Showing 761 - 780 results of 944 for search 'play information algorithm', query time: 0.11s Refine Results
  1. 761

    “Voice is the New Blood”: a discourse analysis of voice AI health-tech start-up websites by Alden Blatter, Hortense Gallois, Emily Evangelista, Yael Bensoussan, Bridge2AI-Voice Consortium, Jean-Christophe Bélisle-Pipon, Yael E. Bensoussan, Olivier Elemento, Jean-Christophe Bélisle-Pipon, David Dorr, Satrajit Ghosh, Alistair Johnson, Phillip Payne, Maria E. Powell, Anaïs Rameau, Vardit Ravitsky, Alexandros Sigaras

    Published 2025-05-01
    “…However, descriptions of voice datasets used to train algorithms vary widely and are often absent, reflecting broader gaps in acoustic and ethical standards for voice data collection and insufficient incentives for start-ups to disclose key data details.DiscussionStart-ups play a crucial role in the research, development, and marketization of voice AI health-tech, prefacing the integration of this new technology into healthcare systems. …”
    Get full text
    Article
  2. 762

    SECONDGRAM: Self-conditioned diffusion with gradient manipulation for longitudinal MRI imputation by Brandon Theodorou, Anant Dadu, Mike Nalls, Faraz Faghri, Jimeng Sun

    Published 2025-05-01
    “…These models are computer algorithms that simulate how information changes. SECONDGRAM addresses data scarcity by generating realistic follow-up MRI imaging features, thereby enriching limited datasets. …”
    Get full text
    Article
  3. 763
  4. 764
  5. 765

    Identification of Gingival Inflammation Surface Image Features Using Intraoral Scanning and Deep Learning by Wei Li, Linlin Li, Wenchong Xu, Yuting Guo, Min Xu, Shengyuan Huang, Dong Dai, Chang Lu, Shuai Li, Jiang Lin

    Published 2025-06-01
    “…Therefore, it is a need to acquire objective identification information for accurate monitoring and diagnosis of gingival inflammation. …”
    Get full text
    Article
  6. 766

    Exploration of metastasis-related signatures in osteosarcoma based on tumor microenvironment by integrated bioinformatic analysis by Shiyao Liao, Xing Gao, Kai Zhou, Yao Kang, Lichen Ji, Xugang Zhong, Jun Lv

    Published 2025-01-01
    “…Methods: The high-throughput sequencing data was downloaded from the TARGET database and performed the ESTIMATE algorithm. Metastasis-related information was obtained from the GSE21257 dataset. …”
    Get full text
    Article
  7. 767

    Diagnosis of hypertonicity of the masticatory muscles at a dental appointment by Yu. A. Makedonova, A. A. Vorobev, A. N. Osuko, A. V. Alexandrov, D. Yu. Dyachenko, A. G. Pavlova-Adamovich

    Published 2021-10-01
    “…In the study of this area, the main role is played by the clinician, only if all the diagnostically valuable information is available, it is possible to formulate an optimal treatment plan and avoid aggravation of the patient's condition due to incorrect diagnosis and treatment.Conclusions. …”
    Get full text
    Article
  8. 768

    Mortality due to snakebite and other venomous animals in the Indian state of Bihar: Findings from a representative mortality study. by Rakhi Dandona, G Anil Kumar, Archana Kharyal, Sibin George, Md Akbar, Lalit Dandona

    Published 2018-01-01
    “…Cause of death was assigned using the SmartVA automated algorithm. The annualized mortality rate per 100,000 population due to snakebite, scorpion sting and other animals adjusted for age, sex and urban-rural population distribution of the state; and detailed contextual information on snakebites are reported. …”
    Get full text
    Article
  9. 769
  10. 770
  11. 771
  12. 772
  13. 773

    Blind Recognition of Convolutional Codes Based on the ConvLSTM Temporal Feature Network by Lu Xu, Yixin Ma, Rui Shi, Juanjuan Li, Yijia Zhang

    Published 2025-02-01
    “…The accurate identification of channel-coding types plays a crucial role in wireless communication systems. …”
    Get full text
    Article
  14. 774

    Integration of Fourier and Wavelet Transform for Adsorption Mechanism of Cesium Study Based on X-Ray Diffraction and Absorption Spectroscopy by Chi-Wen Hsieh, Zih-Shiuan Chiou, Chuan-Pin Lee, Shih-Chin Tsai, Wei-Hsiang Tseng, Yu-Hung Wang, Hui-Min Chiu, Qi-Rui Sun, Chun-Liang Yeh

    Published 2025-01-01
    “…The safety and storage of nuclear disposal plays a critical challenge in the utilization of radiology applications such as for nuclear medicine, radiotherapy, nuclear energy, particularly concerning the environmental behavior of radio-materials. …”
    Get full text
    Article
  15. 775

    DAF-Net: Dual-Aperture Feature Fusion Network for Aircraft Detection on Complex-Valued SAR Image by Qingbiao Meng, Youming Wu, Yuxi Suo, Tian Miao, Qingyang Ke, Xin Gao, Xian Sun

    Published 2025-01-01
    “…Most of the existing SAR aircraft detection algorithms are predominantly designed based on the scattering characteristics of full-aperture images, which provide high-resolution and rich detail information. …”
    Get full text
    Article
  16. 776
  17. 777

    Explainability of Network Intrusion Detection Using Transformers: A Packet-Level Approach by Pahavalan Rajkumardheivanayahi, Ryan Berry, Nicholas U. Costagliola, Lance Fiondella, Nathaniel D. Bastian, Gokhan Kul

    Published 2025-01-01
    “…Most NIDS datasets that are publicly available have focused on flow data, offering aggregated information about network connections, and have played a crucial role in enabling researchers and network security professionals to design and develop flow-based NIDS solutions. …”
    Get full text
    Article
  18. 778
  19. 779
  20. 780