Suggested Topics within your search.
Suggested Topics within your search.
-
221
Exercise mediates myocardial infarction via non-coding RNAs
Published 2024-11-01“…Incorporating exercise into a lifestyle can significantly benefit recovery and reduce the risk of future cardiac events for MI patients. Non-coding RNAs (ncRNAs) play various roles in the effects of exercise on myocardial infarction (MI). ncRNAs regulate gene expression, influence cardiac remodeling, angiogenesis, inflammation, oxidative stress, apoptosis, cardioprotection, and cardiac electrophysiology. …”
Get full text
Article -
222
Algorithms weighing lives and freedoms: The case of China’s health code
Published 2023-03-01“…Very quickly China’s health code became a key resource for the country’s governments to track and contain COVID-19 cases using time, location, and personal interactions. …”
Get full text
Article -
223
Code generation system based on MDA and convolutional neural networks
Published 2025-03-01“…Specifically, we developed a system that employs computer vision, deep learning, and MDA to generate source code from the diagrams describing the system and the respective study cases, thereby providing solutions to the proposed problems.Results and discussionThe results demonstrate the effectiveness of employing computer vision and deep learning techniques to process images and extract relevant information. …”
Get full text
Article -
224
Behaviour Factor of Ductile Code-Designed Reinforced Concrete Frames
Published 2021-01-01“…The current generation of seismic design codes is based on a linear elastic force-based approach that includes the nonlinear response of the structure implicitly through a response modification factor (named reduction factor R in American codes or behaviour factor q in European codes). …”
Get full text
Article -
225
Modeling coding sequence design for virus-based expression in tobacco
Published 2025-06-01“…To further enhance expression, researchers often adapt the coding sequence of heterologous genes to the host, but this strategy has produced mixed results in Tobacco.To study the effects of different sequence features on protein yield, we compile a dataset of the yields and coding sequences of previously published expression studies of more than 200 coding sequences.We evaluate various established gene expression models on a subset of the expression studies. …”
Get full text
Article -
226
Role of long non-coding RNAs in the regulation of ferroptosis in tumors
Published 2025-03-01Get full text
Article -
227
A Code-Based ISE to Protect Boolean Masking in Software
Published 2025-03-01“…To address the said implementation challenges, we present an effective and efficient solution that incorporates the code-based masking technique: We mask the shares of Boolean masking with code-based masking and then use a selfdesigned Instruction Set Extension (ISE) to perform efficient private computations within this masked domain. …”
Get full text
Article -
228
Mutually Orthogonal Complementary Golay Coded Sequences: An In-vivo Study
Published 2024-08-01“…Fast and high-quality ultrasound imaging allows to increase the effectiveness of detecting tissue changes at the initial stage of disease. …”
Get full text
Article -
229
Progress in Research on the Long Non-coding RNAs in Chinese Cabbage
Published 2025-01-01“…Long non-coding RNAs (lncRNAs) are functional non-coding RNA molecules that are at least 200 nucleotides in length and lack significant coding ability, having important regulation effects on plant growth and development and response to stress. …”
Get full text
Article -
230
-
231
An Improved Retransmission Approacb Based on Opportunistic Network Coding in Multicast Networks
Published 2015-04-01“…A novel opportunistic-network-coding-based retransmission approach was proposed.According to the feedback on packet loss from the receiving nodes,this novel approach can not only efficiently select a combination of lost packets through Hash lookup for packet retransmission,but also can ensure priority retransmission making up to a single combination retransmission packet which can maximize the number of receiving nodes for recovering their lost packets.Furthermore,the proposed approach fully exploits the coding opportunity based on neighborhood association,and allows the receiving nodes to recover their lost packets from multiple retransmission packets.The simulation results show that this novel approach can effectively reduce the number of retransmissions to improve the transmission efficiency with respect to the existing algorithms.…”
Get full text
Article -
232
An Improved Retransmission Approacb Based on Opportunistic Network Coding in Multicast Networks
Published 2015-04-01“…A novel opportunistic-network-coding-based retransmission approach was proposed.According to the feedback on packet loss from the receiving nodes,this novel approach can not only efficiently select a combination of lost packets through Hash lookup for packet retransmission,but also can ensure priority retransmission making up to a single combination retransmission packet which can maximize the number of receiving nodes for recovering their lost packets.Furthermore,the proposed approach fully exploits the coding opportunity based on neighborhood association,and allows the receiving nodes to recover their lost packets from multiple retransmission packets.The simulation results show that this novel approach can effectively reduce the number of retransmissions to improve the transmission efficiency with respect to the existing algorithms.…”
