Search alternatives:
algorithm python » algorithm within (Expand Search), algorithms within (Expand Search), algorithm both (Expand Search)
python function » protein function (Expand Search)
algorithm beach » algorithm etc (Expand Search), algorithm which (Expand Search), algorithm both (Expand Search)
algorithm from » algorithm flow (Expand Search)
beach function » brain function (Expand Search), heart function (Expand Search)
from function » from functional (Expand Search), fc function (Expand Search)
algorithm python » algorithm within (Expand Search), algorithms within (Expand Search), algorithm both (Expand Search)
python function » protein function (Expand Search)
algorithm beach » algorithm etc (Expand Search), algorithm which (Expand Search), algorithm both (Expand Search)
algorithm from » algorithm flow (Expand Search)
beach function » brain function (Expand Search), heart function (Expand Search)
from function » from functional (Expand Search), fc function (Expand Search)
-
761
-
762
-
763
Table 1_Compatibility optimization of the traditional Chinese medicines ‘Eczema mixture’ based on back-propagation artificial neural network and non-dominated sorting genetic algor...
Published 2025“…The 6-n-2 three-layers of back-propagation artificial neural network (BP-ANN) was employed to model the two defined objective functions. With the predictive models, the Pareto front was determined by a variant of non-dominated sorting genetic algorithm II(VNSGAII) to provide the optimal prescription set.…”
-
764
Graphical summary of results in this study.
Published 2025“…Podocyte heterogeneity and functional differences in DKD were observed. Multiple machine-learning algorithms were used to screen and construct diagnostic models to identify hub differentially expressed podocyte marker genes (DE-podos), revealing ARHGEF26 as a significantly downregulated marker in DKD. …”
-
765
The brief description on the WTCCC dataset.
Published 2024“…Epi-SSA draws inspiration from the sparrow search algorithm and optimizes the population based on multiple objective functions in each iteration, in order to be able to more precisely identify epistatic interactions.…”
-
766
The penetrance tables for the 8 DNME models.
Published 2024“…Epi-SSA draws inspiration from the sparrow search algorithm and optimizes the population based on multiple objective functions in each iteration, in order to be able to more precisely identify epistatic interactions.…”
-
767
The penetrance tables for the 8 DME models.
Published 2024“…Epi-SSA draws inspiration from the sparrow search algorithm and optimizes the population based on multiple objective functions in each iteration, in order to be able to more precisely identify epistatic interactions.…”
-
768
The penetrance tables for the 6 DNME3 models.
Published 2024“…Epi-SSA draws inspiration from the sparrow search algorithm and optimizes the population based on multiple objective functions in each iteration, in order to be able to more precisely identify epistatic interactions.…”
-
769
-
770
-
771
Data Sheet 1_Simplified two-compartment neuron with calcium dynamics capturing brain-state specific apical-amplification, -isolation and -drive.pdf
Published 2025“…A machine learning evolutionary algorithm, guided by a set of fitness functions, selected parameters defining neurons that express the desired apical dendritic mechanisms. …”
-
772
-
773
-
774
-
775
<b>A Multi-Pathology Ballistocardiogram Dataset for Cardiac Function Monitoring and Arrhythmia Assessment</b>
Published 2025“…Denoised BCG signal (Column 3), derived using the Enhanced Singular Value Thresholding (ESVT) algorithm.</p><p dir="ltr"><b>5 Signal visualization</b></p><p dir="ltr">(1) File name: signal.pdf</p><p dir="ltr">(2) Content: A graphical representation of the signals from signal.csv. …”
-
776
-
777
-
778
Fuzzy weight.
Published 2024“…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
-
779
Block diagram of lattice-based cryptography.
Published 2024“…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
-
780
Weight of the quantum techniques.
Published 2024“…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”