Zeitschriftenartikel zum Thema „MIIC algorithm“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "MIIC algorithm" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Weyerer, Veronika, Pamela L. Strissel, Reiner Strick, Danijel Sikic, Carol I. Geppert, Simone Bertz, Fabienne Lange et al. „Integration of Spatial PD-L1 Expression with the Tumor Immune Microenvironment Outperforms Standard PD-L1 Scoring in Outcome Prediction of Urothelial Cancer Patients“. Cancers 13, Nr. 10 (12.05.2021): 2327. http://dx.doi.org/10.3390/cancers13102327.
Der volle Inhalt der QuelleTinnathi, Sreenivasu, und G. Sudhavani. „Copy-Move Forgery Detection Using Superpixel Clustering Algorithm and Enhanced GWO Based AlexNet Model“. Cybernetics and Information Technologies 22, Nr. 4 (01.11.2022): 91–110. http://dx.doi.org/10.2478/cait-2022-0041.
Der volle Inhalt der QuellePourkashani, Ava, Asadollah Shahbahrami und Alireza Akoushideh. „Copy-move forgery detection using convolutional neural network and K-mean clustering“. International Journal of Electrical and Computer Engineering (IJECE) 11, Nr. 3 (01.06.2021): 2604. http://dx.doi.org/10.11591/ijece.v11i3.pp2604-2612.
Der volle Inhalt der QuelleZheng, Qingyuan, Zhengyu Jiang, Xinmiao Ni, Song Yang, Panpan Jiao, Jiejun Wu, Lin Xiong et al. „Machine Learning Quantified Tumor-Stroma Ratio Is an Independent Prognosticator in Muscle-Invasive Bladder Cancer“. International Journal of Molecular Sciences 24, Nr. 3 (01.02.2023): 2746. http://dx.doi.org/10.3390/ijms24032746.
Der volle Inhalt der QuelleYe, Qing, Ruochen Wang, Chi Zhang und Yingfeng Cai. „Research on Intelligent Vehicle Path Tracking with Subsystems Based on Multimodel Intelligent Hierarchical Control Theory“. Mathematical Problems in Engineering 2021 (09.06.2021): 1–15. http://dx.doi.org/10.1155/2021/7448517.
Der volle Inhalt der QuelleAmiri, Ehsan, Ahmad Mosallanejad und Amir Sheikhahmadi. „Copy-Move Forgery Detection Using an Equilibrium Optimization Algorithm (CMFDEOA)“. Statistics, Optimization & Information Computing 11, Nr. 3 (20.04.2023): 677–84. http://dx.doi.org/10.19139/soic-2310-5070-1511.
Der volle Inhalt der QuelleElaskily, Mohamed A., Monagi H. Alkinani, Ahmed Sedik und Mohamed M. Dessouky. „Deep learning based algorithm (ConvLSTM) for Copy Move Forgery Detection“. Journal of Intelligent & Fuzzy Systems 40, Nr. 3 (02.03.2021): 4385–405. http://dx.doi.org/10.3233/jifs-201192.
Der volle Inhalt der QuelleRajamani, Sripriya, Aaron Bieringer, Stephanie Wallerius, Daniel Jensen, Tamara Winden und Miriam Halstead Muscoplat. „Direct and Electronic Health Record Access to the Clinical Decision Support for Immunizations in the Minnesota Immunization Information System“. Biomedical Informatics Insights 8s2 (Januar 2016): BII.S40208. http://dx.doi.org/10.4137/bii.s40208.
Der volle Inhalt der QuelleLi, Qianmu, Shunmei Meng, Xiaonan Sang, Hanrui Zhang, Shoujin Wang, Ali Kashif Bashir, Keping Yu und Usman Tariq. „Dynamic Scheduling Algorithm in Cyber Mimic Defense Architecture of Volunteer Computing“. ACM Transactions on Internet Technology 21, Nr. 3 (09.06.2021): 1–33. http://dx.doi.org/10.1145/3408291.