Get full text
Article -
233
Short Blocklength Nonbinary Raptor-Like LDPC Coding Systems Design and Simulation
Published 2025-01-01“…Numerical simulations validate the approach, demonstrating the effectiveness of the constructed short NB QC-RL-LDPC codes, compared to the 5G standard binary coding with IR. …”
Get full text
Article -
234
Metrics for code obfuscation based on symbolic execution and N-scope complexity
Published 2022-12-01“…Code obfuscation has been well developed as mitigated endogenous security technology, to effectively resist MATE attacks (e.g.reverse engineering).And it also has important value for the reasonable metrics of code obfuscation effect.Since symbolic execution is widely used in anti-obfuscation attacks, metrics for code obfuscation resilience can refer to the efforts of generating input test set for executing all program paths.However, some adversarial techniques could reduce the symbol execution efficiency significantly based on the nested structure of the program and increase the error of the resilience reference.To solve the above problems, a metrics for code obfuscation was proposed based on symbolic execution and N-scope complexity.The obfuscation resilience was defined with symbolic execution time and obfuscation potency was defined based on the proposed N-scope complexity for better robustness in measuring the resilience of multi-nested structure programs.Furthermore, the correlation analysis of obfuscation effect was proposed and the effect was quantified by symbolic execution and control flow diagram extraction of programs.Over 4000 obfuscated programs from 3 open-sourced assemblies were evaluated with proposed metrics in the experiment, which indicated the generalization performance and practicality of the metrics.And an example of this metrics application was presented in a simulated obfuscation scenario which provided references of obfuscation technology metrics and obfuscation configuration for obfuscation users.…”
Get full text
Article -
235
-
236
Allelic expression of deleterious protein-coding variants across human tissues.
Published 2014-05-01“…In this regard, an important factor that can modify the effect of a pathogenic coding allele is its level of expression; a factor which itself characteristically changes across tissues. …”
Get full text
Article -
237
Analysis of network coding delay:a Markov state transfer approach
Published 2013-09-01“…Network coding has been validated as an effective means to improve network throughput and reliability,but the study of its delay performance is not enough.Agai the widely used random linear network coding,the proposed method,based on the Markov state transfer,analyzed the delay expectation and probability distribution of the unicast flow in a single hop scene,and presented the exact recursions.Then according to numerical simulation,the effect of the encoding parameters were analyzed such as the finite f eld size,the channel loss rate and the encoding batch size on the delay.The results show that,as the finite field q increases,the delay variance continues to become smaller; the average delay is almost linear with the channel loss rate and the encoding batch size individually.…”
Get full text
Article -
238
Privacy-utility tradeoff method using multi-variable source coding
Published 2015-12-01“…In the age of big data,data providers need to ensure their privacy,while data analysts need to mine the value of data.So,how to find the privacy-utility tradeoff has become a research hotspot.Current works mostly focus on privacy preserving methods,ignoring the data utility.Based on the current research of privacy utility equilibrium methods,a privacy-utility tradeoff method using multi-variable source coding was proposed to solve the problem that different public datasets in the same database have different privacy requirements.Two results are obtained by simulations.The first result is that the greater the association degree between the private information and public information,the increase of the distortion degree of public information will significantly improve the effect of privacy preservation.The second result is that public information with larger variance should be less distorted to ensure more utility.…”
Get full text
Article -
239
Color-code Strategy for Improving Writing Academic Paragraphs in EFL Classes
Published 2021-03-01“…The aim was to inspect and scrutinize the effect of color-code strategy on their proficiency regarding writing academic paragraphs. …”
Get full text
Article -
240
Manifestations of the European Ecological Footprint from the Perspective of Social Responsibility Codes
Published 2019-08-01“…At the same time, the variables included in the model were selected in accordance with the principles of the European Corporate Social Responsibility Strategy, serving as criteria for the hierarchy and clustering of European countries, for identifying patterns and predicting the behavior of ecological footprint of production, as a prerequisite for optimizing social environmental responsibility and applying social responsibility codes in the business environment. The analysis results indicate that the educational level of labor force, the degree of economic freedom and the use of renewable energy sources have a significant positive influence on the ecological footprint behavior, while the social exclusion has a significant negative effect, with a major impact on the prospects of sustainable growth, specific to bioeconomy.…”
Get full text
Article