Showing 1,721 - 1,740 results of 5,420 for search 'may algorithm', query time: 0.10s Refine Results
  1. 1721

    Forecasting the Directions of the State Policy of the Region on the Basis of Cluster Analysis of Indicators of Socio-Economic Development of Its Municipalities by S. N. Borodin

    Published 2023-11-01
    “…The advantage of the proposed approach is that it identifies and predicts the problems of socio-economic development of the region, which may be hidden in the medium-term forecast of the socio-economic region. …”
    Get full text
    Article
  2. 1722

    Machine learning-based characterization of stemness features and construction of a stemness subtype classifier for bladder cancer by Heping Qiu, Xiaolin Deng, Jing Zha, Lihua Wu, Haonan Liu, Yichen Lu, Xinji Zhang

    Published 2025-04-01
    “…Methods We used bladder cancer datasets from the TCGA and GEO databases, based on stemness gene sets from the StemChecker database, to identify stemness subtypes using the consensus clustering algorithm. We calculated the mRNA expression-based stemness index (mRNAsi) using the OCLR algorithm. …”
    Get full text
    Article
  3. 1723

    GPR65 is a novel immune biomarker and regulates the immune microenvironment in lung adenocarcinoma by Hanxu Zhou, Zhi Chen, Shuang Gao, Chaoqun Lian, Junjie Hu, Jin Lu, Lei Zhang

    Published 2025-05-01
    “…BackgroundThe tumor microenvironment (TME) plays a crucial role in the progression of lung adenocarcinoma (LUAD), and it may serve as the best prognostic predictor of LUAD. …”
    Get full text
    Article
  4. 1724

    Persistent Gender Disparity in Authorship of Arthroscopic Surgery Research by Uma Balachandran, BA, Auston R. Locke, MPH, Niklas H. Koehne, BA, Charu Jain, BA, Camila Vicioso, BA, Jiwoo Park, BA, Katrina S. Nietsch, MS, Alexis C. Colvin, MD

    Published 2025-04-01
    “…The full names of first and last authors were analyzed with the validated Genderize algorithm. Analyses were performed to evaluate authorship of abstracts and articles. …”
    Get full text
    Article
  5. 1725
  6. 1726

    Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication by Zhihua Gan, Shiping Song, Lin Zhou, Daojun Han, Jiangyu Fu, Xiuli Chai

    Published 2022-11-01
    “…Experiments demonstrate the effectiveness of our algorithm, and it may be applied for image secure communication.…”
    Get full text
    Article
  7. 1727

    Adaptive Cooperative Quality Weight Spectrum Sensing for Mitigating Byzantine Attacks in Cognitive Radio by Kanabadee Srisomboon, Luepol Pipanmekaporn, Akara Prayote, Wilaiporn Lee

    Published 2025-01-01
    “…Based on existing techniques, the BAs and CRUs may be assigned with low reliability weights or distinguished from the data fusion account. …”
    Get full text
    Article
  8. 1728

    A novel method to predict white blood cells after kidney transplantation based on machine learning by Songping He, Xiangxi Li, Zunyuan Zhao, Bin Li, Xin Tan, Hui Guo, Yanyan Chen, Xia Lu

    Published 2024-10-01
    “…The abnormal white blood cell count in patients after surgery may be caused by the use of immunosuppressive agents and other factors. …”
    Get full text
    Article
  9. 1729

    Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications by Mohammad Kamrul Hasan, Shayla Islam, Rossilawati Sulaiman, Sheroz Khan, Aisha-Hassan Abdalla Hashim, Shabana Habib, Mohammad Islam, Saleh Alyahya, Musse Mohamed Ahmed, Samar Kamil, Md Arif Hassan

    Published 2021-01-01
    “…Numerous test images have been used to determine the performance of the proposed algorithm. Several experiments show that the proposed algorithm for image cryptosystems provides better efficiency than conventional techniques.…”
    Get full text
    Article
  10. 1730

    Comparison of 2 thromboelastography methods using patient and control samples by Robert Frick, Brittany Washburn, Dennis Plocher, Jonathan K. Zoller, Jason Gillihan, Michael Dombrowski, Charles Eby, Christopher W. Farnsworth

    Published 2025-03-01
    “…The ROTEM (Werfen) sigma is a cartridge-based system that may facilitate point-of-care use, but limited studies exist comparing the sigma with the predicated ROTEM delta. …”
    Get full text
    Article
  11. 1731

