-
741
Early Prediction of Stroke Risk Using Machine Learning Approaches and Imbalanced Data
Published 2025-03-01“… Classifying medical datasets using machine learning algorithms could help physicians to provide accurate diagnosing and suitable treatment. …”
Get full text
Article -
742
-
743
Diagnostic criteria for spinal muscular atrophy 5q
Published 2021-12-01“…The variety of phenotypic manifestations of spinal muscular atrophy 5q (5qCMA) is the reason for the difficulty in diagnosing and delaying the diagnosis, which is of particular importance today due to the emergence of new etiopathogenetic therapeutic possibilities.Objective: determination of the main clinical features and symptoms of 5qCMA with onset at different age periods, and the development of an algorithm that can help in making decisions regarding the need for testing the SMN1 gene by primary care and hospital doctors.Materials and methods. …”
Get full text
Article -
744
-
745
In situ nondestructive identification of citrus fruit ripeness via hyperspectral imaging technology
Published 2025-06-01Get full text
Article -
746
Releasing the octoPus, an open-source digital tool to promote Integrated Pest Management
Published 2025-08-01“…Simulated infections served as predictors in a Random Forest algorithm (''brain'') to compute an overall risk level. …”
Get full text
Article -
747
-
748
Assessment of pulmonary embolism probability using a machine learning model
Published 2024-05-01Get full text
Article -
749
Reinforcement Learning-Based Control for Robotic Flexible Element Disassembly
Published 2025-03-01Get full text
Article -
750
Dual-timescale hierarchical MADDPG for Multi-UAV cooperative search
Published 2025-07-01Get full text
Article -
751
-
752
-
753
-
754
SA3C-ID: a novel network intrusion detection model using feature selection and adversarial training
Published 2025-07-01“…Next, the network intrusion detection process is modeled as a Markov decision process and integrated with the Soft Actor-Critic (SAC) reinforcement learning algorithm, with a view to constructing agents; In the context of adversarial training, two agents, designated as the attacker and the defender, are defined to perform asynchronous adversarial training. …”
Get full text
Article -
755
Preoperative MRI-based radiomics analysis of intra- and peritumoral regions for predicting CD3 expression in early cervical cancer
Published 2025-07-01“…Radiomics analysis selected 18 features from ROItumor and ROI3mm across MRI sequences. The SVM algorithm achieved the highest predictive performance for CD3 T-cell expression status, with an area under the curve (AUC) of 0.93 in the training group and 0.92 in the test group. …”
Get full text
Article -
756
Simplified Novel Approach for Accurate Employee Churn Categorization using MCDM, De-Pareto Principle Approach, and Machine Learning
Published 2024-02-01“…The Random Forest ML algorithm in SNEC scheme has similar or slightly better overall accuracy and MCC with significant less time complexity compared with that of ECPR scheme using CATBOOST algorithm. …”
Get full text
Article -
757
Spatial Differentiation Mechanism of Urban Housing Prices from the Perspective of Amenity: A Case Study of Nanjing
Published 2025-05-01“…An evaluation indicator system of human environment quality was established under the amenity connotation based on three dimensions of natural amenity, artificial amenity and social atmosphere amenity, and the Gradient Boosting Decision Tree (GBDT) algorithm was applied to investigate the impact of different amenity factors on housing prices. …”
Get full text
Article -
758
-
759
-
760