-
3901
Constrained adversarial learning for automated software testing: a literature review
Published 2025-05-01“…Automated software testing can be a promising solution to quickly analyze many lines of code and detect vulnerabilities and possible attack vectors by generating function-specific testing data. …”
Get full text
Article -
3902
Information Retrieval Method for the Qur’an based on FastText and Latent Semantic Indexing
Published 2025-05-01“…The proposed method involves several steps: text preprocessing (lowercasing, punctuation removal, stopword elimination, and stemming), tokenization and vocabulary creation, Bag-of-Words (BoW) representation, creation of LSI models, conversion of FastText vectors, and combining LSI and FastText vectors. A similarity index is then created from the combined vectors to process user queries and rank documents based on cosine similarity. …”
Get full text
Article -
3903
Adjudicating between face-coding models with individual-face fMRI responses.
Published 2017-07-01“…In such spaces, individuals are encoded as vectors where identity is primarily conveyed by direction and distinctiveness by eccentricity. …”
Get full text
Article -
3904
On the Ethics of Mediating Embodied Vulnerability to Violence
Published 2024-09-01“…As a starting point, I argue for the politics of embodiment as a generative process that constitutes differential vulnerabilities. …”
Get full text
Article -
3905
Selection and study of methods for implementing a diagnostic model for compressor stations of the rocket and space complex
Published 2025-03-01“…It is proposed to use wavelet analysis to process the diagnostic parameters obtained by analyzing the indicator diagrams of the stages of a reciprocating compressor.…”
Get full text
Article -
3906
Identification of hateful amharic language memes on facebook using deep learning algorithms
Published 2025-12-01“…We suggested a deep learning approach to identify offensive memes posted on Facebook in case of Amharic language'. The research process commenced by manually gathering memes posted by Facebook users. …”
Get full text
Article -
3907
-
3908
Correlation study on the risk of cardiovascular adverse events in diabetic foot patients based on machine learning - a retrospective cohort study
Published 2025-08-01“…Logistic regression, random forest (RF) and support vector machine (SVM) were used respectively to analyze influencing factors. …”
Get full text
Article -
3909
The functions of DNA methyltransferases during the feeding and development of Haemaphysalis longicornis are potentially associated with lysosome pathways
Published 2024-11-01“…RNA-seq revealed that the differentially expressed genes were mainly enriched in the biological processes of peptide biosynthesis and the cell components of ribosomes. …”
Get full text
Article -
3910
Similarity analysis of dam behavior characterized by multi-monitoring points based on Cloud model
Published 2020-05-01“…The monitoring points are then treated as vectors, and the cloud similarity is calculated using the cosine value of the angle between them. …”
Get full text
Article -
3911
LIO-SAM++: A Lidar-Inertial Semantic SLAM with Association Optimization and Keyframe Selection
Published 2024-11-01“…The issue of incorrect feature association arises because the matching process is susceptible to influences such as dynamic objects, occlusion, and environmental changes. …”
Get full text
Article -
3912
Identification and validation of TUBB, CLTA, and FBXL5 as potential diagnostic markers of postmenopausal osteoporosis
Published 2025-08-01“…Additionally, we intersected the clusters to identify differentially expressed genes (DEGs) and analyzed potential diagnostic markers for PMOP using support vector machine recursive feature elimination (SVM-RFE), LASSO, and random forest (RF) algorithms, which were subsequently validated in the GSE56116 dataset. …”
Get full text
Article -
3913
PLASMOpred: A Machine Learning-Based Web Application for Predicting Antimalarial Small Molecules Targeting the Apical Membrane Antigen 1–Rhoptry Neck Protein 2 Invasion Complex
Published 2025-05-01“…Five ML models developed comprised Random Forest (RF), Gradient Boost Machines (GBMs), CatBoost (CB), AdaBoost (AB) and Support Vector Machine (SVM). The performances of the models were evaluated using accuracy, F1 score, and receiver operating characteristic—area under the curve (ROC-AUC) and validated using held-out data and a y-randomization test. …”
Get full text
Article -
3914
Feature Representation Using Deep Autoencoder for Lung Nodule Image Classification
Published 2018-01-01“…Then these patches are transformed into fixed-length local feature vectors using unsupervised deep autoencoder (DAE). …”
Get full text
Article -
3915
Investigating the Relationship between Air Pollutants and Meteorological Parameters in the Agricultural Sector of Mazandaran Province Using Logistic Regression
Published 2021-02-01“…Therefore, the results clearly indicate that temperature is the most effective factor in the process of creating pollutants in Mazandaran province. …”
Get full text
Article -
3916
Exhaled volatile organic compounds as novel biomarkers for early detection of COPD, asthma, and PRISm: a cross-sectional study
Published 2025-05-01“…Volatile organic compounds (VOCs) in breath can reflect the pathophysiological processes of disease, thereby having the potential to serve as a promising approach for diagnosing respiratory diseases. …”
Get full text
Article -
3917
Analysis of a case of imported tsutsugamushi disease in Shanghai
Published 2024-10-01“…ObjectiveTo investigate the clinical characteristics and epidemiological history of an imported case of tsutsugamushi disease, and to identify the diagnosis and key points of prevention and control.MethodsThe clinical symptoms, diagnosis and treatment process, and epidemiological data were retrospectively analyzed for a case of tsutsugamushi disease in Changning District. …”
Get full text
Article -
3918
Optical audio cryptosystem using hyperchaotic implementation in Gyrator domain
Published 2025-05-01“…To enhance security, the hyperchaotic system generates various hyperchaotic states involved in the disruption process. Subsequently, Random Mode Decomposition (RMD) is employed to generate two asymmetric independent vectors, leading to the acquisition of the ciphertext and private key. …”
Get full text
Article -
3919
From Barthel–Randers–Kropina Geometries to the Accelerating Universe: A Brief Review of Recent Advances in Finslerian Cosmology
Published 2025-06-01“…Finsler geometry generalizes Riemannian geometry by allowing the metric tensor to depend not only on position but also on an additional internal degree of freedom, typically represented by a vector field at each point of the spacetime manifold. …”
Get full text
Article -
3920
Non-Redundant Feature Extraction in Mobile Edge Computing
Published 2025-01-01“…The goal of this paper is to reduce the amount of data uploaded by IoT devices to the cloud/edge server by removing redundant vectors of the feature extractor, thereby reducing the data transmission time and the time it takes for the cloud/edge server to process features, and improving image recognition accuracy. …”
Get full text
Article