Showing 221 - 240 results of 7,621 for search 'effect coding', query time: 0.18s Refine Results
  1. 221

    Exercise mediates myocardial infarction via non-coding RNAs by Changliang Han, Cuili Zhai, Ailing Li, Yongzhi Ma, Jamal Hallajzadeh

    Published 2024-11-01
    “…Incorporating exercise into a lifestyle can significantly benefit recovery and reduce the risk of future cardiac events for MI patients. Non-coding RNAs (ncRNAs) play various roles in the effects of exercise on myocardial infarction (MI). ncRNAs regulate gene expression, influence cardiac remodeling, angiogenesis, inflammation, oxidative stress, apoptosis, cardioprotection, and cardiac electrophysiology. …”
    Get full text
    Article
  2. 222

    Algorithms weighing lives and freedoms: The case of China’s health code by Ina Virtosu, Chen Li

    Published 2023-03-01
    “…Very quickly China’s health code became a key resource for the country’s governments to track and contain COVID-19 cases using time, location, and personal interactions. …”
    Get full text
    Article
  3. 223

    Code generation system based on MDA and convolutional neural networks by Gabriel Vargas-Monroy, Daissi-Bibiana Gonzalez-Roldan, Carlos Enrique Montenegro-Marín, Alejandro-Paolo Daza-Corredor, Daniel-David Leal-Lara, Daniel-David Leal-Lara

    Published 2025-03-01
    “…Specifically, we developed a system that employs computer vision, deep learning, and MDA to generate source code from the diagrams describing the system and the respective study cases, thereby providing solutions to the proposed problems.Results and discussionThe results demonstrate the effectiveness of employing computer vision and deep learning techniques to process images and extract relevant information. …”
    Get full text
    Article
  4. 224

    Behaviour Factor of Ductile Code-Designed Reinforced Concrete Frames by Massimiliano Ferraioli

    Published 2021-01-01
    “…The current generation of seismic design codes is based on a linear elastic force-based approach that includes the nonlinear response of the structure implicitly through a response modification factor (named reduction factor R in American codes or behaviour factor q in European codes). …”
    Get full text
    Article
  5. 225

    Modeling coding sequence design for virus-based expression in tobacco by Moritz Burghardt, Tamir Tuller

    Published 2025-06-01
    “…To further enhance expression, researchers often adapt the coding sequence of heterologous genes to the host, but this strategy has produced mixed results in Tobacco.To study the effects of different sequence features on protein yield, we compile a dataset of the yields and coding sequences of previously published expression studies of more than 200 coding sequences.We evaluate various established gene expression models on a subset of the expression studies. …”
    Get full text
    Article
  6. 226
  7. 227

    A Code-Based ISE to Protect Boolean Masking in Software by Qi Tian, Hao Cheng, Chun Guo, Daniel Page, Meiqin Wang, Weija Wang

    Published 2025-03-01
    “…To address the said implementation challenges, we present an effective and efficient solution that incorporates the code-based masking technique: We mask the shares of Boolean masking with code-based masking and then use a selfdesigned Instruction Set Extension (ISE) to perform efficient private computations within this masked domain. …”
    Get full text
    Article
  8. 228

    Mutually Orthogonal Complementary Golay Coded Sequences: An In-vivo Study by Ihor TROTS, Jurij TASINKIEWICZ, Andrzej NOWICKI

    Published 2024-08-01
    “…Fast and high-quality ultrasound imaging allows to increase the effectiveness of detecting tissue changes at the initial stage of disease. …”
    Get full text
    Article
  9. 229

    Progress in Research on the Long Non-coding RNAs in Chinese Cabbage by Ruihua WANG, Min HAN, Yuanyuan LI

    Published 2025-01-01
    “…Long non-coding RNAs (lncRNAs) are functional non-coding RNA molecules that are at least 200 nucleotides in length and lack significant coding ability, having important regulation effects on plant growth and development and response to stress. …”
    Get full text
    Article
  10. 230
  11. 231

    An Improved Retransmission Approacb Based on Opportunistic Network Coding in Multicast Networks by Pengfei Shao, Yanwei Zhao, Yaohui Wu, Xinwei Yao

    Published 2015-04-01
    “…A novel opportunistic-network-coding-based retransmission approach was proposed.According to the feedback on packet loss from the receiving nodes,this novel approach can not only efficiently select a combination of lost packets through Hash lookup for packet retransmission,but also can ensure priority retransmission making up to a single combination retransmission packet which can maximize the number of receiving nodes for recovering their lost packets.Furthermore,the proposed approach fully exploits the coding opportunity based on neighborhood association,and allows the receiving nodes to recover their lost packets from multiple retransmission packets.The simulation results show that this novel approach can effectively reduce the number of retransmissions to improve the transmission efficiency with respect to the existing algorithms.…”
    Get full text
    Article
  12. 232

    An Improved Retransmission Approacb Based on Opportunistic Network Coding in Multicast Networks by Pengfei Shao, Yanwei Zhao, Yaohui Wu, Xinwei Yao

    Published 2015-04-01
    “…A novel opportunistic-network-coding-based retransmission approach was proposed.According to the feedback on packet loss from the receiving nodes,this novel approach can not only efficiently select a combination of lost packets through Hash lookup for packet retransmission,but also can ensure priority retransmission making up to a single combination retransmission packet which can maximize the number of receiving nodes for recovering their lost packets.Furthermore,the proposed approach fully exploits the coding opportunity based on neighborhood association,and allows the receiving nodes to recover their lost packets from multiple retransmission packets.The simulation results show that this novel approach can effectively reduce the number of retransmissions to improve the transmission efficiency with respect to the existing algorithms.…”
    Get full text
    Article
  13. 233

