Suggested Topics within your search.
Suggested Topics within your search.
-
3221
Decreased PECAM-1 May be a potential pathological factor for vascular injury in T2DM patients
Published 2025-07-01“…Functional enrichment analysis of PPI, GO and KEGG suggested that PECAM-1 was involved in regulation of vascular stability, endothelial function, and angiogenesis. …”
Get full text
Article -
3222
CoRa: An Innovative Software for Raman Spectroscopy
Published 2015-10-01“…Two examples of practical usage of CoRa for data analysis of amorphous Ge3Sb2Te6 and CdP2 singly crystal have been demonstrated.…”
Get full text
Article -
3223
-
3224
Pioneering precision in lumbar spine MRI segmentation with advanced deep learning and data enhancement
Published 2025-06-01Get full text
Article -
3225
Assemblage theory, data systems and data ecosystems: The data assemblages of the Irish planning system
Published 2025-09-01“…We illustrate the utility of this reconceptualisation through an analysis of the development and control function of the Irish planning system, which is composed of a number of interlinked data systems used for managing the entire planning process from seeking planning permission, monitoring construction, to completed property.…”
Get full text
Article -
3226
The Hybrid Market Segmentation of Electric Vehicles in Ukraine Using Data Science Methods
Published 2025-06-01“…To solve the tasks set, a comprehensive approach was applied, incorporating Data Science methods: descriptive statistics, data collection through Data Scraping techniques, natural language processing (NLP) for thematic modeling and sentiment analysis of the reviews, as well as cluster analysis using the k-means algorithm. …”
Get full text
Article -
3227
Models for analyzing the complexity of English words in the text on the scale from A1 to C2
Published 2024-10-01“…SQLite database of English words and the number of their occurrences in English books from 1900 to 2019 has been developed. The functionality is implemented using SQL scripts. Python programming language was used to write ETL processes, data analysis, creation, training and comparison of word complexity prediction models, Sqlite3, Lemminflect, NumPy, Seaborn, Matplotlib, SciPy, Sklearn, SpaCy and XGBoost libraries were used. …”
Get full text
Article -
3228
Application of Data Mining Methods in the Design and Creation of New Products and Services
Published 2020-12-01“…The choice of this software product is explained by a clear interface and the availability of the required functionality. The study was based on data provided by the mobile operator’s billing system. …”
Get full text
Article -
3229
Meta-analysis of clinical trials of osteoarthritis treatment effectiveness with Chondroguard
Published 2021-02-01“…For each study, information was collected on 23 features. Data analysis was carried out using the MEDSTUDY and "R" software packages.Results. …”
Get full text
Article -
3230
-
3231
-
3232
Construction and Application of Data Model in the Maritime Stereotactic Space Use
Published 2024-08-01“…Employing the Cesium 3D engine, the major function of the system is the spatial analysis and synthetic statistics of the stereo right to use marine. …”
Get full text
Article -
3233
-
3234
-
3235
Local structure of solid and liquid gold probed by reverse Monte Carlo analysis of X-ray absorption data
Published 2025-03-01“…An accurate reconstruction of the pair and triplet distribution functions in solid and liquid Au was obtained and compared with literature data. …”
Get full text
Article -
3236
COMPARATIVE STUDY OF SURVIVAL SUPPORT VECTOR MACHINE AND RANDOM SURVIVAL FOREST IN SURVIVAL DATA
Published 2023-09-01“…Survival analysis is a statistical procedure in analyzing data with the response variable is time until an event occurs (time-to-event). …”
Get full text
Article -
3237
Anonymous whistleblowers reply scheme based on secret sharing
Published 2024-12-01“…With the technology of distributed point functions and secret sharing, the message was stored in two separate mailbox databases of non-colluding servers, so that the identity of the data receiver was hidden from the attacker. …”
Get full text
Article -
3238
Information hiding algorithm based on mapping and structure data of 3D model
Published 2019-05-01“…The existing 3D information hiding schemes are not robust enough against the joint attacks,as a result the secret information will be vulnerable and cannot be extracted correctly.In order to solve the above problem,an information hiding algorithm based on mapping and structure data of 3D models was proposed.First,several texture maps of the original 3D models in .stl format were picked from the standard model library,so the backup secret data after twice two-dimension discrete Daubechies transform can be embedded using dbl function just as the watermark.Secondly,the original 3D model in .stl format was operated by frame sampling in wavelet domain to obtain the coefficient in transform domain,thus the secret data was embedded into the corresponding transform coefficient.Finally,the .obj documents with the secret information were generated by multiplying the 2D texture map data and the 3D .stl data matrix based on orthogonal projection.Texture maps and coordinate space of 3D model were both used to embed the secret information repeatedly in order to enhance the robustness.The experiment analysis indicated that the imperceptibility,robustness and resistance against analysis are improved and information transmission safety in complex environment can be achieved based on the redundancy space of multi-type carriers.…”
Get full text
Article -
3239
Information hiding algorithm based on mapping and structure data of 3D model
Published 2019-05-01“…The existing 3D information hiding schemes are not robust enough against the joint attacks,as a result the secret information will be vulnerable and cannot be extracted correctly.In order to solve the above problem,an information hiding algorithm based on mapping and structure data of 3D models was proposed.First,several texture maps of the original 3D models in .stl format were picked from the standard model library,so the backup secret data after twice two-dimension discrete Daubechies transform can be embedded using dbl function just as the watermark.Secondly,the original 3D model in .stl format was operated by frame sampling in wavelet domain to obtain the coefficient in transform domain,thus the secret data was embedded into the corresponding transform coefficient.Finally,the .obj documents with the secret information were generated by multiplying the 2D texture map data and the 3D .stl data matrix based on orthogonal projection.Texture maps and coordinate space of 3D model were both used to embed the secret information repeatedly in order to enhance the robustness.The experiment analysis indicated that the imperceptibility,robustness and resistance against analysis are improved and information transmission safety in complex environment can be achieved based on the redundancy space of multi-type carriers.…”
Get full text
Article -
3240
Association between non-high-density lipoprotein cholesterol to high-density lipoprotein cholesterol ratio and serum thyroid function measures: Recent Findings from NHANES 2007–201...
Published 2025-01-01“…ObjectiveThere is limited epidemiological data regarding the association of blood lipids with thyroid hormones. …”
Get full text
Article