Search alternatives:
process classification » protein classification (Expand Search), proposed classification (Expand Search), forest classification (Expand Search)
based optimization » whale optimization (Expand Search)
library based » laboratory based (Expand Search)
based process » based processes (Expand Search), based probes (Expand Search), based proteins (Expand Search)
binary 2 » binary _ (Expand Search), binary b (Expand Search)
2 based » _ based (Expand Search), 1 based (Expand Search), ai based (Expand Search)
process classification » protein classification (Expand Search), proposed classification (Expand Search), forest classification (Expand Search)
based optimization » whale optimization (Expand Search)
library based » laboratory based (Expand Search)
based process » based processes (Expand Search), based probes (Expand Search), based proteins (Expand Search)
binary 2 » binary _ (Expand Search), binary b (Expand Search)
2 based » _ based (Expand Search), 1 based (Expand Search), ai based (Expand Search)
-
121
Active Learning Accelerated Discovery of Stable Iridium Oxide Polymorphs for the Oxygen Evolution Reaction
Published 2020“…Herein, we report a readily generalizable active-learning (AL) accelerated algorithm for identification of electrochemically stable iridium oxide polymorphs of IrO<sub>2</sub> and IrO<sub>3</sub>. …”
-
122
An Ecological Benchmark of Photo Editing Software: A Comparative Analysis of Local vs. Cloud Workflows
Published 2025“…Experimental Methodology Framework Local Processing Pipeline Architecture Data Flow: Storage I/O → Memory Buffer → CPU/GPU Processing → Cache Coherency → Storage I/O ├── Input Vector: mmap() system call for zero-copy file access ├── Processing Engine: OpenMP parallelization with NUMA-aware thread affinity ├── Memory Management: Custom allocator with hugepage backing └── Output Vector: Direct I/O bypassing kernel page cache Cloud Processing Pipeline Architecture Data Flow: Local Storage → Network Stack → TLS Tunnel → CDN Edge → Origin Server → Processing Grid → Response Pipeline ├── Upload Phase: TCP window scaling with congestion control algorithms ├── Network Layer: Application-layer protocol with adaptive bitrate streaming ├── Server-side Processing: Containerized microservices on Kubernetes orchestration ├── Load Balancing: Consistent hashing with geographic affinity routing └── Download Phase: HTTP/2 multiplexing with server push optimization Dataset Schema and Semantic Structure Primary Data Vectors Field Data Type Semantic Meaning Measurement Unit test_type Categorical Processing paradigm identifier {local_processing, cloud_processing} photo_count Integer Cardinality of input asset vector Count avg_file_size_mb Float64 Mean per-asset storage footprint Mebibytes (2^20 bytes) total_volume_gb Float64 Aggregate data corpus size Gigabytes (10^9 bytes) processing_time_sec Integer Wall-clock execution duration Seconds (SI base unit) cpu_usage_watts Float64 Thermal design power consumption Watts (Joules/second) ram_usage_mb Integer Peak resident set size Mebibytes network_upload_mb Float64 Egress bandwidth utilization Mebibytes energy_consumption_kwh Float64 Cumulative energy expenditure Kilowatt-hours co2_equivalent_g Float64 Carbon footprint estimation Grams CO₂e test_date ISO8601 Temporal execution marker RFC 3339 format hardware_config String Node topology identifier Alphanumeric encoding Statistical Distribution Characteristics The dataset exhibits non-parametric distribution patterns with significant heteroscedasticity across computational load vectors. …”
-
123
Sample image for illustration.
Published 2024“…The computation time for CBFD is 2.8 ms, which is at least 6.7% lower than that of other algorithms. …”
-
124
Comparison analysis of computation time.
Published 2024“…The computation time for CBFD is 2.8 ms, which is at least 6.7% lower than that of other algorithms. …”
-
125
Process flow diagram of CBFD.
Published 2024“…The computation time for CBFD is 2.8 ms, which is at least 6.7% lower than that of other algorithms. …”
-
126
Precision recall curve.