Der volle Inhalt der QuelleJue Fu, Ying Zhang,. „Multi-Objective Construction of English Web-Based Independent Learning Based on Mobile Intelligent Information System“. Journal of Electrical Systems 20, Nr. 3s (04.04.2024): 574–86. http://dx.doi.org/10.52783/jes.1332.
Der volle Inhalt der QuelleVy, Vu Pham Thao, Melissa Min-Szu Yao, Nguyen Quoc Khanh Le und Wing P. Chan. „Machine Learning Algorithm for Distinguishing Ductal Carcinoma In Situ from Invasive Breast Cancer“. Cancers 14, Nr. 10 (15.05.2022): 2437. http://dx.doi.org/10.3390/cancers14102437.
Der volle Inhalt der QuelleLuo, Yan, Zi-Ting Huang, Hui-wen Xu, zi-shuo Chen, He-Xuan Su, Hui Liu und Beibei Xu. „Development and validation of multimorbidity index predicting mortality among Chinese older adults“. Innovation in Aging 5, Supplement_1 (01.12.2021): 606. http://dx.doi.org/10.1093/geroni/igab046.2324.
Der volle Inhalt der QuelleSetubal, João C., Marcelo Reis, James Matsunaga und David A. Haake. „Lipoprotein computational prediction in spirochaetal genomes“. Microbiology 152, Nr. 1 (01.01.2006): 113–21. http://dx.doi.org/10.1099/mic.0.28317-0.
Der volle Inhalt der QuelleРечкалов, Т. В., und М. Л. Цымблер. „A parallel data clustering algorithm for Intel MIC accelerators“. Numerical Methods and Programming (Vychislitel'nye Metody i Programmirovanie), Nr. 2 (28.03.2019): 104–15. http://dx.doi.org/10.26089/nummet.v20r211.
Der volle Inhalt der QuelleGu, Mile. „A classical algorithm to mimic quantum decisions“. National Science Review 6, Nr. 4 (01.07.2019): 608–9. http://dx.doi.org/10.1093/nsr/nwz081.
Der volle Inhalt der QuelleBalochian, Saeed, und Hossein Baloochian. „Social mimic optimization algorithm and engineering applications“. Expert Systems with Applications 134 (November 2019): 178–91. http://dx.doi.org/10.1016/j.eswa.2019.05.035.
Der volle Inhalt der QuelleFeng, Yueyi, Qingting Feng, Lingkai Xu, Yiqing Jiang, Fang Meng und Xiaochen Shu. „A Novel Biomarker Based on miRNA to Predict the Prognosis of Muscle-Invasive Bladder Urothelial Carcinoma“. Journal of Oncology 2019 (06.12.2019): 1–11. http://dx.doi.org/10.1155/2019/2654296.
Der volle Inhalt der QuelleLeversen, Nils Anders, Gustavo A. de Souza, Hiwa Målen, Swati Prasad, Inge Jonassen und Harald G. Wiker. „Evaluation of signal peptide prediction algorithms for identification of mycobacterial signal peptides using sequence data from proteomic methods“. Microbiology 155, Nr. 7 (01.07.2009): 2375–83. http://dx.doi.org/10.1099/mic.0.025270-0.
Der volle Inhalt der QuelleSteiner, Matthias Johann. „Solving Degree Bounds for Iterated Polynomial Systems“. IACR Transactions on Symmetric Cryptology 2024, Nr. 1 (01.03.2024): 357–411. http://dx.doi.org/10.46586/tosc.v2024.i1.357-411.
Der volle Inhalt der QuelleZhang, Wen-Li, Kun Yang, Yi-Tao Xin und Ting-Song Zhao. „Multi-Object Tracking Algorithm for RGB-D Images Based on Asymmetric Dual Siamese Networks“. Sensors 20, Nr. 23 (25.11.2020): 6745. http://dx.doi.org/10.3390/s20236745.
