-
361
Simplicial complexes in network intrusion profiling: pattern construction through simplicial centralities
Published 2025-07-01“…Abstract For studying intrusion detection data we consider data points referring to individual IP addresses and their connections. …”
Get full text
Article -
362
-
363
Genetic Dissection of the Powdery Mildew Resistance in a Cultivated Emmer Wheat Accession
Published 2025-04-01Subjects: Get full text
Article -
364
Intelligent Pattern Recognition Using Distributed Fiber Optic Sensors for Smart Environment
Published 2024-12-01“…We propose an innovative interferometric sensing approach utilizing a Mach–Zehnder interferometer (MZI) combined with a time forest neural network (TFNN) for intrusion detection based on signal patterns. This method leverages advanced sensor characterization techniques and deep learning to improve accuracy and efficiency. …”
Get full text
Article -
365
Frequency and susceptibility pattern of metallo-beta-lactamase producers in a hospital in Pakistan
Published 2010-12-01“…Methodology: This descriptive study was conducted between January and August 2009 in the department of Microbiology, Army Medical College, National University of Sciences and Technology, Rawalpindi, to determine the frequency and susceptibility patterns of MBL-producers among carbapenem-resistant Gram-negative rods (GNRs) from clinical isolates of a tertiary care hospital. …”
Get full text
Article -
366
An Improved Hashing Approach for Biological Sequence to Solve Exact Pattern Matching Problems
Published 2023-01-01“…Pattern matching algorithms have gained a lot of importance in computer science, primarily because they are used in various domains such as computational biology, video retrieval, intrusion detection systems, and fraud detection. …”
Get full text
Article -
367
Cytological pattern of cervical pap smears in a teaching hospital in southern Nigeria
Published 2025-07-01“…Aim: To determine the prevalence and pattern of cervical cytological abnormalities in the University of Uyo Teaching Hospital, Nigeria. …”
Get full text
Article -
368
Patterns of concomitant traumatic brain injury and ocular trauma in US service members
Published 2024-09-01“…The aim of this study is to identify concomitant TBI in OT patients and characterize the pattern of those injured service members (SMs) in non-combat environments to assist in the early detection and treatment of both TBI and OT.Methods Encounters matching the case definitions of TBI and OT for injured SMs were extracted from the Military Health System. …”
Get full text
Article -
369
Pattern transition recognition based on transfer learning for exoskeleton across different terrains
Published 2025-08-01“…The accuracy of pattern transition detection reaches 97.46%, 97.62%, and 98.21% in M0, M20, and M40, respectively. …”
Get full text
Article -
370
-
371
CLINICAL DIAGNOSTIC VALUE OF OBSCURE ELECTROENCEPHALOGRAPHIC PATTERN "BROAD SHARP WAVE" IN CHILDREN
Published 2016-05-01“…Results. Broad sharp wave pattern (BSW) was detected in 31 (12.7%) patient's routine EEG of 244 collected during the calendar year. …”
Get full text
Article -
372
Bochun: Automatically annotated stance detection dataset for Sorani Kurdish language(Mendeley Data).
Published 2025-08-01Subjects: “…Stance detection…”
Get full text
Article -
373
Credibility-Adjusted Data-Conscious Clustering Method for Robust EEG Signal Analysis
Published 2025-01-01Get full text
Article -
374
Network analysis of comorbidity patterns in heart failure patients using administrative data
Published 2018-06-01“…Conclusions: Network analysis can be a useful tool in epidemiologic framework when relational data are the objective of the investigation, since it allows to visualize and make inference on patterns of association among nodes (here HF comorbidities) by means of both qualitative indexes and clustering techniques.…”
Get full text
Article -
375
A new split based searching for exact pattern matching for natural texts.
Published 2018-01-01“…Exact pattern matching algorithms are popular and used widely in several applications, such as molecular biology, text processing, image processing, web search engines, network intrusion detection systems and operating systems. …”
Get full text
Article -
376
An interactive platform for the analysis of landscape patterns: a cloud-based parallel approach
Published 2019-04-01“…The common approach to detect changes in landscape patterns is to evaluate the spatial and temporal variation of well known, established metrics. …”
Get full text
Article -
377
Cross-attention swin-transformer for detailed segmentation of ancient architectural color patterns
Published 2024-12-01“…IntroductionSegmentation tasks in computer vision play a crucial role in various applications, ranging from object detection to medical imaging and cultural heritage preservation. …”
Get full text
Article -
378
The Aging Lung: Exploring Multimorbidity Patterns and Their Clinical Implications: A Narrative Review
Published 2025-07-01“…In this review, we explore the biological mechanisms linking aging, multiple chronic conditions patterns, and chronic lung disease, with a particular focus on inflammaging and cellular aging. …”
Get full text
Article -
379
A Micrology of Pattern Recognition in Philip K. Dick’s A Scanner Darkly
Published 2023-06-01“…Organized around the unifying problem of pattern recognition, the article clarifies the deep congruence that exists between the seemingly unrelated imaginary technologies of the novel, used on both sides of the central demarcation that divides the identity of its protagonist: law enforcement and the trade in controlled substances. …”
Get full text
Article -
380
Identifying patterns differing between high-dimensional datasets with generalized contrastive PCA.
Published 2025-02-01“…High-dimensional data have become ubiquitous in the biological sciences, and it is often desirable to compare two datasets collected under different experimental conditions to extract low-dimensional patterns enriched in one condition. However, traditional dimensionality reduction techniques cannot accomplish this because they operate on only one dataset. …”
Get full text
Article