-
1941
-
1942
Artificial intelligence in primary aldosteronism: current achievements and future challenges
Published 2025-08-01Get full text
Article -
1943
CRYPTO-RESISTANT METHODS AND RANDOM NUMBER GENERATORS IN INTERNET OF THINGS (IOT) DEVICES
Published 2022-06-01“…The analysis of technologies and circuit solutions allowed to draw the following conclusions: protection of IoT solutions includes: security of IoT network nodes and their connection to the cloud using secure protocols, ensuring confidentiality, authenticity and integrity of IoT data by cryptographic methods, attack analysis and network cryptographic stability; the initial basis for the protection of IoT solutions is the true randomness of the formed RNG sequences and used in algorithms for cryptographic transformation of information to protect it; feature of IoT devices is their heterogeneity and geographical distribution, limited computing resources and power supply, small size; The most effective (reduce power consumption and increase the generation rate) for use in IoT devices are RNG exclusively on a digital basis, which implements a three-stage process: the initial digital circuit, normalizer and random number flow generator; Autonomous Boolean networks (ABN) allow to create RNG with unique characteristics: the received numbers are really random, high speed – the number can be received in one measure, the minimum power consumption, miniature, high (up to 3 GHz) throughput of Boolean chaos; a promising area of ABN development is the use of optical logic valves for the construction of optical ABN with a bandwidth of up to 14 GHz; the classification of known classes of RNG attacks includes: direct cryptanalytic attacks, attacks based on input data, attacks based on the disclosure of the internal state of RNG, correlation attacks and special attacks; statistical test packages to evaluate RNG sequences have some limitations or shortcomings and do not replace cryptanalysis; Comparison of cryptoaccelerators with cryptographic transformation software shows their significant advantages: for AES block encryption algorithm, speeds increase by 10-20 times in 8/16-bit cryptoaccelerators and 150 times in 32-bit, growth hashing of SHA-256 in 32-bit cryptoaccelerators more than 100 times, and for the NMAS algorithm - up to 500 times. …”
Get full text
Article -
1944
-
1945
-
1946
-
1947
Machine learning modeling for the risk of acute kidney injury in inpatients receiving amikacin and etimicin
Published 2025-05-01Get full text
Article -
1948
-
1949
Multi video stream collaborative adaptive offloading scheme based on equilibrium game theory
Published 2025-08-01Get full text
Article -
1950
The association between cystatin C and hypertension risk in diabetes patients: A multi-cohort cross-sectional study
Published 2025-07-01“…Analyzing 5210 DM patients from three cohorts, this study identified serum cystatin C (CysC) as an independent risk factor for DM + HTN through univariate and multivariate logistic regression. …”
Get full text
Article -
1951
-
1952
Machine learning as a tool for diagnostic and prognostic research in coronary artery disease
Published 2020-12-01Get full text
Article -
1953
GIS Analysis Model Integration and Service Composition Prospects
Published 2025-07-01Get full text
Article -
1954
-
1955
Novel nocturnal insect pest monitoring for sustainable crop protection using ensemble augmented deep learning classification
Published 2025-12-01“…The proposed framework strategically integrates a lightweight network model with adaptive ensemble augmentation mechanisms to comprehensively address three core data challenges: (1) chromatic variance under varying illumination conditions, (2) partial occlusion from pest aggregation, and (3) morphological deformation during specimen collection. …”
Get full text
Article -
1956
Oral contrast-enhanced ultrasonographic features and radiomics analysis to predict NIH risk stratification for gastrointestinal stromal tumors
Published 2025-07-01“…The patient dataset was randomly divided into a training set and a validation set at a ratio of 7:3. Leveraging the XGBoost (XGB) algorithm within the Scikit-learn (Sklearn) machine-learning library, three distinct predictive models were developed: a clinical ultrasound imaging model (US model), an ultrasonographic radiomics model (US radiomics model), and a combined model integrating both clinical, ultrasound, and radiomics features. …”
Get full text
Article -
1957
Enhanced cardiovascular risk prediction in the Western Pacific: A machine learning approach tailored to the Malaysian population.
Published 2025-01-01“…Ensemble model were also created using three commonly used meta learners, including RF, Generalized Linear Model (GLM), and Gradient Boosting Model (GBM). …”
Get full text
Article -
1958
A manganese metabolism-related gene signature stratifies prognosis and immunotherapy efficacy in kidney cancer
Published 2025-07-01“…Through integrated bioinformatics approaches, including differential expression analysis, univariate Cox regression, and three machine learning algorithms (Boruta, GBM, and RFS), we identified prognosis-related MMCG. …”
Get full text
Article -
1959
Artificial Intelligence-Based Prediction of Bloodstream Infections Using Standard Hematological and Biochemical Markers
Published 2025-08-01“…Basophil count, while ranked highest by SHAP, showed low sensitivity, highlighting the difference between algorithmic weight and bedside utility. Conclusion: These findings support the integration of routine, readily available laboratory data into an explainable AI framework to accurately predict culture positivity. …”
Get full text
Article -
1960
A recurrence model for non-puerperal mastitis patients based on machine learning.
Published 2025-01-01“…<h4>Results</h4>The logistic regression model emerged as the optimal model for predicting recurrence of NPM with machine learning, primarily utilizing three variables: FIB, bacterial infection, and CD4+ T cell count. …”
Get full text
Article