Search alternatives:
selection algorithm » detection algorithms (Expand Search), prediction algorithms (Expand Search)
selection algorithm » detection algorithms (Expand Search), prediction algorithms (Expand Search)
-
1
-
2
-
3
CorrEA: A Web Server for Optimizing Correlations between Calculated Energies and Activities in Ligand–Receptor Systems Considering Multiple Binding Site Conformations
Published 2025“…CorrEA performs a genetic algorithm (GA) selection to extract a representative complex for each ligand that better adjusts the global correlation between calculated docking energy values and experimental logarithmic biological activities. …”
-
4
PI3K-Seeker: A Machine Learning-Powered Web Tool to Discover PI3K Inhibitors
Published 2025“…In this study, we developed PI3K-Seeker, a web server based on a two-stage prediction process to find new PI3K inhibitors. …”
-
5
PI3K-Seeker: A Machine Learning-Powered Web Tool to Discover PI3K Inhibitors
Published 2025“…In this study, we developed PI3K-Seeker, a web server based on a two-stage prediction process to find new PI3K inhibitors. …”
-
6
PI3K-Seeker: A Machine Learning-Powered Web Tool to Discover PI3K Inhibitors
Published 2025“…In this study, we developed PI3K-Seeker, a web server based on a two-stage prediction process to find new PI3K inhibitors. …”
-
7
-
8
Comparison with existing work.
Published 2025“…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
-
9
Registration phase.
Published 2025“…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
-
10
Performance comparison of different ML models.
Published 2025“…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
-
11
Classification Report for the proposed model.
Published 2025“…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
-
12
ROC curve of the proposed model.
Published 2025“…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
-
13
Fog-IoT architecture.
Published 2025“…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
-
14
Computational cost of the proposed approach.
Published 2025“…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
-
15
Confusion Matrix of different ML models.
Published 2025“…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
-
16
Performance metrics of applied ML models.
Published 2025“…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
-
17
Archive containing manufacturing files.
Published 2025“…<div><p>In this paper we propose the Hatching-Box, a novel in situ imaging and analysis system to automatically monitor and quantify the developmental behavior of <i>Drosophila melanogaster</i> in standard rearing vials and during regular rearing routines, reducing the need for explicit experiments.This is achieved by combining custom tailored imaging hardware with dedicated detection and tracking algorithms, enabling the quantification of larvae, filled/empty pupae and flies over multiple days. …”
-
18
Landscape Change Monitoring System (LCMS) Puerto Rico USVI Annual QA Bits
Published 2025“…</p><p>Predictor layers for the LCMS model include outputs from the LandTrendr and CCDC change detection algorithms and terrain information. These components are all accessed and processed using Google Earth Engine (Gorelick et al., 2017). …”
-
19
Landscape Change Monitoring System (LCMS) Hawaii Annual Landcover
Published 2025“…</p><p>Predictor layers for the LCMS model include outputs from the LandTrendr and CCDC change detection algorithms and terrain information. These components are all accessed and processed using Google Earth Engine (Gorelick et al., 2017). …”
-
20
Landscape Change Monitoring System (LCMS) Alaska Most Recent Year of Gain (Image Service)
Published 2025“…</p><p>Predictor layers for the LCMS model include outputs from the LandTrendr and CCDC change detection algorithms and terrain information. These components are all accessed and processed using Google Earth Engine (Gorelick et al., 2017). …”