Published 2024“…The computation time for CBFD is 2.8 ms, which is at least 6.7% lower than that of other algorithms. …”
-
127
Table_1_iRNA5hmC: The First Predictor to Identify RNA 5-Hydroxymethylcytosine Modifications Using Machine Learning.docx
Published 2020“…In this predictor, we introduced a sequence-based feature algorithm consisting of two feature representations, (1) k-mer spectrum and (2) positional nucleotide binary vector, to capture the sequential characteristics of 5hmC sites. …”
-
128
DataSheet_1_Near infrared spectroscopy for cooking time classification of cassava genotypes.docx
Published 2024“…The accuracy of the optimal scenario for classifying samples with a cooking time of 30 minutes reached RCal2 = 0.86 and RVal2 = 0.84, with a Kappa value of 0.53. …”
-
129
Table_1_Near infrared spectroscopy for cooking time classification of cassava genotypes.docx
Published 2024“…The accuracy of the optimal scenario for classifying samples with a cooking time of 30 minutes reached RCal2 = 0.86 and RVal2 = 0.84, with a Kappa value of 0.53. …”
-
130
DataSheet_1_Exploring deep learning radiomics for classifying osteoporotic vertebral fractures in X-ray images.docx
Published 2024“…The OVFs were categorized as class 0, 1, or 2 based on the Assessment System of Thoracolumbar Osteoporotic Fracture. …”
-
131
Seed mix selection model
Published 2022“…</p> <p> </p> <p>We applied the seed mix selection model using a binary genetic algorithm to select seed mixes (R package ‘GA’; Scrucca 2013; Scrucca 2017). …”
-
132
Table_6_Identification of Key Genes With Differential Correlations in Lung Adenocarcinoma.XLS
Published 2021“…</p>Conclusion<p>Our study provided new insights into the gene regulatory mechanisms during transition from normal to tumor, pioneering a network-based algorithm in the application of tumor etiology.…”
-
133
Table_4_Identification of Key Genes With Differential Correlations in Lung Adenocarcinoma.XLS
Published 2021“…</p>Conclusion<p>Our study provided new insights into the gene regulatory mechanisms during transition from normal to tumor, pioneering a network-based algorithm in the application of tumor etiology.…”
-
134
Table_3_Identification of Key Genes With Differential Correlations in Lung Adenocarcinoma.XLSX
Published 2021“…</p>Conclusion<p>Our study provided new insights into the gene regulatory mechanisms during transition from normal to tumor, pioneering a network-based algorithm in the application of tumor etiology.…”
-
135
Image_1_Identification of Key Genes With Differential Correlations in Lung Adenocarcinoma.TIF
Published 2021“…</p>Conclusion<p>Our study provided new insights into the gene regulatory mechanisms during transition from normal to tumor, pioneering a network-based algorithm in the application of tumor etiology.…”
-
136
Table_1_Identification of Key Genes With Differential Correlations in Lung Adenocarcinoma.XLS
Published 2021“…</p>Conclusion<p>Our study provided new insights into the gene regulatory mechanisms during transition from normal to tumor, pioneering a network-based algorithm in the application of tumor etiology.…”
-
137
Table_5_Identification of Key Genes With Differential Correlations in Lung Adenocarcinoma.XLS
Published 2021“…</p>Conclusion<p>Our study provided new insights into the gene regulatory mechanisms during transition from normal to tumor, pioneering a network-based algorithm in the application of tumor etiology.…”
-
138
Image_2_Identification of Key Genes With Differential Correlations in Lung Adenocarcinoma.TIF
Published 2021“…</p>Conclusion<p>Our study provided new insights into the gene regulatory mechanisms during transition from normal to tumor, pioneering a network-based algorithm in the application of tumor etiology.…”
-
139
Table_2_Identification of Key Genes With Differential Correlations in Lung Adenocarcinoma.XLS
Published 2021“…</p>Conclusion<p>Our study provided new insights into the gene regulatory mechanisms during transition from normal to tumor, pioneering a network-based algorithm in the application of tumor etiology.…”
-
140
Machine Learning-Ready Dataset for Cytotoxicity Prediction of Metal Oxide Nanoparticles
Published 2025“…</p><p dir="ltr">These biological metrics were used to define a binary toxicity label: entries were classified as toxic (1) or non-toxic (0) based on thresholds from standardized guidelines (e.g., ISO 10993-5:2009) and literature consensus. …”