Search alternatives:
many » may (Expand Search)
Showing 2,881 - 2,900 results of 4,135 for search 'many algorithm', query time: 0.12s Refine Results
  1. 2881

    Weighted Hybrid Random Forest Model for Significant Feature prediction in Alzheimer’s Disease Stages by M. Rohini, D. Surendran

    Published 2025-03-01
    “…Thus, the proposed Weighted Hybrid Random Forest algorithm (WHBM) utilized the 63 features that comprise the whole brain volume. …”
    Get full text
    Article
  2. 2882
  3. 2883

    Modeling distributed energy resource aggregations in security constrained unit commitment and economic dispatch by Jesse Holzer, Matthew Cornachione, Liping Li, Eran Schweitzer, Brent Eldridge

    Published 2025-09-01
    “…These DER aggregations may be composed of many individual resources that are offered and dispatched by the market as a single entity. …”
    Get full text
    Article
  4. 2884
  5. 2885

    Using AlphaFold-Multimer to study novel protein-protein interactions of predation essential hypothetical proteins in Bdellovibrio by Ibukun John Abulude, Isabel Cristina Rodríguez Luna, Alejandro Sánchez Varela, Andrew Camilli, Daniel E. Kadouri, Xianwu Guo

    Published 2025-04-01
    “…By applying Markov Cluster Algorithm and AlphaFold-Multimer to analyze the protein network and interaction partners of the AP-PEPs, we predicted high-confidence protein-protein interactions and two structurally similar but unique novel protein complexes formed among proteins of the Bd2209-Bd2212 and Bd2723-Bd2726 operons. …”
    Get full text
    Article
  6. 2886

    Otitis externa in dogs (prevalence, etiology, clinical course, and treatment regimens) by D. L. Datsiuk, V. M. Hunchak, B. V. Gutyj, I. I. Khariv, R. O. Vasiv, V. P. Martynyshyn

    Published 2024-05-01
    “…Many researchers have confirmed that otitis is characterized by seasonality (18.6 % occurs in summer, 30.2 % in autumn, 15.6 % in winter, and 35.6 % in spring). …”
    Get full text
    Article
  7. 2887

    AI-enabled obstetric point-of-care ultrasound as an emerging technology in low- and middle-income countries: provider and health system perspectives by Sara Della Ripa, Nicole Santos, Dilys Walker

    Published 2025-07-01
    “…Abstract Background In many low- and middle-income countries (LMICs), widespread access to obstetric ultrasound is challenged by lack of trained providers, workload, and inadequate resources required for sustainability. …”
    Get full text
    Article
  8. 2888

    MYOCARDIAL INFARCTION TYPE 4TH: FEATURES OF THE COURSE, PREVENTION AND MANAGEMENT OF PATIENTS AFTER PERCUTANEOUS CORONARY INTERVENTIONS by N. G. Pravdyuk, A. V. Novikova, E. A. Korolyеv

    Published 2016-09-01
    “…The article describes the varieties of myocardial infarction associated with PCI, an algorithm for the diagnosis and management of patients in accordance with current clinical recommendations.…”
    Get full text
    Article
  9. 2889

    BedEye: A Bed Exit and Bedside Fall Warning System Based on Skeleton Recognition Technology for Elderly Patients by Liang-Bi Chen, Wan-Jung Chang, Tzu-Chin Yang

    Published 2025-01-01
    “…Moreover, we develop an algorithm for determining bed posture using the posture of patients leaving the bed. …”
    Get full text
    Article
  10. 2890

    Trusted Energy-Aware Hierarchical Routing (TEAHR) for Wireless Sensor Networks by Vikas, Charu Wahi, Bharat Bhushan Sagar, Manisha Manjul

    Published 2025-04-01
    “…These days, wireless sensor networks (WSNs) are expanding fast and are used in many fields such as healthcare, battlefields, etc. …”
    Get full text
    Article
  11. 2891

    Nonlinear main components of the cytokine profile in children with community-acquired pneumonia by N. V. Iziurova, D. Yu. Nokhrin, A. Yu. Savochkina, A. N. Uzunova

