Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation

Search Page

Filters

My NCBI Filters

Results by year

Table representation of search results timeline featuring number of search results per year.

Year Number of Results
2013 1
2019 2
2020 1
2021 5
2022 4
2023 8
2024 1

Text availability

Article attribute

Article type

Publication date

Search Results

22 results

Results by year

Filters applied: . Clear all
Page 1
Using logical constraints to validate statistical information about disease outbreaks in collaborative knowledge graphs: the case of COVID-19 epidemiology in Wikidata.
Turki H, Jemielniak D, Hadj Taieb MA, Labra Gayo JE, Ben Aouicha M, Banat M, Shafee T, Prud'hommeaux E, Lubiana T, Das D, Mietchen D. Turki H, et al. PeerJ Comput Sci. 2022 Sep 29;8:e1085. doi: 10.7717/peerj-cs.1085. eCollection 2022. PeerJ Comput Sci. 2022. PMID: 36262159 Free PMC article.
These tasks assess statistical data and are implemented in SPARQL, a query language for semantic databases. We demonstrate the efficiency of our methods for evaluating structured non-relational information on COVID-19 in Wikidata, and its applicability in collaborative ont …
These tasks assess statistical data and are implemented in SPARQL, a query language for semantic databases. We demonstrate the efficiency of …
Android malware detection using hybrid ANFIS architecture with low computational cost convolutional layers.
Atacak İ, Kılıç K, Doğru İA. Atacak İ, et al. PeerJ Comput Sci. 2022 Sep 26;8:e1092. doi: 10.7717/peerj-cs.1092. eCollection 2022. PeerJ Comput Sci. 2022. PMID: 36262124 Free PMC article.
The proposed architecture combines the feature extraction power of the convolutional neural network (CNN) architecture and the decision making capability of fuzzy logic. Our method extracts features from permission information with a small number of filters and conv …
The proposed architecture combines the feature extraction power of the convolutional neural network (CNN) architecture and the decision maki …
BDMCA: a big data management system for Chinese auditing.
Zhou X, Ge B, Xia Z, Xiao W, Chen Z. Zhou X, et al. PeerJ Comput Sci. 2023 Apr 13;9:e1317. doi: 10.7717/peerj-cs.1317. eCollection 2023. PeerJ Comput Sci. 2023. PMID: 37346735 Free PMC article.
However, the heterogeneity of multi-source audit data, the intricacy of converting Chinese into SQL, and the inefficiency of data processing methods present significant obstacles to the growth of Chinese audits. ...MRo-SQL outperforms the state-of-the-art X-SQL parsing mod …
However, the heterogeneity of multi-source audit data, the intricacy of converting Chinese into SQL, and the inefficiency of data processing …
lab: an R package for generating analysis-ready data from laboratory records.
Tseng YJ, Chen CJ, Chang CW. Tseng YJ, et al. PeerJ Comput Sci. 2023 Aug 25;9:e1528. doi: 10.7717/peerj-cs.1528. eCollection 2023. PeerJ Comput Sci. 2023. PMID: 37705643 Free PMC article.
Nevertheless, the irregular frequency of the data in these records necessitates data preprocessing, which can add complexity to time-series analyses. METHODS: To address these challenges, we developed an open-source R package that facilitates the extraction of temporal inf …
Nevertheless, the irregular frequency of the data in these records necessitates data preprocessing, which can add complexity to time-series …
Structural modeling and analysis of fuel cell: a graph-theoretic approach.
Saha RK, Kumar R, Dev N, Kumar R, Kumar R, Del Toro RM, Haber S, Naranjo JE. Saha RK, et al. PeerJ Comput Sci. 2023 Aug 28;9:e1510. doi: 10.7717/peerj-cs.1510. eCollection 2023. PeerJ Comput Sci. 2023. PMID: 37705655 Free PMC article.
This work presents an overview and categorization of different fuel cells, leading to the developing of a method combining graph theory and matrix method for analyzing fuel cell system structure to make more informed decisions. ...With the aid of case studies, the p …
This work presents an overview and categorization of different fuel cells, leading to the developing of a method combining graph theo …
LSB-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix.
Hacimurtazaoglu M, Tutuncu K. Hacimurtazaoglu M, et al. PeerJ Comput Sci. 2022 Jan 6;8:e843. doi: 10.7717/peerj-cs.843. eCollection 2022. PeerJ Comput Sci. 2022. PMID: 35111926 Free PMC article.
Thus, the ideal video steganography technique must provide high imperceptibility, high payload, and resistance towards visual, statistical and transformation-based steganalysis attacks. METHODS: One of the most common spatial methods for hiding data within the cover …
Thus, the ideal video steganography technique must provide high imperceptibility, high payload, and resistance towards visual, statistical a …
Bee colony remote monitoring based on IoT using ESP-NOW protocol.
Kviesis A, Komasilovs V, Ozols N, Zacepins A. Kviesis A, et al. PeerJ Comput Sci. 2023 Apr 27;9:e1363. doi: 10.7717/peerj-cs.1363. eCollection 2023. PeerJ Comput Sci. 2023. PMID: 37346518 Free PMC article.
Information and communication technologies, specifically the Internet of Things (IoT), have been widely used in many agricultural practices, including beekeeping, where the adoption of advanced technologies has an increasing trend. Implementation of precision apiculture method
Information and communication technologies, specifically the Internet of Things (IoT), have been widely used in many agricultural practices, …
Application of interval type-2 fuzzy logic and type-1 fuzzy logic-based approaches to social networks for spam detection with combined feature capabilities.
Atacak İ, Çıtlak O, Doğru İA. Atacak İ, et al. PeerJ Comput Sci. 2023 Apr 21;9:e1316. doi: 10.7717/peerj-cs.1316. eCollection 2023. PeerJ Comput Sci. 2023. PMID: 37346510 Free PMC article.
METHODS: Fuzzy logic (FL) based approaches, as they are the models such that generate results by interpreting the data obtained based on heuristics viewpoint according to past experiences, they can provide robust and dynamic solutions in spam detection, as in many a
METHODS: Fuzzy logic (FL) based approaches, as they are the models such that generate results by interpreting the data obtaine
Stochastic computing in convolutional neural network implementation: a review.
Lee YY, Abdul Halim Z. Lee YY, et al. PeerJ Comput Sci. 2020 Nov 9;6:e309. doi: 10.7717/peerj-cs.309. eCollection 2020. PeerJ Comput Sci. 2020. PMID: 33816960 Free PMC article.
Stochastic computing (SC) is an alternative computing domain for ubiquitous deterministic computing whereby a single logic gate can perform the arithmetic operation by exploiting the nature of probability math. ...Firstly, we review the fundamental concepts of SC and the c …
Stochastic computing (SC) is an alternative computing domain for ubiquitous deterministic computing whereby a single logic gate can p …
WildMinnie: compression of software-defined networking (SDN) rules with wildcard patterns.
Khanmirza H. Khanmirza H. PeerJ Comput Sci. 2022 Feb 8;8:e809. doi: 10.7717/peerj-cs.809. eCollection 2022. PeerJ Comput Sci. 2022. PMID: 35494854 Free PMC article.
Software-defined networking (SDN) enables fast service innovations through network programmability. In SDN, a logically centralized controller compiles a set of policies into the network-level rules. ...We demonstrate the capability of WildMinnie in various datacenter topo …
Software-defined networking (SDN) enables fast service innovations through network programmability. In SDN, a logically centralized c …
22 results