-
9081
Object-Specific Multiview Classification Through View-Compatible Feature Fusion
Published 2025-07-01“…In these scenarios, relying on a single image may not provide sufficient information to effectively identify the scrutinized object, as different perspectives may reveal distinct characteristics that are essential for accurate classification. …”
Get full text
Article -
9082
Factors influencing the response to periodontal therapy in patients with diabetes: post hoc analysis of a randomized clinical trial using machine learning
Published 2025-07-01“…We tested seven different algorithms: K-Nearest Neighbors, Decision Tree, Support Vector Machine, Random Forest, Extreme Gradient Boosting, and Logistic Regression. …”
Get full text
Article -
9083
C2 pars interarticularis length on the side of high-riding vertebral artery with implications for pars screw insertion
Published 2025-05-01“…In preoperative planning, the identified C2PIL cut-off of ≤ 16 mm may assist surgeons in early recognition of HRVA. …”
Get full text
Article -
9084
School-Based Online Surveillance of Youth: Systematic Search and Content Analysis of Surveillance Company Websites
Published 2025-07-01“…Findings suggest that students who only have school-provided devices are more heavily surveilled and that historically marginalized students may be at a higher risk of being flagged due to algorithmic bias. …”
Get full text
Article -
9085
Tympanosclerosis Presenting as Mass: Workup and Differential
Published 2016-01-01“…Various ear pathologies, with different treatment algorithms, may present as clinically similar to one another. …”
Get full text
Article -
9086
Automatic recognition of adrenal incidentalomas using a two-stage cascade network: a multicenter study
Published 2025-12-01“…The segmentation network was mainly evaluated by the Dice similarity coefficient (DSC), and the classifier was evaluated by the area under the receiver operator characteristic curve (AUC), accuracy, sensitivity, and specificity. …”
Get full text
Article -
9087
Higher-Order Accurate and Conservative Hybrid Numerical Scheme for Relativistic Time-Fractional Vlasov-Maxwell System
Published 2022-01-01“…Still, on the other hand, a significant fact or drawback of most algorithms is that they do not preserve conservation philosophies. …”
Get full text
Article -
9088
Real-world evidence market: key players and key segments
Published 2022-01-01“…Real-world data (RWD) and real-world evidence (RWE) are a valuable resource in the healthcare system. They may be necessary for administrators (to create and improve algorithms for treating patients with various nosologies), physicians (to make a better clinical decision in favor of the patient) and directly to patients and their relatives (to better understand the treatment process). …”
Get full text
Article -
9089
A Comparison of CALPUFF and LAPMOD Against the Project Sagebrush Datasets
Published 2025-06-01“…However, in four simulations carried out under low wind and very stable conditions, the model performances are poor. This may be due to the inability of CALMET to reproduce the vertical wind direction variations in a shallow layer close to the ground, but also to inappropriate turbulence dispersion algorithms in the dispersion models. …”
Get full text
Article -
9090
A systematic review of Machine Learning and Deep Learning approaches in Mexico: challenges and opportunities
Published 2025-01-01“…It identified that the selection and application of the algorithms rely on the study objective and the data patterns. …”
Get full text
Article -
9091
Toward quantum advantage with photonic state injection
Published 2025-07-01“…Finally, we study a computational subroutine of learning algorithms named probability estimation, and we show that the state injection scheme we propose may offer a potential quantum advantage in a regime that can be more easily achieved than state-of-the-art adaptive techniques. …”
Get full text
Article -
9092
Critical questions for Facebook’s virtual reality: data, power and the metaverse
Published 2021-12-01“…Through this case, we argue that VR as a data-intensive device is not one of unalloyed benefit, but one fraught with power inequity—one that has the potential to exacerbate wealth inequity, institute algorithmic bias, and bring about new forms of digital exclusion. …”
Get full text
Article -
9093
Analysis of Dynamic Transaction Fee Blockchain Using Queueing Theory
Published 2025-03-01“…Although several consensus algorithms have been proposed to solve these problems, their performance has not been fully evaluated. …”
Get full text
Article -
9094
Efficient knowledge updating method for inconsistent decision tables
Published 2024-12-01“…However, inconsistent decision tables (IDTs) may update with new coming objects due to the information collection and update. …”
Get full text
Article -
9095
New insights into methods to measure biological age: a literature review
Published 2024-12-01“…We discussed some novel biomarkers and algorithms that can capture the dynamic and multidimensional aspects of aging at different levels. …”
Get full text
Article -
9096
Business process mining based insider threat detection system
Published 2016-10-01“…Current intrusion detection systems are mostly for detecting external attacks,but sometimes the internal staff may bring greater harm to organizations in information security.Traditional insider threat detection methods of-ten do not combine the behavior of people with business activities,making the threat detection rate to be improved.An insider threat detection system based on business process mining from two aspects was proposed,the implementation of insider threats and the impact of threats on system services.Firstly,the normal control flow model of business ac-tivities and the normal behavior profile of each operator were established by mining the training log.Then,the actual behavior of the operators was compared with the pre-established normal behavior contours during the operation of the system,which was supplemented by control flow anomaly detection and performance anomaly detection of business processes,in order to discover insider threats.A variety of anomalies were defined and the corresponding detection algorithms were given.Experiments were performed on the ProM platform.The results show the designed system is effective.…”
Get full text
Article -
9097
Summoning the digital investor: Fintech apps and the shaping of everyday financial subjectivities
“…However, users themselves may resist the financial subjectivities promoted by fintech investing, driven by skepticism towards gamified and other algorithmic app features. …”
Get full text
Article -
9098
Optimal Decisions for Prepositioning Emergency Supplies Problem with Type-2 Fuzzy Variables
Published 2016-01-01“…Since the inherent complexity of fuzzy prepositioning problem may be troublesome, the existing methods are no longer effective in dealing with the proposed model directly. …”
Get full text
Article -
9099
The influence of eye model parameter variations on simulated eye-tracking outcomes
Published 2023-10-01“… The simulated data used in eye-tracking-related research has been largely generated using normative eye models with little consideration of how the variations in eye biometry found in the population may influence eye-tracking outcomes. This study investigated the influence that variations in eye model parameters have on the ability of simulated data to predict real-world eye-tracking outcomes. …”
Get full text
Article -
9100
An Uncertain Programming Model for Fixed Charge Transportation Problem with After-Sale Service
Published 2022-01-01“…Meanwhile, some indeterministic factors may occur during the transportation process; probability theory is not the best option due to the lack of adequate historical data. …”
Get full text
Article