    Short Blocklength Nonbinary Raptor-Like LDPC Coding Systems Design and Simulation by Jakub Hyla, Wojciech Sulek

    Published 2025-01-01
    “…Numerical simulations validate the approach, demonstrating the effectiveness of the constructed short NB QC-RL-LDPC codes, compared to the 5G standard binary coding with IR. …”
    Get full text
    Article
  14. 234

    Metrics for code obfuscation based on symbolic execution and N-scope complexity by Yuqiang XIAO, Yunfei GUO, Yawen WANG

    Published 2022-12-01
    “…Code obfuscation has been well developed as mitigated endogenous security technology, to effectively resist MATE attacks (e.g.reverse engineering).And it also has important value for the reasonable metrics of code obfuscation effect.Since symbolic execution is widely used in anti-obfuscation attacks, metrics for code obfuscation resilience can refer to the efforts of generating input test set for executing all program paths.However, some adversarial techniques could reduce the symbol execution efficiency significantly based on the nested structure of the program and increase the error of the resilience reference.To solve the above problems, a metrics for code obfuscation was proposed based on symbolic execution and N-scope complexity.The obfuscation resilience was defined with symbolic execution time and obfuscation potency was defined based on the proposed N-scope complexity for better robustness in measuring the resilience of multi-nested structure programs.Furthermore, the correlation analysis of obfuscation effect was proposed and the effect was quantified by symbolic execution and control flow diagram extraction of programs.Over 4000 obfuscated programs from 3 open-sourced assemblies were evaluated with proposed metrics in the experiment, which indicated the generalization performance and practicality of the metrics.And an example of this metrics application was presented in a simulated obfuscation scenario which provided references of obfuscation technology metrics and obfuscation configuration for obfuscation users.…”
    Get full text
    Article
  15. 235
  16. 236

    Allelic expression of deleterious protein-coding variants across human tissues. by Kimberly R Kukurba, Rui Zhang, Xin Li, Kevin S Smith, David A Knowles, Meng How Tan, Robert Piskol, Monkol Lek, Michael Snyder, Daniel G Macarthur, Jin Billy Li, Stephen B Montgomery

    Published 2014-05-01
    “…In this regard, an important factor that can modify the effect of a pathogenic coding allele is its level of expression; a factor which itself characteristically changes across tissues. …”
    Get full text
    Article
  17. 237

    Analysis of network coding delay:a Markov state transfer approach by Yu-ben QU, Chen CHEN, Chao DONG, Hai WANG

    Published 2013-09-01
    “…Network coding has been validated as an effective means to improve network throughput and reliability,but the study of its delay performance is not enough.Agai the widely used random linear network coding,the proposed method,based on the Markov state transfer,analyzed the delay expectation and probability distribution of the unicast flow in a single hop scene,and presented the exact recursions.Then according to numerical simulation,the effect of the encoding parameters were analyzed such as the finite f eld size,the channel loss rate and the encoding batch size on the delay.The results show that,as the finite field q increases,the delay variance continues to become smaller; the average delay is almost linear with the channel loss rate and the encoding batch size individually.…”
    Get full text
    Article
  18. 238

    Privacy-utility tradeoff method using multi-variable source coding by Yong-hao GU, Jiu-chuan LIN

    Published 2015-12-01
    “…In the age of big data,data providers need to ensure their privacy,while data analysts need to mine the value of data.So,how to find the privacy-utility tradeoff has become a research hotspot.Current works mostly focus on privacy preserving methods,ignoring the data utility.Based on the current research of privacy utility equilibrium methods,a privacy-utility tradeoff method using multi-variable source coding was proposed to solve the problem that different public datasets in the same database have different privacy requirements.Two results are obtained by simulations.The first result is that the greater the association degree between the private information and public information,the increase of the distortion degree of public information will significantly improve the effect of privacy preservation.The second result is that public information with larger variance should be less distorted to ensure more utility.…”
    Get full text
    Article
  19. 239

    Color-code Strategy for Improving Writing Academic Paragraphs in EFL Classes by Rebin Abdulkadir Azeez

    Published 2021-03-01
    “…The aim was to inspect and scrutinize the effect of color-code strategy on their proficiency regarding writing academic paragraphs. …”
    Get full text
    Article
  20. 240

    Manifestations of the European Ecological Footprint from the Perspective of Social Responsibility Codes by Simona Ioana Ghiţă, Rodica Manuela Gogonea, Andreea Simona Săseanu

    Published 2019-08-01
    “…At the same time, the variables included in the model were selected in accordance with the principles of the European Corporate Social Responsibility Strategy, serving as criteria for the hierarchy and clustering of European countries, for identifying patterns and predicting the behavior of ecological footprint of production, as a prerequisite for optimizing social environmental responsibility and applying social responsibility codes in the business environment. The analysis results indicate that the educational level of labor force, the degree of economic freedom and the use of renewable energy sources have a significant positive influence on the ecological footprint behavior, while the social exclusion has a significant negative effect, with a major impact on the prospects of sustainable growth, specific to bioeconomy.…”
    Get full text
    Article