-
2701
Post-release monitoring pathway for the deployment of gene drive-modified mosquitoes for malaria control in Africa
Published 2024-11-01“…Subject to a rigorous risk assessment process for future GDMMs products, the concerns may then be prioritized for post-release monitoring.…”
Get full text
Article -
2702
The Impact of Cognitive Distortions on Decision Making in Agile Project Management Frameworks: Current Positions and Perspectives in the Academic Community
Published 2024-08-01“…The author also identifies a possible further vector for the development of research in this direction. …”
Get full text
Article -
2703
Detection of Mucous Retention Cysts Using Deep Learning Methods on Panoramic Radiographs
Published 2024-12-01“…In the classification process, deep feature representations or feature maps of the images were created using eight different deep learning models of EfficientNet from B0 to B7. …”
Get full text
Article -
2704
Electrical impedance-based tissue classification for bladder tumor differentiation
Published 2025-01-01“…Based on the distance of the feature vector of a unknown measurement to a healthy reference, a Gaussian process classifier is trained. …”
Get full text
Article -
2705
Infinite plate loaded with normal force moving along a complex path
Published 2020-12-01“…The behavior of displacements and stresses near the moving force is investigated; and the process of the elastic wave energy propagation is also studied. …”
Get full text
Article -
2706
THE SIGNIFICANCE OF LEGAL REGULATION IN ENSURING CYBER SECURITY IN THE CONDITIONS OF WAR: EXPERIENCE FOR UKRAINE
Published 2024-05-01“…Ensuring an adequate level of cyber security is difficult to imagine without clearly planned joint actions and measures developed by responsible entities, which must be synchronized and implemented according to a single strategic plan and development vector of the national cyber security system of a declarative nature. …”
Get full text
Article -
2707
A Pythagorean fuzzy MCDM model for evaluating career happiness in sports by selecting a suitable sport
Published 2025-07-01“…Abstract This study explores an innovative application of the analytical hierarchy process (AHP) within the multi-criteria decision-making (MCDM) technique. …”
Get full text
Article -
2708
Color and Grey-Level Co-Occurrence Matrix Analysis for Predicting Sensory and Biochemical Traits in Sweet Potato and Potato
Published 2024-01-01“…A quick analytical method for the sensory traits could expedite the selection process in breeding programs. In this paper, the relationship between sensory panel and instrumental color plus texture features was evaluated. …”
Get full text
Article -
2709
An Intelligent Technique for Android Malware Identification Using Fuzzy Rank-Based Fusion
Published 2025-01-01“…Furthermore, the rankings reflect the relative importance or acceptance of each class across multiple classifiers, providing deeper insights into the ensemble’s decision-making process. The proposed framework was validated on two publicly accessible datasets, CICAndMal2020 and DREBIN, with a 5-fold cross-validation technique. …”
Get full text
Article -
2710
Plasmodium P-Type Cyclin CYC3 Modulates Endomitotic Growth during Oocyst Development in Mosquitoes.
