1naresh2naresh
Array
(
    [urn:ac.highwire.org:guest:identity] => Array
        (
            [runtime-id] => urn:ac.highwire.org:guest:identity
            [type] => guest
            [service-id] => ajnr-ac.highwire.org
            [access-type] => Controlled
            [privilege] => Array
                (
                    [urn:ac.highwire.org:guest:privilege] => Array
                        (
                            [runtime-id] => urn:ac.highwire.org:guest:privilege
                            [type] => privilege-set
                            [privilege-set] => GUEST
                        )

                )

            [credentials] => Array
                (
                    [method] => guest
                )

        )

    [14b5d2cb-733c-437e-9700-863ea7fc147d] => Array
        (
            [runtime-id] => 14b5d2cb-733c-437e-9700-863ea7fc147d
            [type] => toll-free-key
            [service-id] => ajnr-ac.highwire.org
            [access-type] => Controlled
            [privilege] => Array
                (
                    [9b681ffe-962d-47b4-9673-97bc68bc0ab9] => Array
                        (
                            [runtime-id] => 9b681ffe-962d-47b4-9673-97bc68bc0ab9
                            [type] => toll-free-key
                        )

                )

            [credentials] => Array
                (
                    [method] => toll-free-key
                    [value] => tf_ipsecsha;39548f089ed6682c8daa6af709b940503d1398e6
                )

        )

)
1naresh2naresh
Array
(
    [urn:ac.highwire.org:guest:identity] => Array
        (
            [runtime-id] => urn:ac.highwire.org:guest:identity
            [type] => guest
            [service-id] => ajnr-ac.highwire.org
            [access-type] => Controlled
            [privilege] => Array
                (
                    [urn:ac.highwire.org:guest:privilege] => Array
                        (
                            [runtime-id] => urn:ac.highwire.org:guest:privilege
                            [type] => privilege-set
                            [privilege-set] => GUEST
                        )

                )

            [credentials] => Array
                (
                    [method] => guest
                )

        )

    [14b5d2cb-733c-437e-9700-863ea7fc147d] => Array
        (
            [runtime-id] => 14b5d2cb-733c-437e-9700-863ea7fc147d
            [type] => toll-free-key
            [service-id] => ajnr-ac.highwire.org
            [access-type] => Controlled
            [privilege] => Array
                (
                    [9b681ffe-962d-47b4-9673-97bc68bc0ab9] => Array
                        (
                            [runtime-id] => 9b681ffe-962d-47b4-9673-97bc68bc0ab9
                            [type] => toll-free-key
                        )

                )

            [credentials] => Array
                (
                    [method] => toll-free-key
                    [value] => tf_ipsecsha;39548f089ed6682c8daa6af709b940503d1398e6
                )

        )

)

Table 2:

Types of algorithms used to predict the molecular subtypes of gliomas and the number of studies that used them

IDHMGMT1p/19qH3 K27MATRXTERTOthers
Internal validation
 Tree-based11444004
 SVM9122124
 Neural networks14630002
 Others3100000
External validation
 Tree-based4100111
 SVM2120101
 Neural networks1000000
 Others0100010