Begle, Justin Rakita, Gordon
This event is interactive conversation for faculty who are new to exploring artificial intelligence (AI) and its impact on the higher education setting. We will briefly discuss the implications that the various types of AI, including machine learning and natural language processing are having on how faculty and students are working in a university ...
Liu, Zhijing Wu, Dongzhi Ke, Chengjie Nian, Qichun Chen, Yan Huang, Yaping Chen, Maohua
Published in
Oncology
Introduction: Asciminib is primarily utilized for treating Philadelphia chromosome-positive chronic myeloid leukemia in its chronic phase among patients harboring the T315I mutation or those who have been previously treated with at least two tyrosine kinase inhibitors. The safety profile of asciminib across a broad patient population over an extend...
MASSARI, J. M. MOURA, D. J. de NÄÄS, I. de A. PEREIRA, D. F. OLIVEIRA, S. R. de M. BRANCO, T. BARROS, J. de S. G.
This study investigated the behavior sequences of broiler chickens housed in enriched environments subjected to thermal comfort and heat stress using the Generalized Sequential Pattern (GSP) data mining algorithm.
Ducharlet, Kévin Travé-Massuyès, Louise Lasserre, Jean-Bernard Le Lann, Marie-Véronique Miloudi, Youssef
Outlier detection holds significant importance in the realm of data mining, particularly with the growing pervasiveness of data acquisition methods. The ability to identify outliers in data streams is essential for maintaining data quality and detecting faults. However, dealing with data streams presents challenges due to the non-stationary nature ...
Amroune, Nasereddine Benazi, Maklouf Sayad, Lamri
Abstract: Density-Based Spatial Clustering of Applications with Noise (DBSCAN) is one of the most important data clustering algorithms. Its importance lies in the fact that it can recognize clusters of arbitrary shapes and is not affected by noise in the data. To identify clusters, DBSCAN needs to specify two parameters: the parameter Eps, represen...
Moranges, Maelle Plantevit, Marc Bensafi, Moustafa
In the field of food, as in other fields, the measurement of emotional responses to food and their sensory properties is a major challenge. In the present protocol, we propose a step-by-step procedure that allows a physiological description of odors, aromas, and their hedonic properties. The method rooted in subgroup discovery belongs to the field ...
Lopez, Pauline Belgacem, Alexis Sarnacki, Sabine Arnaud, Alexis Houari, Jenna Piguet, Christophe Baudouin, Maxime Fourcade, Laurent Lauvray, Thomas Ballouhey, Quentin
...
Published in
Frontiers in Pediatrics
Introduction Preoperative three-dimensional (3D) reconstruction using sectional imaging is increasingly used in challenging pediatric cases to aid in surgical planning. Many case series have described various teams' experiences, discussing feasibility and realism, while emphasizing the technological potential for children. Nonetheless, general know...
Ke, Zi Chen, Hongruyu Zhao, Yong Ke, Jixian Xie, Youqiong Zeng, Runxin Hua, Yini Xiong, Zhihao Wang, Xuanxuan
Published in
Complementary Medicine Research
Introduction: Chemotherapy-induced nausea and vomiting (CINV) significantly impacts the quality of life of cancer patients undergoing treatment, often leading to treatment interruptions and compromised adherence to therapy. Our objective was to identify patterns for selecting the optimal acupoints and explore the treatment principles behind forming...
Guo, Na Liu, Cong Li, Caihong Zeng, Qingtian Ouyang, Chun Liu, Qingzhi Lu, Xixi
Predictive Process Monitoring aims to predict the future information of ongoing process executions by leveraging machine and deep learning techniques. One of the tasks is known as remaining time prediction , which focuses on predicting the remaining time of ongoing cases. Accurate remaining time prediction can be valuable and important for improvin...
Lachat, Paul
The collection of personal information by organizations has become increasingly essential for social interactions. Nevertheless, according to the General Data Protection Regulation, the organizations have to protect collected data. Access Control Mechanisms (ACMs) are traditionally used to secure information systems against unauthorized access. The...