The largest database of trusted experimental protocols

42 protocols using mathematica 12

1

K-means Clustering for Taxonomic Cutoffs

Check if the same lab product or an alternative is used in the 5 most similar protocols
We applied the unsupervised ‘K-means’ clustering machine learning algorithm implemented in Wolfram Mathematica 12.1 [50 ] to estimate a cut-off value for each taxonomic level using the datasets of genetic distance values. The number of clusters that we selected was pre-determined based on the taxonomic levels of the genetic distance values (e.g. four clusters represent ‘species,’ ‘genus,’ ‘family’ and ‘order’). In the ‘K-means’ method, the centroids of each cluster are initially guided by an agglomerative hierarchical algorithm, and each data point is then assigned to the nearest centroid [51 , 52 ]. The ‘K-means’ clustering aims to partition the data points to minimize the within-cluster sum of squares in order to minimize the pairwise squared deviations of points in the same cluster until the centroids are stable [51 –53 (link)]. Statistical analyses and plots were also performed using Wolfram Mathematica 12.1 [50 ], and the script and data used in this study for ‘K-means’ clustering analysis are available at https://github.com/slphy/Chan-HelminthMarkers.
+ Open protocol
+ Expand
2

Mathematica-Powered Research Protocol

Check if the same lab product or an alternative is used in the 5 most similar protocols
All numerical calculations, including the analyses, were performed using Mathematica 12.3.1.0 (Wolfram Research, Champaign, IL, USA).
+ Open protocol
+ Expand
3

Mathematica 12.3.1.0 Numerical Analyses

Check if the same lab product or an alternative is used in the 5 most similar protocols
All numerical calculations, including the analyses, were performed using Mathematica 12.3.1.0 (Wolfram Research, Champaign, IL, USA).
+ Open protocol
+ Expand
4

Macintosh-Based Mathematica Development Protocol

Check if the same lab product or an alternative is used in the 5 most similar protocols
The following development environment was used: A Macintosh running OS X 10.14.5 (Apple, Inc.) and Mathematica 12.0.0.0 (Wolfram Research, Inc.).
+ Open protocol
+ Expand
5

Comparative Analysis of Lab and AI Classifier

Check if the same lab product or an alternative is used in the 5 most similar protocols
The laboratory and AI classifier data were compared using Mathematica 12.0.0.0 (Wolfram Research, Inc.). The Cochran Armitage test, Cohen's κ, χ2 test and Fisher's exact test were used. P<0.05 was considered to indicate a statistically significant difference.
+ Open protocol
+ Expand
6

Statistical Analysis of Research Data

Check if the same lab product or an alternative is used in the 5 most similar protocols
Statistical tests performed were described in the text and calculated using Prism 9 (GraphPad Software, San Diego, CA, United States), Excel (Microsoft, Redmond, WA, United States), and Mathematica 12.1.1.0 (Wolfram Research, Inc., Champaign, IL, United States).
+ Open protocol
+ Expand
7

Wolfram Mathematica for Figures Analysis

Check if the same lab product or an alternative is used in the 5 most similar protocols
Analysis and plotting for Figures 7F–7H was performed with Wolfram Mathematica 12.1.1.0.
+ Open protocol
+ Expand
8

3D Hair-Bundle Modeling and Mechanics

Check if the same lab product or an alternative is used in the 5 most similar protocols
We used Mathematica 12.1.1.0 (Wolfram Research, Inc., Champaign, IL, United States) to create the 3-D hair-bundle model (Figures 6B,C), to calculate the effects of morphology on mechanics (Figure 7), and to create Supplementary Figures 4, 6.
+ Open protocol
+ Expand
9

Rigid Registration for Vascular Imaging

Check if the same lab product or an alternative is used in the 5 most similar protocols
Given the coordinates (x, y, z) of the points of maximum ILT thickness, PWS, and PWRI in CT1, linear transformation (also known as rigid registration or affine transformation) was used to predict said points in CT2. Minimizing the error through least square optimization of the x, y, and z coordinates of up to nine corresponding points (left and right renal arteries, superior mesenteric artery, aortic bifurcation, proximal left and right common iliac arteries, and one to three lumbar arteries if available) in CT1 and CT2 determined the transformation matrix (MATHEMATICA 12.0, Wolfram, Champaign, IL). An additional point (ie, calcified plaque or inferior mesenteric artery) clearly visible in both CTAs validated the transformation matrix. The applied linear transformation was considered successful if the distance between the predicted position and the actual position of the validation point in CT2 was less than 15 mm.
All measurements, including biomechanical parameters and the linear transformation, were performed by an experienced analyzer (D.Z.) and reviewed by an experienced vascular surgeon and analyzer (A.B., T.C.G.). Upon discrepant results, all three investigators performed a joint analysis.
+ Open protocol
+ Expand
10

Modeling Biphasic Lamellae Screw Dislocations

Check if the same lab product or an alternative is used in the 5 most similar protocols
The screw dislocations of biphasic lamellae were modeled by the equation of helicoid in cylindrical coordinates (r, ϕ, and z), which can be expressed in terms of three parameters, r, ϕ, and t by (x,y,z)=(rcosϕ,rsinϕ,cϕ+ft) (x,y,z)=(rcosϕ,rsinϕ,cϕ(1f)t) where f is the fraction of one of the lamellar domains [we take f = 0.15 (PS), therefore 1 − f = 0.85 (corresponding to 6:1 swollen QP2VP)]. The parameters r, ϕ, and t are in the range of 0rD/2,0ϕ2nπ,0t2cπ
Here, D is the outer diameter of helicoid and n is the number of turns, and 2cπ is the pitch of the helicoid. The screw dislocation of biphasic lamellae shown in Fig. 2B is depicted using Mathematica 12.0 (Wolfram Research Inc.) with the values of D = 4, n = 3, c = 1/3, and f = 0.15.
+ Open protocol
+ Expand

About PubCompare

Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.

We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.

However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.

Ready to get started?

Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required

Sign up now

Revolutionizing how scientists
search and build protocols!