Der volle Inhalt der QuelleGui, Zhiming, Xiaoling Ying und Chunxiao Liu. „NXPH4 Used as a New Prognostic and Immunotherapeutic Marker for Muscle-Invasive Bladder Cancer“. Journal of Oncology 2022 (04.10.2022): 1–21. http://dx.doi.org/10.1155/2022/4271409.
Der volle Inhalt der QuelleZheng, Qingyuan, Rui Yang, Xinmiao Ni, Song Yang, Panpan Jiao, Jiejun Wu, Lin Xiong et al. „Quantitative Assessment of Tumor-Infiltrating Lymphocytes Using Machine Learning Predicts Survival in Muscle-Invasive Bladder Cancer“. Journal of Clinical Medicine 11, Nr. 23 (29.11.2022): 7081. http://dx.doi.org/10.3390/jcm11237081.
Der volle Inhalt der QuelleDoneda, Danilo, und Virgilio A. F. Almeida. „What Is Algorithm Governance?“ IEEE Internet Computing 20, Nr. 4 (Juli 2016): 60–63. http://dx.doi.org/10.1109/mic.2016.79.
Der volle Inhalt der QuelleAllenspach, Karin, Mohamed Elbadawy, Hannah Nocholson, Christopher Zdyrski, John Cheville, Eugene Douglass, Elizabeth W. Howerth, Lilian Oliveira und Jonathan P. Mochel. „Abstract PR002: Sarcomatoid Histological Variants of Canine Muscle-Invasive Bladder Cancer: Transcription Factor Activation Highlights Pathways of Epithelial-Mesenchymal Transformation Similar to Humans“. Clinical Cancer Research 30, Nr. 10_Supplement (17.05.2024): PR002. http://dx.doi.org/10.1158/1557-3265.bladder24-pr002.
Der volle Inhalt der QuelleHepburn, Anastasia C., Nicola Lazzarini, Rajan Veeratterapillay, Laura Wilson, Jaume Bacardit und Rakesh Heer. „Identification of CNGB1 as a Predictor of Response to Neoadjuvant Chemotherapy in Muscle-Invasive Bladder Cancer“. Cancers 13, Nr. 15 (02.08.2021): 3903. http://dx.doi.org/10.3390/cancers13153903.
Der volle Inhalt der QuelleJi, Zh, Ming Gao und L. Ying. „RESEARCH ON DYNAMIC SCHEDULING DECISION ALGORITHM IN MIMIC DEFENSE“. Telecommunications and Radio Engineering 79, Nr. 17 (2020): 1563–78. http://dx.doi.org/10.1615/telecomradeng.v79.i17.70.
Der volle Inhalt der QuelleSong, Ling, Tao Shen Li und Yan Chen. „A Real Time Video Transmission Routing Protocol in Multi-Interface Multi-Channel Ad Hoc Based on Queue Length and Delay Contraint“. Applied Mechanics and Materials 241-244 (Dezember 2012): 2354–61. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2354.
Der volle Inhalt der QuelleSmith, Vicky, Dave Lee, Mark Reardon, Rekaya Shabbir, Sudhakar Sahoo, Peter Hoskin, Ananya Choudhury, Timothy Illidge und Catharine M. L. West. „Hypoxia Is Associated with Increased Immune Infiltrates and Both Anti-Tumour and Immune Suppressive Signalling in Muscle-Invasive Bladder Cancer“. International Journal of Molecular Sciences 24, Nr. 10 (18.05.2023): 8956. http://dx.doi.org/10.3390/ijms24108956.
Der volle Inhalt der QuelleYAMADA, Masayuki, Hiroaki NAYA und Ryo TAKAGI. „1F12 Optimization of train rescheduling problems using the Mimic Panel State Model and the Genetic Algorithms(Operation management)“. Proceedings of International Symposium on Seed-up and Service Technology for Railway and Maglev Systems : STECH 2015 (2015): _1F12–1_—_1F12–6_. http://dx.doi.org/10.1299/jsmestech.2015._1f12-1_.
