as compare with similar work.…”
Get full text
Article -
1520
Identification of co‐localised transcription factors based on paired motifs analysis
Published 2024-12-01Get full text
Article