Search alternatives:
vector » sector (Expand Search)
Showing 3,021 - 3,040 results of 4,440 for search 'Vector process', query time: 0.14s Refine Results
  1. 3021

    Identification of HER2-over-expression, HER2-low-expression, and HER2-zero-expression statuses in breast cancer based on 18F-FDG PET/CT radiomics by Xuefeng Hou, Kun Chen, Huiwen Luo, Wengui Xu, Xiaofeng Li

    Published 2025-05-01
    “…Then, four machine learning classifiers, including logistic regression (LR), k-nearest neighbor (KNN), support vector machine (SVM), and random forest (RF), were constructed to identify HER2-over-expression vs. others, HER2-low-expression vs. others, and HER2-zero-expression vs. others. …”
    Get full text
    Article
  2. 3022

    Theoretical and applied problems of interaction between the international and national legal systems by O. A. Kiseleva

    Published 2022-03-01
    “…In such conditions, it is most important to choose the right vector in improving international law, and not order, law based on normative principles. …”
    Get full text
    Article
  3. 3023
  4. 3024

    Machine learning for predicting neoadjuvant chemotherapy effectiveness using ultrasound radiomics features and routine clinical data of patients with breast cancer by Pu Zhou, Pu Zhou, Hongyan Qian, Pengfei Zhu, Jiangyuan Ben, Jiangyuan Ben, Guifang Chen, Qiuyi Chen, Lingli Chen, Jia Chen, Ying He, Ying He

    Published 2025-01-01
    “…We compared 10 ML models based on radiomics features: support vector machine (SVM), logistic regression (LR), random forest, extra trees (ET), naïve Bayes (NB), k-nearest neighbor (KNN), multilayer perceptron (MLP), gradient boosting ML (GBM), light GBM (LGBM), and adaptive boost (AB). …”
    Get full text
    Article
  5. 3025
  6. 3026

    Data fusion-based improvements in empirical regression and machine learning for global daily ∼ 8 km resolution sea surface nitrate estimation and interpretation by Aifen Zhong, Difeng Wang, Fang Gong, Jingjing Huang, Zhuoqi Zheng, Xianqiang He, Qing Zhang, Qiankun Zhu

    Published 2025-09-01
    “…For the machine learning models, seven algorithms, namely, extremely randomized trees (ET), multilayer perceptron (MLP), stacking random forest (SRF), Gaussian process regression (GPR), support vector machine (SVM), gradient boosting decision tree (GBDT), and extreme gradient boosting (XGBoost) algorithms, were tested. …”
    Get full text
    Article
  7. 3027

    Influences of Sampling Design and Model Selection on Predictions of Chemical Compounds in Petroferric Formations in the Brazilian Amazon by Niriele Bruno Rodrigues, Theresa Rocco Barbosa, Helena Saraiva Koenow Pinheiro, Marcelo Mancini, Quentin D. Read, Joshua Blackstock, Edwin H. Winzeler, David Miller, Phillip R. Owens, Zamir Libohova

    Published 2025-05-01
    “…This highly weathered geological and pedological occurrence makes the site ideal for studying the pedogenetic process of lateralization and the spatial variability of chemical elements. …”
    Get full text
    Article
  8. 3028
  9. 3029

    A double-layer model for improving the estimation of wheat canopy nitrogen content from unmanned aerial vehicle multispectral imagery by Zhen-qi LIAO, Yu-long DAI, Han WANG, Quirine M. KETTERINGS, Jun-sheng LU, Fu-cang ZHANG, Zhi-jun LI, Jun-liang FAN

    Published 2023-07-01
    “…., multiple stepwise regression (MSR), support vector regression (SVR), gradient boosting decision tree (GBDT), Gaussian process regression (GPR), back propagation neural network (BPNN) and radial basis function neural network (RBFNN), were compared for the retrieval of winter wheat LAI, CPP and CNC values, and a double-layer model was proposed for estimating CNC based on LAI and CPP. …”
    Get full text
    Article
  10. 3030

    Machine learning to identify suitable boundaries for band-pass spectral analysis of dynamic [ $$^{11}$$ 11 C]Ro15-4513 PET scan and voxel-wise parametric map generation by Zeyu Chang, Colm J. McGinnity, Rainer Hinz, Manlin Wang, Joel Dunn, Ruoyang Liu, Mubaraq Yakubu, Paul Marsden, Alexander Hammers

    Published 2025-07-01
    “…Frequency ranges are based on inspection of spectra, prior knowledge of receptor distribution, and blocking studies. The process currently requires the manual selection of frequency ranges based on the data. …”
    Get full text
    Article
  11. 3031