Der volle Inhalt der QuelleYan, Sen, Han Zeng, Kaifeng Jin, Fei Shao, Zhaopei Liu, Yuan Chang, Yiwei Wang et al. „NKG2A and PD-L1 expression panel predicts clinical benefits from adjuvant chemotherapy and PD-L1 blockade in muscle-invasive bladder cancer“. Journal for ImmunoTherapy of Cancer 10, Nr. 5 (Mai 2022): e004569. http://dx.doi.org/10.1136/jitc-2022-004569.
Der volle Inhalt der QuelleSonpavde, Guru P., Layne Sadler, Arvind Ravi, Amin Nassar, Seth P. Lerner und Sooryanarayana Varambally. „Neural network analysis of tumor and germline profiling to predict survival of muscle-invasive bladder cancer following radical cystectomy: An analysis of the Cancer Genome Atlas (TCGA).“ Journal of Clinical Oncology 41, Nr. 6_suppl (20.02.2023): 546. http://dx.doi.org/10.1200/jco.2023.41.6_suppl.546.
Der volle Inhalt der QuelleUysal, Daniel, Karl-Friedrich Kowalewski, Maximilian Christian Kriegmair, Ralph Wirtz, Zoran V. Popovic und Philipp Erben. „A comprehensive molecular characterization of the 8q22.2 region reveals the prognostic relevance of OSR2 mRNA in muscle invasive bladder cancer“. PLOS ONE 16, Nr. 3 (12.03.2021): e0248342. http://dx.doi.org/10.1371/journal.pone.0248342.
Der volle Inhalt der QuelleMishra, Soumya. „A MICC Algorithm for Power Quality Improvement Using PV-DSTATCOM“. Asian Journal of Electrical Sciences 8, S1 (05.06.2019): 55–59. http://dx.doi.org/10.51983/ajes-2019.8.s1.2306.
Der volle Inhalt der QuelleNguyen, Long, Dinh Nguyen Duc und Hoai Nguyen Xuan. „A Guidance method for robustness surrogate assisted multi-objective evolutionary algorithms“. Journal of Research and Development on Information and Communication Technology 2021, Nr. 1 (21.05.2021): 1–18. http://dx.doi.org/10.32913/mic-ict-research.v2021.n1.948.
Der volle Inhalt der QuelleSmith, Amy F., Timothy W. Secomb, Axel R. Pries, Nicolas P. Smith und Rebecca J. Shipley. „Structure-Based Algorithms for Microvessel Classification“. Microcirculation 22, Nr. 2 (Februar 2015): 99–108. http://dx.doi.org/10.1111/micc.12181.
Der volle Inhalt der QuelleErgon, Rolf, und Kim H. Esbensen. „A didactically motivated PLS prediction algorithm“. Modeling, Identification and Control: A Norwegian Research Bulletin 22, Nr. 3 (2001): 131–39. http://dx.doi.org/10.4173/mic.2001.3.1.
Der volle Inhalt der QuelleKe, Liangjun, Laipeng Zhai, Jing Li und Felix T. S. Chan. „Pareto mimic algorithm: An approach to the team orienteering problem“. Omega 61 (Juni 2016): 155–66. http://dx.doi.org/10.1016/j.omega.2015.08.003.
Der volle Inhalt der QuellePhan, Hai-Hong. „An Integrated Approach for Table Detection and Structure Recognition“. Journal of Research and Development on Information and Communication Technology 2021, Nr. 1 (31.05.2021): 41–50. http://dx.doi.org/10.32913/mic-ict-research.v2021.n1.974.
Der volle Inhalt der QuellePetrie, Charles. „Protect Data, Not Algorithms“. IEEE Internet Computing 20, Nr. 6 (November 2016): 76–77. http://dx.doi.org/10.1109/mic.2016.129.