    Published 2024-01-01
    “…Cytokines are the key mediators which control and regulate immune and inflammatory responses via complex networks and serve as biomarkers of many diseases. Quantitative determination of cytokines is helpful in assessing immune status and adjusting therapy for various inflammatory diseases, such as sepsis and pneumonia. …”
    Get full text
    Article
  12. 2892

    Bibliometric Analysis and Overview of Matrix Product States in the Bose-Hubbard Model by Juan Sebastián Gómez, Karen Cecilia Rodríguez

    Published 2025-03-01
    “…The use of matrix product states in DMRG algorithms is gaining significant traction in various fields, including quantum computing, machine learning, and statistical mechanics, with the purpose of addressing the challenges related to quantum many-body systems.…”
    Get full text
    Article
  13. 2893

    Pascal as the Driving Force of Informatics Education in Schools in Poland by Maciej M. Sysło

    Published 2024-12-01
    “…The first books in Polish about the Pascal programming language appeared in the late 1970s, and were soon followed by a Polish translation of Niklaus Wirth’s book Algorithms + Data Structures = Programs. At that time, many efforts were made to prepare teachers to teach informatics in schools, and Pascal was one of the topics taught, often with no access to computers. …”
    Get full text
    Article
  14. 2894
  15. 2895

    Truthful incentive mechanism for “digital currency”based on privacy protection by Xiao CHEN, Xinran LYU, Zhi LIU

    Published 2019-04-01
    “…Many national central banks have conducted legal digital currency research based on distributed ledger technology,but only the UK has disclosed the accounting structure of the legal digital currency framework RSCoin,and the incentive mechanisms was proposed to encourage mintettes to provide honest collaborative accounting services.However,this mechanism does not take into account the differential service costs of mintettes,nor does it give a definite compensation distribution.The privacy costs of the mintettes were fully considered,the incentive model of the central bank and mintettes were established,and the methods were clarified to compensate mintettes.In the legal digital currency research area,an incentive mechanism POPTIM was proposed firstly,that not only protects the private cost of the mintettes,but also guarantees the mintettes report their truthful bidding prices to the central banks.POPTIM first encrypts the biddings of mintettes by coding hash encryption method,then adopts privacy-preserving sorting algorithm to select the winner mintettes,and finally calculates the reward of mintettes based on the homomorphic addition algorithm.The analysis shows that the mechanism is privacy security,computationally efficient,individually rational and truthful simultaneously.…”
    Get full text
    Article
  16. 2896
  17. 2897

    Analysis of user interaction with virtual objects in augmented reality applications by M. V. Alpatova

    Published 2022-12-01
    “…However, at a higher level, there are many research tasks for developers on the most effective application of these algorithms and subsequent analysis of the data obtained. …”
    Get full text
    Article
  18. 2898

    Perform The Complex EFG Transform in Cryptography by Emad Kuffi

    Published 2024-06-01
    “…The integral transforms in their various forms, the traditional and the complex forms, have proven their importance in many scientific fields, and mathematicians exploit them in these fields to the fullest. …”
    Get full text
    Article
  19. 2899

    The Dyspepsia Alphabet: DU, GU, GERD, NERD, NUD/FD and UD by ABR Thomson

    Published 2001-01-01
    “…This brief overview describes some of the many terms used to describe dyspepsia. Clearly, new treatment algorithms are needed for the care of patients with undiagnosed dyspepsia seen in a primary care setting.…”
    Get full text
    Article
  20. 2900

    Knowledge, Readiness, Willingness-to-Use, and Willingness-to-Pay for Telehealth in Nonlife-Threatening Emergency Department Visits by Vahé Heboyan, Phillip Coule, Davide Mariotti, Gianluca De Leo

    Published 2025-01-01
    “…Then, we presented them with a hypothetical scenario for visiting a board-certified ED doctor through telehealth instead of in-person visits, and, using a double-bound dichotomous choice iterative bidding algorithm, we solicited their willingness-to-pay for such a telehealth visit. …”
    Get full text
    Article