Showing 3,981 - 4,000 results of 5,420 for search 'may algorithm', query time: 0.10s Refine Results
  1. 3981

    Investigation of criminal offences against property: typical investigative situations and problems of applying specialised knowledge by R. L. Stepaniuk, V. O. Husieva

    Published 2023-07-01
    “…It has been noted that such an approach does not exclude the possibility of using other criteria, which in some cases may be of auxiliary importance in the construction of methodological and forensic recommendations. …”
    Get full text
    Article
  2. 3982

    Prediction of hypertensive disorders in pregnant women in the «gray» risk zone following combined first-trimester screening by N. V. Mostova, V. V. Kovalev, E. V. Kudryavtseva

    Published 2024-05-01
    “…In particular, this cohort usually consists of patients with borderline high risks, who may be designated as a medium risk group or located in a “gray” zone.   …”
    Get full text
    Article
  3. 3983
  4. 3984

    Assessment of copeptin and obestatin levels in coronary artery disease patients by Saraa Ali, Fatma F. Abdel Hamid, Samia Hussein, Shaimaa Wageeh, Doaa M. Ibrahim

    Published 2025-04-01
    “…They are currently assessed clinically through myocardial enzymes, electrocardiography, risk score algorithms, and angiography. It is important to find a suitable marker to differentiate them from other causes of chest pain. …”
    Get full text
    Article
  5. 3985
  6. 3986

    Evaluating the performances of SVR and XGBoost for short-range forecasting of heatwaves across different temperature zones of India by Srikanth Bhoopathi, Nitish Kumar, Somesh, Manali Pal

    Published 2024-12-01
    “…These four zones are categorized based on the 30-year average maximum temperatures (T30AMT) during the summer months of April, May, and June (AMJ). Two Machine Learning (ML) algorithms eXtreme Gradient Boosting (XGBoost) and Support Vector Regression (SVR) are employed to achieve this goal. …”
    Get full text
    Article
  7. 3987

    Establishment of an alternative splicing prognostic risk model and identification of FN1 as a potential biomarker in glioblastoma multiforme by Xi Liu, Jinming Song, Zhiming Zhou, Yuting He, Shaochun Wu, Jin Yang, Zhonglu Ren

    Published 2025-02-01
    “…We found that FN1, used for model construction, contained 4 abnormal ASEs resulting in high expression of non-canonical transcripts and the presence of premature termination codon. These abnormal ASEs may be regulated by tumour-related splicing factors according to the PPI network. …”
    Get full text
    Article
  8. 3988

    Integrated Single-Cell and Spatial Transcriptomic Analysis Identifies ISR-Related Genes Driving Immune Regulation in Parkinson’s Disease by Jiang H, Zhang X, Feng S, Feng W

    Published 2025-07-01
    “…These methods allowed us to identify four key ISR-related genes (DDIT4, GNA13, HSPA1B, and SLC7A5) that may affect PD progression, mainly through immune-related pathways. …”
    Get full text
    Article
  9. 3989

    Dysphagia after stroke by D. O. Gromova, V. V. Zakharov

    Published 2016-01-01
    “…The paper gives international algorithms for the clinical and instrumental evaluation of swallowing function and the diagnosis of aspiration. …”
    Get full text
    Article
  10. 3990

    Evaluating machine and deep learning techniques in predicting blood sugar levels within the E-health domain by Beniamino Di Martino, Antonio Esposito, Gennaro Junior Pezzullo, Tien-Hsiung Weng

    Published 2023-12-01
    “…By analysing these algorithms, the research uncovers their distinct behaviours and highlights their dissimilarities, even when their analytical underpinnings may appear similar.…”
    Get full text
    Article
  11. 3991

    A Novel Support Vector Machine with Globality-Locality Preserving by Cheng-Long Ma, Yu-Bo Yuan

    Published 2014-01-01
    “…However, the solution of the primal optimal model of SVM is susceptible for class distribution and may result in a nonrobust solution. In order to overcome this shortcoming, an improved model, support vector machine with globality-locality preserving (GLPSVM), is proposed. …”
    Get full text
    Article
  12. 3992

    MODELING OF RUNNING CUTTERS FOR SHAPING OF IMPROVED NONINVOLUTE TOOTH GEARS by Tatyana TRETYAK, Yury GUTSALENKO, Alexander MIRONENKO

    Published 2012-05-01
    “…There are proposed calculation algorithms, which may be used in dataware of respective CAD/CAM systems of maintenance for tooling backup. …”
    Get full text
    Article
  13. 3993
  14. 3994

    Search for gamma-ray spectral lines from dark-matter annihilation with the DAMPE satellite by Frieden Jennifer Maria

    Published 2025-01-01
    “…The annihilation of dark-matter particles may lead to the production of monochromatic gamma-ray emission. …”
    Get full text
    Article
  15. 3995

    THE AXIOMATIC METHOD IN ECONOMICS by A. N. Nekhamkin, A. B. Elovikov

    Published 2017-10-01
    “…Using the axiomatic method in the economic theory may expose a number of relationships between previously unrelated subjects and justify new theories, hypotheses, and concepts.…”
    Get full text
    Article
  16. 3996

    New concept for the value function of prospect theory by Kazuo Sano

    Published 2024-11-01
    “…Additionally, we have conducted empirical studies on algorithmic trading strategies that employ different value function specifications.…”
    Get full text
    Article
  17. 3997
  18. 3998

    On the Effectiveness of the Minimization Approach to the Query Optimization by N. Mendkovich

    Published 2016-04-01
    “…It includes minimization algorithms based on “condition absorption”, prime implicants, and a set of linear inequalities minimization technics. …”
    Get full text
    Article
  19. 3999

    Verifiable outsourced attribute-based encryption with access update by Suqing LIN

    Published 2019-02-01
    “…In order to meet the secure and reliable access requirements for the encrypted data stored in the public cloud,a verifiable outsourced attribute-based encryption scheme with access update was proposed.Based on a standard KP-ABE scheme,verifiable outsourced decryption and verifiable access update for a ciphertext through novel constructions for the scheme were obtained.The verifiability of the outsourced computation ensures that the third-party service may perform algorithms honestly.The scheme has selective IND-CPA security for the original and updated ciphertexts,weak master private key security,and verification soundness in the standard model were proved,respectively.Compared with similar schemes from literatures,the proposed scheme can achieve tradeoff in the optimization of functionality,security and efficiency.…”
    Get full text
    Article
  20. 4000

    Influence of Smartphones and Software on Acoustic Voice Measures. by Elizabeth U. Grillo, Jenna N. Brosious, Staci L. Sorrell, Supraja Anand

    Published 2016-12-01
    “…The study suggests that certain smartphones may be appropriate to record daily voice measures representing the effects of vocal loading within individuals.  …”
    Get full text
    Article