Showing 841 - 860 results of 2,920 for search 'more (functional OR function) generated', query time: 0.20s Refine Results
  1. 841

    Les boutiques dans les colonies de Lyon et de Vienne entre le i er s. av. et le iii e s. apr. J.-C. by Marine Lépée

    Published 2019-12-01
    “…Which traffic patterns were generated by these architectural and functional choices? …”
    Get full text
    Article
  2. 842

    The relationship between protein-energy wasting and cognitive impairment in patients receiving maintenance hemodialysis by Jun Liu, Jingfang Wan, Kehong Chen, Yani He, Weiwei Zhang, Jiyuan Luo, Dan Li

    Published 2025-07-01
    “…Baseline data, PEW-related indicators, and cognitive function scores were compared between the CI and non-CI groups. …”
    Get full text
    Article
  3. 843

    Hardcoded vulnerability detection approach for IoT device firmware by Chao MU, Xin WANG, Ming YANG, Heng ZHANG, Zhenya CHEN, Xiaoming WU

    Published 2022-10-01
    “…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
    Get full text
    Article
  4. 844

    In silico assessment of genetic variation in KCNA5 reveals multiple mechanisms of human atrial arrhythmogenesis. by Michael A Colman, Haibo Ni, Bo Liang, Nicole Schmitt, Henggui Zhang

    Published 2017-06-01
    “…In the tissue model, loss-of-function mutations facilitated breakdown of excitation waves at more physiological excitation rates than the wild-type, and the generation of early-after-depolarisations promoted unidirectional patterns of excitation. …”
    Get full text
    Article
  5. 845

    HEE-SegGAN: A holistically-nested edge enhanced GAN for pulmonary nodule segmentation. by Yong Wang, Seri Mastura Mustaza, Mohammad Syuhaimi Ab-Rahman, Siti Salasiah Mokri

    Published 2025-01-01
    “…To mitigate mode collapse, we incorporated minibatch discrimination in the discriminator, encouraging diversity in the generated samples. We also improved the loss function to better capture edge-level details and enhance segmentation precision in edge regions. …”
    Get full text
    Article
  6. 846

    Transcriptional analysis of a unique set of genes involved in Schistosoma mansoni female reproductive biology. by Alexis A Cogswell, Valerie P Kommer, David L Williams

    Published 2012-01-01
    “…Schistosomiasis affects more than 200 million people globally. The pathology of schistosome infections is due to chronic tissue inflammation and damage from immune generated granulomas surrounding parasite eggs trapped in host tissues. …”
    Get full text
    Article
  7. 847

    Revisiting the origin of non-volatile resistive switching in MoS2 atomristor by Asif A. Shah, Aadil Bashir Dar, Mayank Shrivastava

    Published 2024-12-01
    “…Our rigorous computations based on Density Functional Theory (DFT) and M3GNet (deep learned forcefield) to carry out structural relaxations and molecular dynamics reveal that such a popped state is unstable and does not represent any intrinsic non-volatile resistive state. …”
    Get full text
    Article
  8. 848

    Rapid mutation of endogenous zebrafish genes using zinc finger nucleases made by Oligomerized Pool ENgineering (OPEN). by Jonathan E Foley, Jing-Ruey J Yeh, Morgan L Maeder, Deepak Reyon, Jeffry D Sander, Randall T Peterson, J Keith Joung

    Published 2009-01-01
    “…<h4>Methodology/principal findings</h4>Here we show that OPEN can also be used to generate ZFNs that function efficiently in zebrafish. …”
    Get full text
    Article
  9. 849

    Mechanism of Transcranial Magnetic Stimulation Therapy for Neuropathic Pain by SUN Yujia, ZHANG Junfeng, YAN Long, FAN Shiyu, QIAN Yulin, CONG Shan, WANG Yu, YU Tao

    Published 2024-12-01
    “…As a mature non-invasive neuromodulation technique, transcranial magnetic stimulation (TMS) can generate transient magnetic pulses penetrating through the skull, induce changes in cortical neuronal potentials, and affect the function and structure of the nervous system, which can not only alleviate NP-related symptoms, but also improve NP-related emotional disorders. …”
    Get full text
    Article
  10. 850

    Notes on Whitehead space of an algebra by M. Arian-Nejad

    Published 2002-01-01
    “…Let R be a ring, and denote by [R,R] the group generated additively by the additive commutators of R. …”
    Get full text
    Article
  11. 851

    Urbanização e novas relações cidade-campo: os processos com a criação do estado do Tocantins e de sua capital Palmas na Amazônia Oriental by Kelly Bessa

    Published 2020-03-01
    “…These are all mechanisms that aim to accumulate capital, whether in the real estate sector or in the urban functional structure, hence attracting surpluses from the countryside and the wider region. …”
    Get full text
    Article
  12. 852

    Statistical Analysis of Tract-Tracing Experiments Demonstrates a Dense, Complex Cortical Network in the Mouse. by Rolf J F Ypma, Edward T Bullmore