Der volle Inhalt der QuelleBrown, Zach Y., und Alexander MacKay. „Competition in Pricing Algorithms“. American Economic Journal: Microeconomics 15, Nr. 2 (01.05.2023): 109–56. http://dx.doi.org/10.1257/mic.20210158.
Der volle Inhalt der QuelleAlmeida, Virgilio, Fernando Filgueiras und Ricardo Fabrino Mendonca. „Algorithms and Institutions: How Can Social Sciences Can Contribute to Governance of Algorithms“. IEEE Internet Computing 26, Nr. 2 (01.03.2022): 42–46. http://dx.doi.org/10.1109/mic.2022.3147923.
Der volle Inhalt der QuelleKlesk, Przemyslaw, und Marcin Korzen. „Can Boosted Randomness Mimic Learning Algorithms of Geometric Nature? Example of a Simple Algorithm That Converges in Probability to Hard-Margin SVM“. IEEE Transactions on Neural Networks and Learning Systems 32, Nr. 9 (September 2021): 3798–818. http://dx.doi.org/10.1109/tnnls.2021.3059653.
Der volle Inhalt der QuelleWei, Shuai, Huihua Zhang, Wenjian Zhang und Hong Yu. „Conditional Probability Voting Algorithm Based on Heterogeneity of Mimic Defense System“. IEEE Access 8 (2020): 188760–70. http://dx.doi.org/10.1109/access.2020.3031323.
Der volle Inhalt der QuelleWang, Wei, und Rolf Henriksen. „Globally convergent generalized pole-placement adaptive control algorithm“. Modeling, Identification and Control: A Norwegian Research Bulletin 12, Nr. 3 (1991): 139–47. http://dx.doi.org/10.4173/mic.1991.3.4.
Der volle Inhalt der QuellePhan, Thanh Huan, und Hoài Bắc Lê. „A Comprehensive Survey of Frequent Itemsets Mining on Transactional Database with Weighted Items“. Journal of Research and Development on Information and Communication Technology 2021, Nr. 1 (17.06.2021): 19–28. http://dx.doi.org/10.32913/mic-ict-research.v2021.n1.967.
Der volle Inhalt der QuelleAhmed, Ahmed. „Development of an Approach for Image Forgery Detection Using Machine Learning Algorithms“. Journal of Intelligent Systems and Internet of Things 12, Nr. 2 (2024): 166–77. http://dx.doi.org/10.54216/jisiot.120212.
Der volle Inhalt der QuelleZhu, Zhengbin, Hong Yu, Qinrang Liu, Dongpei Liu und Huapeng Yu. „An Adaptive Multiexecutors Scheduling Algorithm Based on Heterogeneity for Cyberspace Mimic Defense“. Security and Communication Networks 2022 (26.12.2022): 1–23. http://dx.doi.org/10.1155/2022/2300407.
Der volle Inhalt der QuelleWang, Haizhou, Yabo Zhou, Yangyang Zhang, Shilin Fang, Meng Zhang, Haiou Li, Fei Xu et al. „Subtyping of microsatellite stability colorectal cancer reveals guanylate binding protein 2 (GBP2) as a potential immunotherapeutic target“. Journal for ImmunoTherapy of Cancer 10, Nr. 4 (April 2022): e004302. http://dx.doi.org/10.1136/jitc-2021-004302.
Der volle Inhalt der QuelleAndresen, Trond. „A Recursive Algorithm for the Reduction of Block Diagrams“. Modeling, Identification and Control: A Norwegian Research Bulletin 12, Nr. 1 (1991): 47–56. http://dx.doi.org/10.4173/mic.1991.1.4.
Der volle Inhalt der QuelleWang, Wei, und Rolf Henriksen. „A simplified algorithm of weighted generalized predictive adaptive control“. Modeling, Identification and Control: A Norwegian Research Bulletin 12, Nr. 3 (1991): 107–15. http://dx.doi.org/10.4173/mic.1991.3.1.
Der volle Inhalt der Quelle