    Convergence Analysis of the Approximation Problems for Solving Stochastic Vector Variational Inequality Problems by Meiju Luo, Kun Zhang

    Published 2020-01-01
    “…Because of the existence of stochastic variable, the SVVIP may have no solutions generally. For solving this problem, we employ the regularized gap function of SVVIP to the loss function and then give a low-risk conditional value-at-risk (CVaR) model. …”
    Get full text
    Article
  12. 1732

    Novel meta-ensemble modelling approach and comparison of machine-learning models for rebar price estimation by Sahin Tolga Guvel, Abdulkadir Budak, Ibrahim Karataş

    Published 2025-02-01
    “…The voting meta-ensemble machine-learning algorithm exhibited the best performance for all lag periods investigated. …”
    Get full text
    Article
  13. 1733

    Research on the invulnerability of regional network based on topology analysis by Changqing AN, Yujia LIU, Hui WANG, Zhiyan ZHENG, Tao YU, Jilong WANG

    Published 2021-11-01
    “…To measure the overall impact of different attacks a network region may encounter, an evaluation algorithm can be used to capture the difference in invulnerability of regional network topologies.Specifically, the vulnerability of regional network and that of connection topology between regions both internally and externally was analyzed.To find predictions between regions as supplemental topology data and create the Internet topology, data would be measured in various ways and verified.Using stratified probability sampling, multiple damage simulations could predict the worst-case scenarios in real conditions.Damage was simulated multiple times based on stratified probability sampling to approximate the damage situation of the area under real conditions.A significance tester was realized to measure the impact of damage from the overall level and special weak points respectively, discover the difference of the damage between the areas, and calculate the regional invulnerability ranking.Finally, the ranking and clustering results of forty-eight regions were given.…”
    Get full text
    Article
  14. 1734

    Symbrachydactyly by Govindasamy Balakrishnan, S. Vijayaragavan, Balakrishnan Somesh

    Published 2022-02-01
    “…Symbrachydactyly is a rare congenital hand malformation in which a child is born with abnormally short digits that may be webbed, misshaped, or missing, and it is usually a unilateral condition. …”
    Get full text
    Article
  15. 1735

    Radiographic Evaluation of Children with Febrile Urinary Tract Infection: Bottom-Up, Top-Down, or None of the Above? by Michaella M. Prasad, Earl Y. Cheng

    Published 2012-01-01
    “…The proper algorithm for the radiographic evaluation of children with febrile urinary tract infection (FUTI) is hotly debated. …”
    Get full text
    Article
  16. 1736

    Oscillometric method: what is it and is it suitable for measuring blood pressure in all patients? by I. N. Posokhov, N. N. Maroz-Vadalazhskaya

    Published 2024-10-01
    “…The list of groups in which blood pressure measuring devices may be inaccurate has expanded significantly in the 2020s compared to the previous decade. …”
    Get full text
    Article
  17. 1737

    A New Gradient Based Surface Defect Detection Method for the Ceramic Tile by Murat Alparslan Güngör

    Published 2022-12-01
    “…Ceramic tiles are controlled to detect surface defects after production because many defects may occur on their surface during production. The detection of ceramic tile surface defects is usually performed by human observations in most factories. …”
    Get full text
    Article
  18. 1738

    Gateway Selection Game in Cyber-Physical Systems by Hao Wang, Jianzhong Li, Hong Gao

    Published 2016-05-01
    “…Different kinds of devices in a CPS may not operate with each other for their own benefit, and the competition will be more intense between different kinds of devices. …”
    Get full text
    Article
  19. 1739

    Analysis of Pulse System Dynamics of Phase Synchronization in Multiple Capture Mode by A. L. Shilina

    Published 2003-08-01
    “…The paper considers a model, a method and an algorithm of the simulation of the pulse system dynamics of phase synchronization in the multiple capture mode. …”
    Get full text
    Article
  20. 1740

    Privacy-preserving task matching scheme for crowdsourcing by SONG Fuyuan, DING Siyang, WANG Wei, JIANG Qin, FU Zhangjie

    Published 2025-05-01
    “…Due to the potential untrustworthiness of crowdsourcing platforms, which may lead to the leakage of users’ private information, users are required to encrypt their data prior to uploading. …”
    Get full text
    Article