AIMC Topic: Computer Simulation

Clear Filters Showing 1451 to 1460 of 3932 articles

Deep Learning-Assisted Repurposing of Plant Compounds for Treating Vascular Calcification: An In Silico Study with Experimental Validation.

Oxidative medicine and cellular longevity
BACKGROUND: Vascular calcification (VC) constitutes subclinical vascular burden and increases cardiovascular mortality. Effective therapeutics for VC remains to be procured. We aimed to use a deep learning-based strategy to screen and uncover plant c...

Re-evaluating Deep Neural Networks for Phylogeny Estimation: The Issue of Taxon Sampling.

Journal of computational biology : a journal of computational molecular cell biology
Deep neural networks (DNNs) have been recently proposed for quartet tree phylogeny estimation. Here, we present a study evaluating recently trained DNNs in comparison to a collection of standard phylogeny estimation methods on a heterogeneous collect...

Deep Unfolding for Non-Negative Matrix Factorization with Application to Mutational Signature Analysis.

Journal of computational biology : a journal of computational molecular cell biology
Non-negative matrix factorization (NMF) is a fundamental matrix decomposition technique that is used primarily for dimensionality reduction and is increasing in popularity in the biological domain. Although finding a unique NMF is generally not possi...

Exponential synchronization for variable-order fractional discontinuous complex dynamical networks with short memory via impulsive control.

Neural networks : the official journal of the International Neural Network Society
This paper considers the exponential synchronization issue for variable-order fractional complex dynamical networks (FCDNs) with short memory and derivative couplings via the impulsive control scheme, where dynamical nodes are modeled to be discontin...

Intelligent Fault Diagnosis Framework for Modular Multilevel Converters in HVDC Transmission.

Sensors (Basel, Switzerland)
Open circuit failure mode in insulated-gate bipolar transistors (IGBT) is one of the most common faults in modular multilevel converters (MMCs). Several techniques for MMC fault diagnosis based on threshold parameters have been proposed, but very few...

Support Vector Regression for Mobile Target Localization in Indoor Environments.

Sensors (Basel, Switzerland)
Trilateration-based target localization using received signal strength (RSS) in a wireless sensor network (WSN) generally yields inaccurate location estimates due to high fluctuations in RSS measurements in indoor environments. Improving the localiza...

A machine learning-driven approach for prioritizing food contact chemicals of carcinogenic concern based on complementary in silico methods.

Food and chemical toxicology : an international journal published for the British Industrial Biological Research Association
Carcinogenicity is one of the most critical endpoints for the risk assessment of food contact chemicals (FCCs). However, the carcinogenicity of FCCs remains insufficiently investigated. To fill the data gap, the application of standard experimental m...

Application of Optimized GA-BPNN Algorithm in English Teaching Quality Evaluation System.

Computational intelligence and neuroscience
The assessment of teaching quality is a very complex and fuzzy nonlinear process, which involves many factors and variables, so the establishment of the mathematical model is complicated, and the traditional evaluation method of teaching quality is n...

Online public opinion evaluation through the functional resonance analysis method and deep analysis.

PloS one
A conventional model of public opinion analysis is no longer suitable when the internet is the primary arena of information dissemination. Thus, a more practical approach is urgently needed to deal with this dynamic and complicated phenomenon of prop...

Robust and Secure Data Transmission Using Artificial Intelligence Techniques in Ad-Hoc Networks.

Sensors (Basel, Switzerland)
The paper presents a new security aspect for a Mobile Ad-Hoc Network (MANET)-based IoT model using the concept of artificial intelligence. The Black Hole Attack (BHA) is considered one of the most affecting threats in the MANET in which the attacker ...