Showing 1 - 20 results of 243 for search '(( ((algorithm link) OR (algorithm using)) function ) OR ( algorithm both function ))~', query time: 1.66s Refine Results
  1. 1

    Multi-scale detection of hierarchical community architecture in structural and functional brain networks by Arian Ashourvan (6685232)

    Published 2019
    “…To address this limitation, we exercise a multi-scale extension of a common community detection technique, and we apply the tool to synthetic graphs and to graphs derived from human neuroimaging data, including structural and functional imaging data. Our multi-scale community detection algorithm links a graph to copies of itself across neighboring topological scales, thereby becoming sensitive to conserved community organization across levels of the hierarchy. …”
  2. 2

    The Precision-Recall curve of both the models. by Aastha Vatsyayan (9981916)

    Published 2024
    “…</p><p>Results</p><p>Using an independent validation dataset of ACMG & AMP classified variants, as well as a patient set of functionally validated variants, we showed how both algorithms perform and can be used to classify large numbers of variants in clinical as well as research settings.…”
  3. 3
  4. 4
  5. 5
  6. 6

    Model hyperparameters used for the XGBoost model. by Aastha Vatsyayan (9981916)

    Published 2024
    “…</p><p>Results</p><p>Using an independent validation dataset of ACMG & AMP classified variants, as well as a patient set of functionally validated variants, we showed how both algorithms perform and can be used to classify large numbers of variants in clinical as well as research settings.…”
  7. 7

    Primers used in site-directed mutagenesis. by Aastha Vatsyayan (9981916)

    Published 2024
    “…</p><p>Results</p><p>Using an independent validation dataset of ACMG & AMP classified variants, as well as a patient set of functionally validated variants, we showed how both algorithms perform and can be used to classify large numbers of variants in clinical as well as research settings.…”
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Raw data of Cell experiments. by Jie Chu (293795)

    Published 2025
    “…The characteristics of the immune microenvironment were assessed using the CIBERSORT R package. Additionally, both the ssGSEA algorithm and the CIBERSORT algorithm were utilized to evaluate changes and effects in immunological characteristics during gastric cancer pathogenesis.…”
  15. 15

    GSEA analysis. by Jie Chu (293795)

    Published 2025
    “…The characteristics of the immune microenvironment were assessed using the CIBERSORT R package. Additionally, both the ssGSEA algorithm and the CIBERSORT algorithm were utilized to evaluate changes and effects in immunological characteristics during gastric cancer pathogenesis.…”
  16. 16

    Baseline data table. by Jie Chu (293795)

    Published 2025
    “…The characteristics of the immune microenvironment were assessed using the CIBERSORT R package. Additionally, both the ssGSEA algorithm and the CIBERSORT algorithm were utilized to evaluate changes and effects in immunological characteristics during gastric cancer pathogenesis.…”
  17. 17

    KEGG analysis. by Jie Chu (293795)

    Published 2025
    “…The characteristics of the immune microenvironment were assessed using the CIBERSORT R package. Additionally, both the ssGSEA algorithm and the CIBERSORT algorithm were utilized to evaluate changes and effects in immunological characteristics during gastric cancer pathogenesis.…”
  18. 18

    Analysis process. by Jie Chu (293795)

    Published 2025
    “…The characteristics of the immune microenvironment were assessed using the CIBERSORT R package. Additionally, both the ssGSEA algorithm and the CIBERSORT algorithm were utilized to evaluate changes and effects in immunological characteristics during gastric cancer pathogenesis.…”
  19. 19

    Flowchart depicting the optimal control framework. by Antoine Falisse (6061601)

    Published 2019
    “…The AD-Recorder approach combines operator overloading, when generating the expression graph, and source code transformation, when processing the expression graph to generate C-code for <i>F</i>, <i>F fwd</i>, and <i>F rev</i>. In both approaches, the code comprising <i>F</i>, <i>F fwd</i>, and <i>F rev</i> is compiled as a Dynamic-link Library (DLL), which is imported as an external function within the CasADi environment. …”
  20. 20