Showing 721 - 740 results of 7,621 for search 'effect coding', query time: 0.17s Refine Results
  1. 721

    The mechanism underlying metastasis in triple-negative breast cancer: focusing on the interplay between ferroptosis, epithelial-mesenchymal transition, and non-coding RNAs by Ziyi Chen, Yi Zhao, Yi Zhao

    Published 2025-01-01
    “…It is urgent to focus on identifying a workable and effective target for the treatment of TNBC. Cancer metastasis is significantly influenced by epithelial-mesenchymal transition (EMT). …”
    Get full text
    Article
  2. 722

    AKT: A Central Node in Complex Signaling Cascades by Kentaro Minegishi, Yoh Dobashi, Emi Kimura, Akiteru Goto

    Published 2025-05-01
    “…Finally, we discuss strategies that might lead to more effective targeting of Akt for clinical cancer therapy.…”
    Get full text
    Article
  3. 723

    An Innovative Image Encryption Algorithm Based on the DNAS_box and Hyperchaos by Da Qiu, Tingting Zhang, Jingyi Liu, Song Liu, Peiyu He

    Published 2025-02-01
    “…The algorithm dynamically constructs a DNAS_box using 2-bit deoxyribonucleic acid (DNA) coding and 4-bit DNA-like coding, enabling seamless conversion between these two coding schemes. …”
    Get full text
    Article
  4. 724

    Pyramidal Predictive Network V2: An Improved Predictive Architecture and Training Strategies for Future Perception Prediction by Chaofan Ling, Junpei Zhong, Weihua Li, Ran Dong, Mingjun Dai

    Published 2025-03-01
    “…In this paper, we propose an improved version of the Pyramidal Predictive Network (PPNV2), a theoretical framework inspired by predictive coding, which addresses the limitations of its predecessor (PPNV1) in the task of future perception prediction. …”
    Get full text
    Article
  5. 725

    CircRNA-based AntimiR therapy: A novel approach to hypertension treatment by Vahideh Tarhriz, Kamran Hosseini, Leila Abkhooie, Eric Lazartigues

    Published 2025-08-01
    “…The increasing recognition of the types and functions of non-coding RNAs has opened new avenues for their use as novel therapeutic strategies in the treatment of chronic diseases such as hypertension. …”
    Get full text
    Article
  6. 726

    Hardcoded vulnerability detection approach for IoT device firmware by Chao MU, Xin WANG, Ming YANG, Heng ZHANG, Zhenya CHEN, Xiaoming WU

    Published 2022-10-01
    “…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
    Get full text
    Article
  7. 727
  8. 728

    Sequence simplification of antigen coding IVT mRNA allows accelerated synthetic DNA template generation and epitope immunogenicity validation by Arthur Esprit, Dorien Autaers, Ilke Aernout, Ine Lentacker, Steve Pascolo, Kris Thielemans, Karine Breckpot, Lorenzo Franceschini

    Published 2025-09-01
    “…After initial investigation, showcasing the effect of sequence, or chemical, modifications on mRNA translation and protein expression, we validated the effect of a structural deconstruction on antigen coding mRNA, observing preserved antigen presentation upon removal of stabilizing structures like the 5′ and 3′ UTRs and poly-A tail. …”
    Get full text
    Article
  9. 729

    The self-checking integrated control circuits synthesis based on the boolean complement method to "2-out-of-4" constant-weight code by D. V. Efanov, V. V. Sapozhnikov, Vl. V. Sapozhnikov, D. V. Pivovarov

    Published 2018-12-01
    “…The article explores the peculiarities of self-checking integrated control circuits synthesis by the Boolean complement method based on the "2-out-of-4'' constant-weight code. The article describes the features of integrated control circuits implementation by the Boolean complement method. …”
    Get full text
    Article
  10. 730

    Use of the thermo-hydraulic system code RELAP5/MOD3.2 to transient analysis events of the VR-1 reactor by Jakub Mátl, Filip Fejt

