Search alternatives:
feature » features (Expand Search)
Showing 2,501 - 2,520 results of 5,605 for search 'Feature detection analysis', query time: 0.19s Refine Results
  1. 2501

    ReliefSeq: a gene-wise adaptive-K nearest-neighbor feature selection tool for finding gene-gene interactions and main effects in mRNA-Seq gene expression data. by Brett A McKinney, Bill C White, Diane E Grill, Peter W Li, Richard B Kennedy, Gregory A Poland, Ann L Oberg

    Published 2013-01-01
    “…ReliefSeq is an attractive tool for inclusion in the suite of tools used for analysis of mRNA-Seq data; it has power to detect both main effects and interaction effects. …”
    Get full text
    Article
  2. 2502
  3. 2503
  4. 2504
  5. 2505

    The features of PD-L1 expression in tumor stromal cells, peritumoral microvessels and isolated clusters of tumor cells in breast cancer tissue and their correlation with clinical a... by E. Yu. Zubareva, M. A. Senchukova, T. A. Karmakova, N. V. Zaitsev

    Published 2023-11-01
    “…PD-L1 expression was studied by immunohistochemistry. statistical analysis was performed using statistica 12.0 software.Results. …”
    Get full text
    Article
  6. 2506

    Unveiling HER2 immunoexpression in canine hepatoid gland neoplasms: clinicopathological and morphological associations by Hassadin Boonsriroj, Sahatchai Tangtrongsup, Jirapat Arunorat, Thanongsak Mamom, Pinkarn Chantawong

    Published 2025-12-01
    “…HER2-positive expression was detected in 50% of HGEs (score 2  +  ) and 73.3% of HGCs, with 36.4% of cases scoring 3   +   . …”
    Get full text
    Article
  7. 2507

    Timeseria: An object-oriented time series processing library by Stefano Alberto Russo, Giuliano Taffoni, Luca Bortolussi

    Published 2025-02-01
    “…Timeseria comes with a comprehensive set of base data structures, data transformations for resampling and aggregation, common data manipulation operations, and extensible models for data reconstruction, forecasting and anomaly detection. It also integrates a fully featured, interactive plotting engine capable of handling even millions of data points.…”
    Get full text
    Article
  8. 2508

    A comparative study of deepfake facial manipulation technique using generative adversarial networks by Wasin Al Kishri, Jabar H. Yousif, Mahmood Al Bahri, Muhammad Zakarya, Naveed Khan, Sanad Sulaiman Al Maskari, Ahmet Gurhanli

    Published 2025-06-01
    “…In particular, three types of Deepfake face detection technologies are reviewed: (i) hand-crafted features (ii) artifacts; and (iii) learning-based features, while highlighting related improvements and challenges. …”
    Get full text
    Article
  9. 2509
  10. 2510
  11. 2511
  12. 2512
  13. 2513

    Correlation analyses of ultrasonographic and histopathological characteristics of porta hepatis lymph nodes in biliary atresia by Zhen Huang, Wen Ling, Guorong Lyu, Shuxia Xu, Fengying Ye, Yifan Fang, Zongjie Weng, Qiumei Wu

    Published 2025-05-01
    “…No significant correlations were detected between the stage of liver fibrosis and pathological features or postoperative jaundice (all p > 0.05). …”
    Get full text
    Article
  14. 2514

    MSFNet3D: Monocular 3D Object Detection via Dual-Branch Depth-Consistent Fusion and Semantic-Guided Point Cloud Refinement by Rong Yang, Zhijie You, Renhui Luo

    Published 2025-03-01
    “…This module captures multi-scale geometric features through a hierarchical feature pyramid and an adaptive weight allocation mechanism, thereby addressing the scale sensitivity inherent in traditional attention mechanisms. (2) We propose a consistency-weighted fusion strategy that employs local gradient consistency analysis and differentiable weighted optimization to achieve a pixel-level fusion of image and depth features. …”
    Get full text
    Article
  15. 2515

    Simple energy detector for two-stage classification for antidrone systems by Zurovac Snežana, Petrović Nikola, Joksimović Vasilija, Pokrajac Ivan, Mikanović Darko, Sazdić-Jotić Boban

    Published 2024-01-01
    “…Signal detection theory, a fundamental concept in various scientific disciplines, involves mandatory measuring of the signal features. …”
    Get full text
    Article
  16. 2516

    Novel perceptions and insights into the rare hematologic malignancy of acute megakaryocytic leukemia: a multicenter clinical retrospective study by Yuan Liu, Yanquan Liu, Xiaojun Chen, Yue Yin, Zhenyuan Xu, Jiachen Xie, Jianzhen Shen, He Huang, Huidong Guo

    Published 2025-06-01
    “…Except for 2 patients who were not detected by flow immunotyping, cytogenetics and molecular biology, the remaining 21 patients were detected accordingly, and megakaryocyte antigens (CD41, CD42, CD61) were expressed in these 21 patients with AMKL, accompanied by certain cytogenetic or molecular biological abnormalities. …”
    Get full text
    Article
  17. 2517

    Intrusion Detection and Mitigation Method for the Industrial Internet of Things Using Bidirectional Convolutional Long Short-Term Memory and Deep Recurrent Convolutional Q-Networks by Zhang Yan, Piyush Kumar Shukla, Prashant Kumar Shukla, Kanika Thakur, Anurag Sinha, Saifullah Khalid

    Published 2025-06-01
    “…ADASYN data augmentation is used to address class imbalance, while entropy analysis and statistical techniques are used to extract key features. …”
    Get full text
    Article
  18. 2518
  19. 2519

    Gait-based Parkinson’s disease diagnosis and severity classification using force sensors and machine learning by Navita, Pooja Mittal, Yogesh Kumar Sharma, Anjani Kumar Rai, Sarita Simaiya, Umesh Kumar Lilhore, Vimal Kumar

    Published 2025-01-01
    “…The dataset (imbalance) collected from both feet is passed to the preprocessing phase (for balancing data using the SMOTE method), followed by the feature extraction phase to extract features related to time, frequency, spatial, and temporal features domains that are highly effective for detecting and assigning severity levels of PD. …”
    Get full text
    Article
  20. 2520

    Intrusion Detection in IoT and IIoT: Comparing Lightweight Machine Learning Techniques Using TON_IoT, WUSTL-IIOT-2021, and EdgeIIoTset Datasets by Shereen Ismail, Salah Dandan, Ala'a Qushou

    Published 2025-01-01
    “…Furthermore, a cross-dataset transfer learning approach was applied to evaluate how models trained on the TON_IoT dataset generalize when tested on the WUSTL-IIoT-2021 dataset, demonstrating the ability of the models to generalize across datasets with common features and attack labels. For real-time intrusion detection and network traffic analysis, we set up an experiment to deploy the trained ML models in a live network environment. …”
    Get full text
    Article