Search alternatives:
algorithm link » algorithms risk (Expand Search), algorithm i (Expand Search), algorithm ai (Expand Search)
algorithm both » algorithm blood (Expand Search), algorithm b (Expand Search), algorithm etc (Expand Search)
both function » body function (Expand Search), growth function (Expand Search), beach function (Expand Search)
algorithm link » algorithms risk (Expand Search), algorithm i (Expand Search), algorithm ai (Expand Search)
algorithm both » algorithm blood (Expand Search), algorithm b (Expand Search), algorithm etc (Expand Search)
both function » body function (Expand Search), growth function (Expand Search), beach function (Expand Search)
-
1
Multi-scale detection of hierarchical community architecture in structural and functional brain networks
Published 2019“…To address this limitation, we exercise a multi-scale extension of a common community detection technique, and we apply the tool to synthetic graphs and to graphs derived from human neuroimaging data, including structural and functional imaging data. Our multi-scale community detection algorithm links a graph to copies of itself across neighboring topological scales, thereby becoming sensitive to conserved community organization across levels of the hierarchy. …”
-
2
The Precision-Recall curve of both the models.
Published 2024“…</p><p>Results</p><p>Using an independent validation dataset of ACMG & AMP classified variants, as well as a patient set of functionally validated variants, we showed how both algorithms perform and can be used to classify large numbers of variants in clinical as well as research settings.…”
-
3
-
4
-
5
-
6
Model hyperparameters used for the XGBoost model.
Published 2024“…</p><p>Results</p><p>Using an independent validation dataset of ACMG & AMP classified variants, as well as a patient set of functionally validated variants, we showed how both algorithms perform and can be used to classify large numbers of variants in clinical as well as research settings.…”
-
7
Primers used in site-directed mutagenesis.
Published 2024“…</p><p>Results</p><p>Using an independent validation dataset of ACMG & AMP classified variants, as well as a patient set of functionally validated variants, we showed how both algorithms perform and can be used to classify large numbers of variants in clinical as well as research settings.…”
-
8
-
9
-
10
-
11
-
12
-
13
-
14
Raw data of Cell experiments.
Published 2025“…The characteristics of the immune microenvironment were assessed using the CIBERSORT R package. Additionally, both the ssGSEA algorithm and the CIBERSORT algorithm were utilized to evaluate changes and effects in immunological characteristics during gastric cancer pathogenesis.…”
-
15
GSEA analysis.
Published 2025“…The characteristics of the immune microenvironment were assessed using the CIBERSORT R package. Additionally, both the ssGSEA algorithm and the CIBERSORT algorithm were utilized to evaluate changes and effects in immunological characteristics during gastric cancer pathogenesis.…”
-
16
Baseline data table.
Published 2025“…The characteristics of the immune microenvironment were assessed using the CIBERSORT R package. Additionally, both the ssGSEA algorithm and the CIBERSORT algorithm were utilized to evaluate changes and effects in immunological characteristics during gastric cancer pathogenesis.…”
-
17
KEGG analysis.
Published 2025“…The characteristics of the immune microenvironment were assessed using the CIBERSORT R package. Additionally, both the ssGSEA algorithm and the CIBERSORT algorithm were utilized to evaluate changes and effects in immunological characteristics during gastric cancer pathogenesis.…”
-
18
Analysis process.
Published 2025“…The characteristics of the immune microenvironment were assessed using the CIBERSORT R package. Additionally, both the ssGSEA algorithm and the CIBERSORT algorithm were utilized to evaluate changes and effects in immunological characteristics during gastric cancer pathogenesis.…”
-
19
Flowchart depicting the optimal control framework.
Published 2019“…The AD-Recorder approach combines operator overloading, when generating the expression graph, and source code transformation, when processing the expression graph to generate C-code for <i>F</i>, <i>F fwd</i>, and <i>F rev</i>. In both approaches, the code comprising <i>F</i>, <i>F fwd</i>, and <i>F rev</i> is compiled as a Dynamic-link Library (DLL), which is imported as an external function within the CasADi environment. …”
-
20