-
3981
Investigation of criminal offences against property: typical investigative situations and problems of applying specialised knowledge
Published 2023-07-01“…It has been noted that such an approach does not exclude the possibility of using other criteria, which in some cases may be of auxiliary importance in the construction of methodological and forensic recommendations. …”
Get full text
Article -
3982
Prediction of hypertensive disorders in pregnant women in the «gray» risk zone following combined first-trimester screening
Published 2024-05-01“…In particular, this cohort usually consists of patients with borderline high risks, who may be designated as a medium risk group or located in a “gray” zone. …”
Get full text
Article -
3983
Identification of hub immune-related genes and construction of predictive models for systemic lupus erythematosus by bioinformatics combined with machine learning
Published 2025-05-01“…Three machine learning algorithms were applied to DE-IRGs to screen for hub DE-IRGs. …”
Get full text
Article -
3984
Assessment of copeptin and obestatin levels in coronary artery disease patients
Published 2025-04-01“…They are currently assessed clinically through myocardial enzymes, electrocardiography, risk score algorithms, and angiography. It is important to find a suitable marker to differentiate them from other causes of chest pain. …”
Get full text
Article -
3985
The use of culturally adapted and translated depression screening questionnaires with South Asian haemodialysis patients in England.
Published 2023-01-01“…However, data indicate that standard cut-off scores may not be appropriate to classify symptom severity. …”
Get full text
Article -
3986
Evaluating the performances of SVR and XGBoost for short-range forecasting of heatwaves across different temperature zones of India
Published 2024-12-01“…These four zones are categorized based on the 30-year average maximum temperatures (T30AMT) during the summer months of April, May, and June (AMJ). Two Machine Learning (ML) algorithms eXtreme Gradient Boosting (XGBoost) and Support Vector Regression (SVR) are employed to achieve this goal. …”
Get full text
Article -
3987
Establishment of an alternative splicing prognostic risk model and identification of FN1 as a potential biomarker in glioblastoma multiforme
Published 2025-02-01“…We found that FN1, used for model construction, contained 4 abnormal ASEs resulting in high expression of non-canonical transcripts and the presence of premature termination codon. These abnormal ASEs may be regulated by tumour-related splicing factors according to the PPI network. …”
Get full text
Article -
3988
Integrated Single-Cell and Spatial Transcriptomic Analysis Identifies ISR-Related Genes Driving Immune Regulation in Parkinson’s Disease
Published 2025-07-01“…These methods allowed us to identify four key ISR-related genes (DDIT4, GNA13, HSPA1B, and SLC7A5) that may affect PD progression, mainly through immune-related pathways. …”
Get full text
Article -
3989
Dysphagia after stroke
Published 2016-01-01“…The paper gives international algorithms for the clinical and instrumental evaluation of swallowing function and the diagnosis of aspiration. …”
Get full text
Article -
3990
Evaluating machine and deep learning techniques in predicting blood sugar levels within the E-health domain
Published 2023-12-01“…By analysing these algorithms, the research uncovers their distinct behaviours and highlights their dissimilarities, even when their analytical underpinnings may appear similar.…”
Get full text
Article -
3991
A Novel Support Vector Machine with Globality-Locality Preserving
Published 2014-01-01“…However, the solution of the primal optimal model of SVM is susceptible for class distribution and may result in a nonrobust solution. In order to overcome this shortcoming, an improved model, support vector machine with globality-locality preserving (GLPSVM), is proposed. …”
Get full text
Article -
3992
MODELING OF RUNNING CUTTERS FOR SHAPING OF IMPROVED NONINVOLUTE TOOTH GEARS
Published 2012-05-01“…There are proposed calculation algorithms, which may be used in dataware of respective CAD/CAM systems of maintenance for tooling backup. …”
Get full text
Article -
3993
Integrated Power and Attitude Control Design of Satellites Based on a Fuzzy Adaptive Disturbance Observer Using Variable-Speed Control Moment Gyros
Published 2016-01-01“…The algorithms can simultaneously track attitude and power. …”
Get full text
Article -
3994
Search for gamma-ray spectral lines from dark-matter annihilation with the DAMPE satellite
Published 2025-01-01“…The annihilation of dark-matter particles may lead to the production of monochromatic gamma-ray emission. …”
Get full text
Article -
3995
THE AXIOMATIC METHOD IN ECONOMICS
Published 2017-10-01“…Using the axiomatic method in the economic theory may expose a number of relationships between previously unrelated subjects and justify new theories, hypotheses, and concepts.…”
Get full text
Article -
3996
New concept for the value function of prospect theory
Published 2024-11-01“…Additionally, we have conducted empirical studies on algorithmic trading strategies that employ different value function specifications.…”
Get full text
Article -
3997
Interpersonal counselling for adolescent depression delivered by youth mental health workers without core professional training: the ICALM feasibility RCT
Published 2024-12-01“…A future trial may be feasible if challenges around staffing could be mitigated. …”
Get full text
Article -
3998
On the Effectiveness of the Minimization Approach to the Query Optimization
Published 2016-04-01“…It includes minimization algorithms based on “condition absorption”, prime implicants, and a set of linear inequalities minimization technics. …”
Get full text
Article -
3999
Verifiable outsourced attribute-based encryption with access update
Published 2019-02-01“…In order to meet the secure and reliable access requirements for the encrypted data stored in the public cloud,a verifiable outsourced attribute-based encryption scheme with access update was proposed.Based on a standard KP-ABE scheme,verifiable outsourced decryption and verifiable access update for a ciphertext through novel constructions for the scheme were obtained.The verifiability of the outsourced computation ensures that the third-party service may perform algorithms honestly.The scheme has selective IND-CPA security for the original and updated ciphertexts,weak master private key security,and verification soundness in the standard model were proved,respectively.Compared with similar schemes from literatures,the proposed scheme can achieve tradeoff in the optimization of functionality,security and efficiency.…”
Get full text
Article -
4000
Influence of Smartphones and Software on Acoustic Voice Measures.
Published 2016-12-01“…The study suggests that certain smartphones may be appropriate to record daily voice measures representing the effects of vocal loading within individuals. …”
Get full text
Article