    Published 2016-09-01
    “…These extremely weak connections are topologically more random and longer distance than the strongest connections, which are topologically more clustered and shorter distance (spatially clustered). …”
    Get full text
    Article
  13. 853

    Hepatitis B virus genotypes A1 and A2 have distinct replication phenotypes due to polymorphisms in the HBx gene. by Min Zhang, Karim Mouzannar, Zhensheng Zhang, Yuji Teraoka, Jason Piotrowski, Yuji Ishida, Chise Tateno-Mukaidani, Takeshi Saito, Hiromi Abe-Chayama, Kazuaki Chayama, T Jake Liang

    Published 2025-01-01
    “…HBVcc passaged in human liver chimeric mice (HBVmp) infected human hepatocytes more efficiently than that of the original HBVcc. …”
    Get full text
    Article
  14. 854

    Mechanical Behavior and Energy Evolution of Sandstone considering Slenderness Ratio Effect by Bibo Dai, Xingdong Zhao, Shuwen Zhang, Qian Kang, Zhonghua Zhu

    Published 2020-01-01
    “…When the slenderness ratio, D, is lower than 1.5, complex failures and multiple shear planes are formed, while simple failures and single shear planes are generated at D larger than 1.5. Besides, the AE ringing counts are more obvious with a higher slenderness ratio, D, at the initial compression stage due to the greater body volume and more defects in the sandstone. …”
    Get full text
    Article
  15. 855

    Advances in the study of the role of high-frequency mutant subunits of the SWI/SNF complex in tumors by Jiumei Zhao, Jing Zhu, Yu Tang, Kepu Zheng, Ziwei Li

    Published 2024-12-01
    “…As a catalytic subunit of the SWI/SNF complex, SMARCA4 has ATPase activity that catalyzes the hydrolysis of ATP to produce energy and power the chromatin remodeling complex, which is critical to the function of the SWI/SNF complex. The study data indicate that approximately 25% of cancers have one or more SWI/SNF subunit genetic abnormalities, and at least nine different SWI/SNF subunits have been identified as having repeated mutations multiple times in various cancers, suggesting that mutations affecting SWI/SNF subunits may introduce vulnerabilities to these cancers. …”
    Get full text
    Article
  16. 856

    Public security patrol path planning recommendation method based on wolf-pack optimization algorithm using DAF and BRS by Dongxing Wang, Gaomin Zhang, Fangbo Wu, Zhiyang Huang, Yiping Chen

    Published 2025-06-01
    “…Firstly, an optimization objective function regarding the public security patrol path planning (S3P-Function) was abstracted from the actual situation; Moreover, this paper proposed an improved wolf-pack optimization algorithm named DAF-BRS-CWOA using Dynamic-Adjustment-Factor(DAF) and Balanced-Raid-Strategy (BRS), and DAF devoted to adjust the overall wolf-pack running strategy by dynamically adjusting the number of airdropped wolves during the stage of Summon-Raid while BRS with symmetric property was to improve both the algorithm’s global exploration as well as the local development capabilities by increasing the number of checking locations, that means not only checking the reverse position of the current wolf, but also the positions generated according to certain rules between the reverse position of the current wolf and the current optimal wolf during the stage of Summon-Raid; Finally, DAF-BRS-CWOA was adopted to optimize S3P-Function, forming a public security patrol path planning recommendation method based on DAF-BRS-CWOA (S3PRM-DAF-BRS-CWOA). 30 independent numerical experiments were conducted on 20 public classical datasets by DAF-BRS-CWOA compared with GA, PSO, WDX-WPOA. …”
    Get full text
    Article
  17. 857

    Large Language Model-Guided SARSA Algorithm for Dynamic Task Scheduling in Cloud Computing by Bhargavi Krishnamurthy, Sajjan G. Shiva

    Published 2025-03-01
    “…Nowadays, more enterprises are rapidly transitioning to cloud computing as it has become an ideal platform to perform the development and deployment of software systems. …”
    Get full text
    Article
  18. 858

    A 3D Most Vulnerable Path Search Method for Physical Protection Systems Based on the EASI Model by Aiguo Li, Yanfeng Deng

    Published 2025-01-01
    “…The search efficiency is improved by restricting the intermediate points and the angle between the start and target points and improving the heuristic function. The improved algorithms are simulated and compared, and the results show that the paths generated by the improved algorithms are more reasonable, and the algorithms consume less time and have shorter path lengths.…”
    Get full text
    Article
  19. 859
  20. 860

    TRF1 and TRF2 form distinct shelterin subcomplexes at telomeres by Tomáš Janovič, Gloria I. Perez, Greta Boelting, Jens C. Schmidt

    Published 2025-09-01
    “…To quantitatively analyze shelterin function, we generated a panel of human cancer cell lines expressing HaloTagged shelterin proteins from their endogenous loci. …”
    Get full text
    Article