Suggested Topics within your search.
Suggested Topics within your search.
-
281
Non-coding RNAs participate in interactions between senescence and gastrointestinal cancers
Published 2025-01-01“…The currently accepted theory suggests that cellular senescence and cancer occurrence exhibit “double-edged sword” effects. Cellular senescence is related to cancer via four “meta-hallmarks” i.e., genomic instability, epigenetic alterations, chronic inflammation, and dysbiosis, along with two “antagonistic hallmarks” i.e., telomere attrition and stem cell exhaustion. …”
Get full text
Article -
282
Creating Entangled Logical Qubits in the Heavy-Hex Lattice with Topological Codes
Published 2024-12-01“…Instead, in order to emulate the denser connectivity required to implement well-known quantum error-correcting codes, many qubits remain effectively unused. In this work, we show how this bug can be turned into a feature. …”
Get full text
Article -
283
A Systematic Survey on Large Language Models for Static Code Analysis
Published 2025-06-01“…Thus, it opens the doors for developers and researchers to employ LLMs for affordable and effective static code analysis to improve software development process. …”
Get full text
Article -
284
Evaluating Python Static Code Analysis Tools Using FAIR Principles
Published 2024-01-01“…The quality of modern software relies heavily on the effective use of static code analysis tools. To improve their usefulness, these tools should be evaluated using a framework that prioritizes collaboration, user-friendliness, and long-term sustainability. …”
Get full text
Article -
285
PROPERTIES OF GROUPS G OF DOUBLE ERRORS AND ITS INVARIANTS IN BCH CODES
Published 2018-08-01“…The effectiveness of such approach was demonstrated by norm of syndrome theory that was developed by Belarusian school of noiseless coding at the turn of the XX and XXI century. …”
Get full text
Article -
286
Side information-driven image coding for hybrid machine–human vision
Published 2025-01-01“…We propose a side information-driven image coding for hybrid machine–human vision (SICMH) framework, not only for machine vision tasks, but also for human vision-oriented image reconstruction. …”
Get full text
Article -
287
The influence of computerized simulation techniques on maritime security exercises: ISPS code
Published 2024-02-01Get full text
Article -
288
Hybrid Window Decoding for Joint Source Channel Anytime Coding System
Published 2024-11-01“…Joint source channel anytime coding (JSCAC) is a kind of joint source channel coding (JSCC) systems based on the causal spatially coupled coding and joint expanding window decoding (JEWD) techniques. …”
Get full text
Article -
289
Malicious code within model detection method based on model similarity
Published 2023-08-01“…The privacy of user data in federated learning is mainly protected by exchanging model parameters instead of source data.However, federated learning still encounters many security challenges.Extensive research has been conducted to enhance model privacy and detect malicious model attacks.Nevertheless, the issue of risk-spreading through malicious code propagation during the frequent exchange of model data in the federated learning process has received limited attention.To address this issue, a method for detecting malicious code within models, based on model similarity, was proposed.By analyzing the iterative process of local and global models in federated learning, a model distance calculation method was introduced to quantify the similarity between models.Subsequently, the presence of a model carrying malicious code is detected based on the similarity between client models.Experimental results demonstrate the effectiveness of the proposed detection method.For a 178MB model containing 0.375MB embedded malicious code in a training set that is independent and identically distributed, the detection method achieves a true rate of 82.9% and a false positive rate of 1.8%.With 0.75MB of malicious code embedded in the model, the detection method achieves a true rate of 96.6% and a false positive rate of 0.38%.In the case of a non-independent and non-identically distributed training set, the accuracy of the detection method improves as the rate of malicious code embedding and the number of federated learning training rounds increase.Even when the malicious code is encrypted, the accuracy of the proposed detection method still achieves over 90%.In a multi-attacker scenario, the detection method maintains an accuracy of approximately 90% regardless of whether the number of attackers is known or unknown.…”
Get full text
Article -
290
Refining Software Clustering: The Impact of Code Co-Changes on Architectural Reconstruction
Published 2025-01-01“…These code co-changes can be analyzed and filtered to uncover logical dependencies, which complement structural or lexical dependencies. …”
Get full text
Article -
291
Convolutional sparse coding network for sparse seismic time-frequency representation
Published 2025-06-01“…To address this issue, we propose an interpretable convolutional sparse coding (CSC) network to achieve high TF resolution. …”
Get full text
Article -
292
Three-Dimensional Adaptive Modulation and Coding for DDO-OFDM Transmission System
Published 2017-01-01“…To evaluate the performance of the proposed algorithm, we tailor the system parameters of direct detection optical OFDM (DDO-OFDM) to investigate the difference of effective data rate (EDR) between fixed schemes and proposed adaptive modulation and coding (AMC) schemes. …”
Get full text
Article -
293
Non-Coding RNAs in Diagnostic Pathology of High-Grade Central Osteosarcoma
Published 2025-05-01“…Adjunct immunohistochemical approaches have demonstrated significant effectiveness in regard to cancer diagnostics, generally. …”
Get full text
Article -
294
Roles of Non-Coding RNA in Anthracycline Cardiotoxicity: A Narrative Review
Published 2025-07-01“…This review encapsulates the recent advancements in the field of non-coding RNA research in AIC, highlighting the prospect of non-coding RNAs as potential biomarkers and therapeutic targets for the condition. …”
Get full text
Article -
295
Short-Block Polar-Coded Reverse and Direct Reconciliation in CV-QKD
Published 2025-01-01“…Simulation results validate the effectiveness of our approach, demonstrating that Polar codes consistently outperform LDPC codes in quantum transmission scenarios having short block lengths under 512 bits. …”
Get full text
Article -
296
Sparse coding-based multiframe superresolution for efficient synchrotron radiation microspectroscopy
Published 2025-07-01“…This study presents a multiframe superresolution method using sparse coding to enhance synchrotron radiation microspectroscopy images. …”
Get full text
Article -
297
Cultural Codes of Society: Scientific and Practical Significance in Modern African Studies
Published 2021-12-01“…The relevance of the topic of cultural codes is considered in two aspects: from the point of view of contribution to the scientific development of the problems of cultural codes as an interdisciplinary problem and from the point of view of solving the practical task of increasing the effectiveness of the system of Russian-African relations based on mutual understanding and mutual respect of partners. …”
Get full text
Article -
298
The Necessity of Using MRI as an Imaging Modality in Acute Code Stroke in Indonesia
Published 2025-04-01“…Positive outcomes in thrombolysis patients using this protocol highlight its effectiveness. However, prolonged time-to-MRI indicates the need for further improvement. …”
Get full text
Article -
299
-
300
Research on differential Pattern time delay shift coding underwater acoustic communication
Published 2012-06-01“…A differential Pattern time delay shift coding(DPDS)method with a non-fixed code width based on the traditional Pattern time delay shift coding was proposed.The information is carried by the time delay between adjacent code element,the different linear frequency modulation(LFM)signal is used for adjacent code division.The DPDS system has an ability anti inter-symbol interference(ISI)and the Doppler effects.The computer simulation and lake tests prove that the DPDS system can improve the communication rate,inhibit the ISI caused by the multi-path channel and anti the Doppler effects.It is proved that the system has an effectiveness and robustness.…”
Get full text
Article