-
41
DeepQR: single-molecule QR codes for optical gene-expression analysis
Published 2024-07-01Get full text
Article -
42
Exploring the Acceptance and Application of a Humanoid Robot: Insights from Three Field Studies
Published 2025-07-01Get full text
Article -
43
Development and validation of a multiple myeloma diagnostic model based on systemic lupus erythematosus-associated genes and identification of specific genes
Published 2025-05-01“…Furthermore, we used the STRING database to build a PPI network for the intersecting genes and the cytoHubba plugin in Cytoscape software to identify important genes with biological significance. …”
Get full text
Article -
44
-
45
Cword2vec: a novel morphological rule-based word embedding approach for Urdu text sentiment analysis
Published 2025-07-01Get full text
Article -
46
Computational analysis of DEHP’s oncogenic role in colorectal cancer
Published 2025-05-01“…We predicted DEHP molecular targets via SwissTargetPrediction and ChEMBL databases and constructed a protein–protein interaction (PPI) network using STRING. Machine learning methods, including LASSO regression, SVM, and Random Forest, identified key genes. …”
Get full text
Article -
47
-
48
Multi-omics exploration of chaperone-mediated immune-proteostasis crosstalk in vascular dementia and identification of diagnostic biomarkers
Published 2025-07-01“…Protein-protein interaction (PPI) networks were constructed using the STRING database. Biomarker validation was performed through cross-validation using LASSO, SVM-RFE, and Random Forest algorithms. …”
Get full text
Article -
49
Usage of hypercomplex numbers in a cryptographic key agreement protocol based on neural networks
Published 2024-08-01“…A hash size of 512 bits are generated by transforming the string representation of the current input vector of neuron weights. …”
Get full text
Article -
50
Plagiarism types and detection methods: a systematic survey of algorithms in text analysis
Published 2025-03-01“…This survey critically evaluates existing literature, contrasting traditional methods like string-matching with advanced machine learning, natural language processing, and deep learning approaches. …”
Get full text
Article -
51
Critical Evaluation of SQL Injection Security Measures in Web Applications
Published 2025-03-01“…The VIWeb vulnerability scanner is introduced in the study, which evaluates three machine learning models—Decision Trees, Support Vector Machines (SVMs), and Artificial Neural Networks (ANNs)—for malware detection. …”
Get full text
Article -
52
Rack1 and Pon1 as predictive hub genes in WNT-based oral cancer: an interactomic approach
Published 2025-01-01“…Protein–protein interaction (PPI) networks were constructed using the STRING database and visualised in Cytoscape. Machine learning models, including naïve Bayes and neural networks, were applied to predict interactomic hub genes based on differentially expressed gene (DEG) data. …”
Get full text
Article -
53
Integrative in Silico modeling for mTOR inhibition: From ridge classifiers to descriptor-free deep neural networks
Published 2025-01-01“…Using a variety of quantitative structure-activity relationship (QSAR) models, we present a comprehensive comparison of deep learning (DL) and classical machine learning (ML) techniques for modeling mTOR inhibitor activity. …”
Get full text
Article -
54
Real-time prediction of the rate of penetration via computational intelligence: a comparative study on complex lithology in Southwest Iran
Published 2025-06-01“…Following preprocessing and outlier removal, six features, namely, the flow rate (Q), weight on bit (WOB), standpipe pressure (SPP), depth, torque (T), and drill string rotation (DSR), were utilized as inputs for estimating the ROP. …”
Get full text
Article -
55
-
56
Error monitoring and correction in violin performance: An EEG study
Published 2025-09-01Get full text
Article -
57
基于神经网络和遗传算法的多齿轮并联传动优化设计
Published 2014-01-01“…Based on neural network and genetic algorithm,the optimal designed mathematical model of multi-gear parallel drive and transmission for a certain giant overload operation machine is established.In this optimized gear design,some vague string diagrams of input-output relationship as well as the neural networks fitting methods of discrete data are given,and then the optimizing calculation by applying genetic algorithm is conducted.The result shows that through the utilization of this method,not only the working efficiency could be promoted,but the result could also be reasonable and credible.…”
Get full text
Article -
58
RANDOM FORCE MODELING AND VIBRATION ANALYSIS OF FIXED ABRASIVE WIRE SAW
Published 2019-01-01“…The main vibration patterns include the incentive of abrasive grains to the wire saw and vibrations transmitted by the machine itself. For the sake of investigating the effect of abrasive grains on the vibration of wire saws during cutting process, based on the oscillation theory of the string, the vibration equations of the wire saw in the case of a damped axially uniform motion were constructed and together with an analysis of the force in the wire saw during the process of cutting. …”
Get full text
Article -
59
Euclidean Distance-Based Tree Algorithm for Fault Detection and Diagnosis in Photovoltaic Systems
Published 2025-04-01“…The developed procedure for fault detection and diagnosis is implemented and applied to classify a dataset comprising seven distinct classes: normal operation, string disconnection, short circuit of three modules, short circuit of ten modules, and three cases of string disconnection, with 25%, 50%, and 75% of partial shading. …”
Get full text
Article -
60
QuadTPat: Quadruple Transition Pattern-based explainable feature engineering model for stress detection using EEG signals
Published 2024-11-01“…The proposed XFE model generates a DLob string, and the explainable results were obtained using this string. …”
Get full text
Article