Published 2015-11-01“…During its life cycle it undergoes two types of mitosis: endomitosis in asexual stages and an extremely rapid mitotic process during male gametogenesis. Both schizogony (producing merozoites) in host liver and red blood cells, and sporogony (producing sporozoites) in the mosquito vector, are endomitotic with repeated nuclear replication, without chromosome condensation, before cell division. …”
Get full text
Article -
2711
Decoding a Cognitive Performance State From Behavioral Data in the Presence of Auditory Stimuli
Published 2024-01-01“…Deriving an informative observation vector as well as the adaptive model and decoder would be essential in decoding the hidden performance. …”
Get full text
Article -
2712
Enhanced Subspace Iteration Technique for Probabilistic Modal Analysis of Statically Indeterminate Structures
Published 2024-11-01“…The essence of this proposed method revolves around efficiently constructing reduced basis vectors during the subspace iteration process, utilizing flexibility disassembly perturbation and the Krylov subspace. …”
Get full text
Article -
2713
Method on intrusion detection for industrial internet based on light gradient boosting machine
Published 2023-04-01“…Intrusion detection is a critical security protection technology in the industrial internet, and it plays a vital role in ensuring the security of the system.In order to meet the requirements of high accuracy and high real-time intrusion detection in industrial internet, an industrial internet intrusion detection method based on light gradient boosting machine optimization was proposed.To address the problem of low detection accuracy caused by difficult-to-classify samples in industrial internet business data, the original loss function of the light gradient boosting machine as a focal loss function was improved.This function can dynamically adjust the loss value and weight of different types of data samples during the training process, reducing the weight of easy-to-classify samples to improve detection accuracy for difficult-to-classify samples.Then a fruit fly optimization algorithm was used to select the optimal parameter combination of the model for the problem that the light gradient boosting machine has many parameters and has great influence on the detection accuracy, detection time and fitting degree of the model.Finally, the optimal parameter combination of the model was obtained and verified on the gas pipeline dataset provided by Mississippi State University, then the effectiveness of the proposed mode was further verified on the water dataset.The experimental results show that the proposed method achieves higher detection accuracy and lower detection time than the comparison model.The detection accuracy of the proposed method on the gas pipeline dataset is at least 3.14% higher than that of the comparison model.The detection time is 0.35s and 19.53s lower than that of the random forest and support vector machine in the comparison model, and 0.06s and 0.02s higher than that of the decision tree and extreme gradient boosting machine, respectively.The proposed method also achieved good detection results on the water dataset.Therefore, the proposed method can effectively identify attack data samples in industrial internet business data and improve the practicality and efficiency of intrusion detection in the industrial internet.…”
Get full text
Article -
2714
Machine Learning-Based Classification of Turkish Music for Mood-Driven Selection
Published 2024-06-01“…The objective is to facilitate the process of choosing Turkish music according to one’s mood. …”
Get full text
Article -
2715
Comprehensive Benefit Evaluation for Prefabricated Buildings Based on NSGA-II and Simulated Annealing Optimization Projection Pursuit Method
Published 2024-01-01“…The market promotion process of prefabricated construction has been slow, and it is significant to clarify the comprehensive benefits to enhance the willingness of construction units to support and the market share of prefabricated buildings. …”
Get full text
Article -
2716
Degradation of cellular mir-27 by a novel, highly abundant viral transcript is important for efficient virus replication in vivo.
Published 2012-02-01“…Expression of the 3'-UTR of m169 by an adenoviral vector was sufficient to mediate its function, indicating that no other viral factors are essential in this process. …”
Get full text
Article -
2717
Simplified MS2 phage-like particle production including a novel maturation protein internal fusion affinity tag
Published 2025-12-01“…A consequential implementation of PLPs in diagnostics is as process controls in nucleic acid amplification tests, where control RNAs are packaged within the protein capsid and protected from degradation by RNases in the sample matrix. …”
Get full text
Article -
2718
Seismic Vulnerability Assessment of Reinforced Concrete Educational Buildings Using Machine Learning Algorithm
Published 2024-01-01“…The conventional three-step evaluation process for determining the seismic vulnerability of existing buildings is time-consuming and expensive, especially when dealing with a large building stock or a city. …”
Get full text
Article -
2719
Selecting a Programming Scheme for Memristor Elements
Published 2022-12-01“…The programming procedure can be carried out using either SET or RESET, depending on a different direction of movement according to the volt-ampere characteristic of the memory and its transfer to a particular state. The programming process is controlled in the LTspice circuit modeling program.Results. …”
Get full text
Article -
2720
Modern State and civil society: promising directions and forms of interaction in the field of public administration
Published 2023-10-01“…The authors propose their own interpretation of public administration as the functioning of a public entity system established by the State, whose activities are aimed at ensuring sustainable development of the State in the process of providing administrative services, implementing laws and by-laws, and interacting with civil society in the national and international dimensions. …”
Get full text
Article