-
161
TMEM132A: a novel susceptibility gene for lung adenocarcinoma combined with venous thromboembolism identified through comprehensive bioinformatic analysis
Published 2025-05-01“…This study utilized public databases to identify crosstalk genes (CGs) between LUAD and VTE, applied machine learning methods to discover shared diagnostic biomarkers, and explored their underlying mechanisms.MethodsDisease-specific genes for VTE were extracted from comprehensive genomic databases (CTD, DisGeNET, GeneCards, OMIM), while transcriptomic profiles of LUAD and VTE cohorts were retrieved from GEO via GEOquery implementation. …”
Get full text
Article -
162
Comprehensive Benefit Evaluation for Prefabricated Buildings Based on NSGA-II and Simulated Annealing Optimization Projection Pursuit Method
Published 2024-01-01“…Finally, the NSGA-II and simulated annealing algorithm optimization projection pursuit method are applied to solve and evaluate the comprehensive benefit model, obtaining the optimal prefabricated component solution with the best comprehensive benefits. …”
Get full text
Article -
163
Information Theoretic Analysis of PUF-Based Tamper Protection
Published 2025-03-01Get full text
Article -
164
-
165
Analyzing key users’ behavior trends in volunteer-based networks
Published 2025-05-01“…We utilized data from over 2.4 million users on a peer-to-peer food-sharing online platform. Using our algorithm, we identified four key user behavior patterns over time to evaluate our algorithms. …”
Get full text
Article -
166
A Grover Search-Based Quantum Key Agreement Protocol for Secure Internet of Medical Things Communication
Published 2025-06-01“…The scheme combines Grover’s algorithm with the decoy photon technique to ensure secure quantum transmission. …”
Get full text
Article -
167
Deep Learning Techniques for Early Fault Detection in Bearings: An Intelligent Approach
Published 2025-02-01“…Machine learning (ML) and deep learning (DL) algorithms have improved image processing, speech recognition, defect detection, item identification, and medical sciences. …”
Get full text
Article -
168
Selected Topics in Management and Modeling of Complex Systems: Editorial Introduction to Issue 16 of CSIMQ
Published 2018-10-01“…The range of topics ends with the discussion of specific algorithms that allow entity clustering for Big Data analysis. …”
Get full text
Article -
169
Integration of software-based cognitive approaches and brain-like computer machinery for efficient cognitive computing
Published 2025-06-01“…This transformation has enhanced the Internet's role in information dissemination, resource sharing, and global connectivity, allowing for more efficient distribution of knowledge and services. …”
Get full text
Article -
170
Efficacy and safety of an algorithm using C-reactive protein to guide antibiotic therapy applied through a digital clinical decision support system: a study protocol for a randomis...
Published 2025-01-01“…Strategies that use biomarkers to guide antimicrobial therapy—most notably Procalcitonin (PCT) and C-reactive protein (CRP)—show promise in safely reducing patient antibiotic exposure. While CRP is less studied, it offers advantages such as lower cost and broader availability compared with PCT.Methods and analysis This randomised clinical trial aims to evaluate a novel algorithm for non-critically ill adult patients. …”
Get full text
Article -
171
Digital twin enhanced agile design of ship pipeline systems [version 2; peer review: 1 approved, 3 approved with reservations]
Published 2025-01-01“…It predominantly relies on designers’ subjective experience, and it is marked by a lack of efficient knowledge sharing and the absence of smart pipe routing algorithms. …”
Get full text
Article -
172
Digital twin enhanced agile design of ship pipeline systems [version 1; peer review: 1 approved, 3 approved with reservations]
Published 2024-03-01“…It predominantly relies on designers’ subjective experience, and it is marked by a lack of efficient knowledge sharing and the absence of smart pipe routing algorithms. …”
Get full text
Article -
173
The ethics of data mining in healthcare: challenges, frameworks, and future directions
Published 2025-07-01“…Therefore, transparency must span three levels–dataset documentation, model interpretability, and post-deployment audit logging–to make algorithmic reasoning and failures traceable. Security vulnerabilities in the Internet of Medical Things (IoMT) and cloud-based health platforms amplify these risks, while corporate data-sharing deals complicate questions of data ownership and patient autonomy. …”
Get full text
Article -
174
Resource allocation mechanism in the TWDM-PON and C-RAN joint architecture with hybrid energy supply
Published 2018-09-01Get full text
Article -
175
HP_FLAP: homomorphic and polymorphic federated learning aggregation of parameters framework
Published 2025-06-01Get full text
Article -
176
-
177
A solution to the Single-School school bus routing problem considering accessibility and economy
Published 2025-07-01“…In the third stage, Dijkstra’s algorithm is combined with GIS to optimize the bus routes, with a focus on accessibility and economy.Experimental results demonstrate that the THGO method can efficiently find the global optimal solution while satisfying constraints such as time windows, bus capacity, and road directionality. …”
Get full text
Article -
178
Coordinated Optimal Dispatch of Distribution Grids and P2P Energy Trading Markets
Published 2025-05-01“…This study proposes a bi‐level optimization framework for distribution networks integrating peer‐to‐peer (P2P) energy trading and shared energy storage. The upper‐level model minimizes distribution system operator (DSO) operational costs, including network losses and storage management, while ensuring voltage stability. …”
Get full text
Article -
179
A Semi-Distributed Scheme for Mode Selection and Resource Allocation in Device-to-Device-Enabled Cellular Networks Using Matching Game and Reinforcement Learning
Published 2025-02-01“…Furthermore, we suggest that the sub-channel of the CU is shared among several D2D pairs, and the optimum power is determined for each D2D pair sharing the same sub-channel, taking into consideration all types of interferences in the network. …”
Get full text
Article -
180
Wireless Protocol-Based Control of Smart Electric Drive Using Sampled Time Secure Communication of Chaotic Systems
Published 2025-01-01“…To further enhance the control precision, a homogeneous super-twisting algorithm (HSTA)-based disturbance observer (DO) is introduced, effectively compensating for external perturbations and ensuring smooth operation. …”
Get full text
Article