    Published 2025-05-01
    “…Key findings highlight the significant influence of user effects and reactor vessel nodalisation on the accuracy and reliability of these predictions. …”
    Get full text
    Article
  11. 731

    La grande muraille de Gortyne sans lecteur ? Le soi-disant Code comme monument d’apparat civique by Antoine Chabod

    Published 2022-12-01
    “…Résumé : L’inscription IC iv 72, communément appelée « code de Gortyne », est l’une des plus longues inscriptions grecques connues. …”
    Get full text
    Article
  12. 732

    Epigenetic influence of long non-coding RNAs on the development of insulin resistance in metabolically associated fatty liver disease (part 1) by O.E. Abaturov, V.S. Berezenko, A.O. Nikulina

    Published 2025-04-01
    “…MAFLD is associated with a high risk of developing T2DM, its presence increases the likelihood of T2DM by approximately two times during the next five years of the patient’s life. Long non-coding RNAs are directly involved in the development of IR, the determination of the level of their expression can significantly increase the effectiveness of diagnosis and prognosis of the disease. …”
    Get full text
    Article
  13. 733
  14. 734

    Development of Enrichment Book of Banjarnegara Folktales in Ngapak Dialect Assisted by Audio Quick Response (QR) Code for High School Students by Dina Ariyani, Mujimin Mujimin

    Published 2025-04-01
    “…According to the results of the expert validation test, the product received a total score of 382, indicating it is feasible. Furthermore, the effectiveness test results showed a significance value of 0.00, confirming its effectiveness.…”
    Get full text
    Article
  15. 735

    Employing a low-code machine learning approach to predict in-hospital mortality and length of stay in patients with community-acquired pneumonia by Hao Chen, Shurui Zhang, Hiromi Matsumoto, Nanami Tsuchiya, Chihiro Yamada, Shunsuke Okasaki, Atsushi Miyasaka, Kentaro Yumoto, Daiki Kanou, Fumihiro Kashizaki, Harumi Koizumi, Kenichi Takahashi, Masato Shimizu, Nobuyuki Horita, Takeshi Kaneko

    Published 2025-01-01
    “…The potential of machine learning to enhance prediction accuracy in this context is significant, yet clinicians often lack the programming skills required for effective data mining. This study aimed to assess the effectiveness of a low-code approach for assisting clinicians with data mining for mortality and length of stay (LOS) prediction in patients with CAP. …”
    Get full text
    Article
  16. 736
  17. 737

    A Significant Commitment: The Introduction of a Unified European Code on ADRS to Regulate Consumer Disputes. Several Challenges in the Enforcement Area by Ermelinda Hepaj

    Published 2025-05-01
    “…In this regard, for a comprehensive and diversified overview of the topic, particular attention will be given to the creation of a European unified code where the effectiveness of protection receives new and more significant importance. …”
    Get full text
    Article
  18. 738
  19. 739

    BioDeepfuse: a hybrid deep learning approach with integrated feature extraction techniques for enhanced non-coding RNA classification by Anderson P. Avila Santos, Breno L. S. de Almeida, Robson P. Bonidia, Peter F. Stadler, Polonca Stefanic, Ines Mandic-Mulec, Ulisses Rocha, Danilo S. Sanches, André C.P.L.F. de Carvalho

    Published 2024-12-01
    “…The accurate classification of non-coding RNA (ncRNA) sequences is pivotal for advanced non-coding genome annotation and analysis, a fundamental aspect of genomics that facilitates understanding of ncRNA functions and regulatory mechanisms in various biological processes. …”
    Get full text
    Article
  20. 740

    Development of a Clinical Decision Support System for Evidence-Based Management of Hypertension in Older Patients Using a No-code Platform by Venera Zh. Kudabaeva, Almagul T. Mansharipova, Larisa V. Shulzhenko, Gleb S. Krasnov, Igor V. Pershukov

    Published 2025-02-01
    “…Physicians are in need of comprehensive assessment tools to effectively manage hypertension in older patients.We conducted a literature search and evaluated current studies, systematic reviews and meta-analyses, exploring the relationship between hypertension and frailty. …”
    Get full text
    Article