The workflow to comprehend the current landscape of AI and sustainability research is divided into three steps and visualized in Fig.1. First, a literature search was conducted using specific search strings that match the titles or keywords of the literature. In the second step, data and text a...
machine learning technique for identifying DNA enhancer regions utilizing CIS‑regulatory element patterns Ahmad Hassan Butt1, Tamim Alkhalifah2*, Fahad Alturise2 &Yaser Daanial Khan1 Enhancers regulate gene expression, by playing a crucial role in the synthesis of RNAs and ...
The speed of testing is also a key concern because SARS-CoV-2 is so infectious. Each RT–PCR test takes several hours in the laboratory, time during which the virus can spread14. To identify individuals infected with SARS-CoV-2, the naive approach is to test everyone separately—that is,...
Another one is based on the autoregressive model in which we assume data points are observed at integer time (or location) points, and the current observation is a linear function of previous ones and an error term [24]. Although we know neighboring probes are correlated, it is still ...
in ICS (Erba et al., 2019). Poisoning attacks manipulate the training phase of the ML models by injecting malicious data points or biases into the training dataset. These attacks are designed to compromise the model's integrity, leading to incorrect predictions when the model is deployed, for...
Since network correspondence is necessary for statistical analysis and classification in multi-subject studies, estimating accurate subject-specific networks with the same biological meaning across subjects is a key. Group ICA (GICA) has been proposed to solve the problem of establishing subject ...
Hajo A. Reijers Part of the book series:Lecture Notes in Business Information Processing((LNBIP,volume 318)) Included in the following conference series: International Conference on Business Process Modeling, Development and Support Show all
Needs: in search of the public health paradigm for the 21st century Ilona Kickbusch August 2008 "The challenge to public health at the beginning of the 21st century is as large as when public health was first developed and on a par to the first public health revol...
Integrating Landsat TM imagery and see5 decision-tree software for identifying croplands: a case study in Shunyi District, Beijing. In: Gong Z, Luo XF, Chen JJ, et al. (eds) Web information systems and mining. (Lecture Notes in Computer Science, Vol. 6987). Berlin: Springer Press, 2011...
Worm virus can spread in various ways with great destructive power, which poses a great threat to network security. One example is the WannaCry worm in May 2017. By identifying the sources of worms, we can better understand the causation of risks, and then implement better security measures. ...