    Enhanced Multilinear PCA for Efficient Image Analysis and Dimensionality Reduction: Unlocking the Potential of Complex Image Data by Tianyu Sun, Lang He, Xi Fang, Liang Xie

    Published 2025-02-01
    “…The proposed EMPCA algorithm holds promise for reducing image analysis runtimes and advancing rapid image processing techniques.…”
    Get full text
    Article
  12. 3032

    Water‐to‐Air Imaging: A Recovery Method for the Instantaneous Distorted Image Based on Structured Light and Local Approximate Registration by Bijian Jian, Ting Peng, Xuebo Zhang, Changyong Lin

    Published 2025-04-01
    “…Experimental results show that the proposed algorithm can not only reduce image distortion and improve image visualization, but also has significantly better computational efficiency than other methods, achieving an “end‐to‐end” processing effect.…”
    Get full text
    Article
  13. 3033

    Migratory phase of Litomosoides sigmodontis filarial infective larvae is associated with pathology and transient increase of S100A9 expressing neutrophils in the lung. by Gregory Karadjian, Frédéric Fercoq, Nicolas Pionnier, Nathaly Vallarino-Lhermitte, Emilie Lefoulon, Adélaïde Nieguitsila, Sabine Specht, Leo M Carlin, Coralie Martin

    Published 2017-05-01
    “…Little is known of the early phase of the parasite life cycle, after the L3 is inoculated in the dermis by the vector and enters the afferent lymphatic vessels and before the moulting processes in the pleural cavity. …”
    Get full text
    Article
  14. 3034

    Detection of Wood Boring Insects’ Larvae Based on the Acoustic Signal Analysis and the Artificial Intelligence Algorithm by Piotr BILSKI, Piotr BOBIŃSKI, Adam KRAJEWSKI, Piotr WITOMSKI

    Published 2016-10-01
    “…The paper presents an application of signal processing and computational intelligence methods to detect presence of the wood boring insects larvae in the wooden constructions (such as the furniture of buildings). …”
    Get full text
    Article
  15. 3035

    Usage of hypercomplex numbers in a cryptographic key agreement protocol based on neural networks by Павел Павлович Урбанович, Надежда Павловна Шутько

    Published 2024-08-01
    “…The features of the software implementation of a system simulator based on interacting TРMs are described, and the results of using the developed tool for analysing the dynamics of processes in the system under consideration are presented. …”
    Get full text
    Article
  16. 3036

    Significance of Machine Learning-Driven Algorithms for Effective Discrimination of DDoS Traffic Within IoT Systems by Mohammed N. Alenezi

    Published 2025-06-01
    “…The performance of the models and data quality improved when emphasizing the impact of feature selection and data pre-processing approaches. Five machine learning models were evaluated by utilizing the Edge-IIoTset dataset: Random Forest (RF), Support Vector Machine (SVM), Long Short-Term Memory (LSTM), and K-Nearest Neighbors (KNN) with multiple K values, and Convolutional Neural Network (CNN). …”
    Get full text
    Article
  17. 3037

    Designing an intelligent push model for user emotional topics based on dynamic text categorization in social media news dissemination by Jixuan Wang

    Published 2024-12-01
    “…The model initiates data input processing by employing word segmentation and word vector extraction, culminating in the formation of an attention-based bidirectional long short-term memory (ATT-Bi-LSTM) model, which incorporates an attention mechanism for discerning positive and negative emotions. …”
    Get full text
    Article
  18. 3038

    Probabilistic Analysis of the Auto Tracking Failure by the Mobile Robot Video System by A. A. Lobaty, M. M. Tatur, A. K. Ibrahim

    Published 2022-08-01
    “…The mathematical formulation of the probabilistic analysis problem is based on the processes representation occurring in the system by a vector stochastic differential equation. …”
    Get full text
    Article
  19. 3039

    Intrusion Detection-Data Security Protection Scheme Based on Particle Swarm-BP Network Algorithm in Cloud Computing Environment by Zhun Wang, Xue Chen

    Published 2023-01-01
    “…Then, by introducing the decision tree algorithm, the overfitting is reduced and the data processing speed of the model is improved, and on this basis, the feature selection is carried out through the “gain rate” optimization method, which reduces the redundant information of the feature vector. …”
    Get full text
    Article
  20. 3040

    Development of AI-Based Public Safety System with Face Recognition Using CNN and SVM Models in Real-Time by Naila Ratu Alifa, Yana Cahyana, Rahmat Rahmat, Sutan Faisal

    Published 2025-06-01
    “…The methods used include processing facial image datasets, training models using CNN for feature extraction, and SVM for gender classification. …”
    Get full text
    Article