Results 61 to 70 of about 511,753 (356)

Mechanism‐Driven Screening of Membrane‐Targeting and Pore‐Forming Antimicrobial Peptides

open access: yesAdvanced Science, EarlyView.
To combat antibiotic resistance, this study employs mechanism‐driven screening with machine learning to identify pore‐forming antimicrobial peptides from amphibian and human metaproteomes. Seven peptides are validated, showing minimal toxicity and membrane disruption.
Jiaxuan Li   +9 more
wiley   +1 more source

Using Hidden Markov Chains in Recognition of Vowel Letters in English Language [PDF]

open access: yesالمجلة العراقية للعلوم الاحصائية, 2006
This study deals with hidden Markov models . These models consist of sets of finite states , each one of them is associated with a probability distribution .
doaj   +1 more source

Inverse Design of Alloys via Generative Algorithms: Optimization and Diffusion within Learned Latent Space

open access: yesAdvanced Intelligent Discovery, EarlyView.
This work presents a novel generative artificial intelligence (AI) framework for inverse alloy design through operations (optimization and diffusion) within learned compact latent space from variational autoencoder (VAE). The proposed work addresses challenges of limited data, nonuniqueness solutions, and high‐dimensional spaces.
Mohammad Abu‐Mualla   +4 more
wiley   +1 more source

Propositionalisation of multiple sequence alignments using probabilistic models [PDF]

open access: yes, 2008
Multiple sequence alignments play a central role in Bioinformatics. Most alignment representations are designed to facilitate knowledge extraction by human experts.
Holmes, Geoffrey   +2 more
core   +2 more sources

Finite State Transducers Approximating Hidden Markov Models

open access: yes, 1997
This paper describes the conversion of a Hidden Markov Model into a sequential transducer that closely approximates the behavior of the stochastic model.
Kempe, Andre
core   +2 more sources

Advanced Experiment Design Strategies for Drug Development

open access: yesAdvanced Intelligent Discovery, EarlyView.
Wang et al. analyze 592 drug development studies published between 2020 and 2024 that applied design of experiments methodologies. The review surveys both classical and emerging approaches—including Bayesian optimization and active learning—and identifies a critical gap between advanced experimental strategies and their practical adoption in ...
Fanjin Wang   +3 more
wiley   +1 more source

Asymptotic operating characteristics of an optimal change point detection in hidden Markov models

open access: yes, 2005
Let \xi_0,\xi_1,...,\xi_{\omega-1} be observations from the hidden Markov model with probability distribution P^{\theta_0}, and let \xi_{\omega},\xi_{\omega+1},...
Fuh, Cheng-Der
core   +1 more source

Advances in Thermal Modeling and Simulation of Lithium‐Ion Batteries with Machine Learning Approaches

open access: yesAdvanced Intelligent Discovery, EarlyView.
Heat generation in lithium‐ion batteries affects performance, aging, and safety, requiring accurate thermal modeling. Traditional methods face efficiency and adaptability challenges. This article reviews machine learning‐based and hybrid modeling approaches, integrating data and physics to improve parameter estimation and temperature prediction ...
Qi Lin   +4 more
wiley   +1 more source

Large Language Model‐Based Chatbots in Higher Education

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci   +4 more
wiley   +1 more source

Enhancing Botnet Detection in Network Security Using Profile Hidden Markov Models

open access: yesApplied Sciences
A botnet is a network of compromised computer systems, or bots, remotely controlled by an attacker through bot controllers. This covert network poses a threat through large-scale cyber attacks, including phishing, distributed denial of service (DDoS ...
Rucha Mannikar, Fabio Di Troia
doaj   +1 more source

Home - About - Disclaimer - Privacy