Search alternatives:
extraction algorithm » detection algorithm (Expand Search), encryption algorithm (Expand Search), detection algorithms (Expand Search)
codon optimization » wolf optimization (Expand Search)
source extraction » resource extraction (Expand Search), soxhlet extraction (Expand Search), source estimation (Expand Search)
binary scale » binary image (Expand Search)
binary data » primary data (Expand Search), dietary data (Expand Search)
data source » data sources (Expand Search)
scale codon » scale carbon (Expand Search), scale column (Expand Search)
extraction algorithm » detection algorithm (Expand Search), encryption algorithm (Expand Search), detection algorithms (Expand Search)
codon optimization » wolf optimization (Expand Search)
source extraction » resource extraction (Expand Search), soxhlet extraction (Expand Search), source estimation (Expand Search)
binary scale » binary image (Expand Search)
binary data » primary data (Expand Search), dietary data (Expand Search)
data source » data sources (Expand Search)
scale codon » scale carbon (Expand Search), scale column (Expand Search)
-
1
-
2
-
3
LScD (Leicester Scientific Dictionary)
Published 2020“…To access the LSC for research purposes, please email to ns433@le.ac.uk. The data are extracted from Web of Science [3]. You may not copy or distribute these data in whole or in part without the written consent of Clarivate Analytics.…”
-
4
-
5
-
6
PathOlOgics_RBCs Python Scripts.zip
Published 2023“…</p><p dir="ltr">In terms of classification, a second algorithm was developed and employed to preliminary sort or group the individual cells (after excluding the overlapping cells manually) into different categories using five geometric measurements applied to the extracted contour from each binary image mask (see PathOlOgics_script_2; preliminary shape measurements). …”
-
7
Development of a Battery of <i>In Silico</i> Prediction Tools for Drug-Induced Liver Injury from the Vantage Point of Translational Safety Assessment
Published 2020“…A human DILI training set of 305 oral marketed drugs was prepared and a binary classification scheme applied. The second knowledge base consists of mammalian repeated dose toxicity with liver toxicity data from various regulatory sources. …”
-
8
DataSheet_1_Automated detection and detection range of primate duets: a case study of the red titi monkey (Plecturocebus discolor) using passive acoustic monitoring.pdf
Published 2023“…We also used a supervised template-based detection algorithm (binary point matching) to evaluate the efficacy of automated detection for titi duets in audio recordings using linear arrays of ARUs within a ~2 km<sup>2</sup> area. …”
-
9
Table_2_Automated detection and detection range of primate duets: a case study of the red titi monkey (Plecturocebus discolor) using passive acoustic monitoring.pdf
Published 2023“…We also used a supervised template-based detection algorithm (binary point matching) to evaluate the efficacy of automated detection for titi duets in audio recordings using linear arrays of ARUs within a ~2 km<sup>2</sup> area. …”
-
10
Table_3_Automated detection and detection range of primate duets: a case study of the red titi monkey (Plecturocebus discolor) using passive acoustic monitoring.pdf
Published 2023“…We also used a supervised template-based detection algorithm (binary point matching) to evaluate the efficacy of automated detection for titi duets in audio recordings using linear arrays of ARUs within a ~2 km<sup>2</sup> area. …”
-
11
Table_1_Automated detection and detection range of primate duets: a case study of the red titi monkey (Plecturocebus discolor) using passive acoustic monitoring.pdf
Published 2023“…We also used a supervised template-based detection algorithm (binary point matching) to evaluate the efficacy of automated detection for titi duets in audio recordings using linear arrays of ARUs within a ~2 km<sup>2</sup> area. …”
-
12
Machine Learning-Ready Dataset for Cytotoxicity Prediction of Metal Oxide Nanoparticles
Published 2025“…Details on the data sourcing process, prompt engineering strategies for large language model (LLM)-based extraction, and validation protocols are provided in the Supplementary Information section.…”