Suggested Topics within your search.
Suggested Topics within your search.
-
1461
Randomness-free detection of non-projective measurements: qubits & beyond
Published 2025-01-01“…We provide numerical evidence for the robustness of this scheme under arbitrary depolarizing noise. For a more generic consideration (bipartite and tripartite scenario), we provide numerical evidence for a projective-simulable bound on the reward function for our task. …”
Get full text
Article -
1462
Crosstalk between metabolism and epigenetics during macrophage polarization
Published 2025-03-01“…These epigenetic modifications control gene expression by regulating chromatin accessibility, thereby modulating macrophage function and polarization. Histone acetylation generally promotes a more open chromatin structure conducive to gene activation, while histone methylation can either activate or repress gene expression depending on the specific residue and its methylation state. …”
Get full text
Article -
1463
Social Brain Perspectives on the Social and Evolutionary Neuroscience of Human Language
Published 2024-02-01“…But perhaps most critically, the following article argues that this and related research will allow scientists to generate a holistic profile and deeper understanding of the healthy adult social brain while developing more innovative and effective diagnoses, prognoses, and treatments for maladies and deficits also associated with the social brain.…”
Get full text
Article -
1464
Valency-affinity mapping of multivalent liposomes for tunable target cell discrimination
Published 2025-12-01“…To further map the BPI landscape, we measured particle binding to HEK293T cells transiently transfected with HER2-EGFP, leveraging the inherent transfection heterogeneity to generate continuous binding response curves as a function of HER2 expression. …”
Get full text
Article -
1465
A Fast Recognition Method for Space Targets in ISAR Images Based on Local and Global Structural Fusion Features with Lower Dimensions
Published 2020-01-01“…This method performs the trace transformation along the longest axis of the ISAR image to generate the global trace feature of the space target ISAR image. …”
Get full text
Article -
1466
SlidingConv: Domain-Specific Description of Sliding Discrete Cosine Transform Convolution for Halide
Published 2024-01-01“…In addition, a domain-specific language (DSL) of RecFilter was proposed to generate efficient IIR code for various hardware applications as an extension of image processing language, Halide. …”
Get full text
Article -
1467
Multiple Rows Mixers and Hsilu
Published 2025-06-01“…This approach can automatically generate linear layers that meet the requirements of a given branch number. …”
Get full text
Article -
1468
Multidimensional Fragility Analysis for a NEES Frame Structure by Integrating a New Energy Damage Index: Cumulative Plastic Strain
Published 2019-01-01“…Results show that (1) CPS damage index can fully consider the cumulative effect of damage under earthquakes, which makes up for the deficiency of the interstory drift damage index in this aspect, (2) the multidimensional fragility framework can deal with the PLS correlation and EDP correlation simultaneously, which will generate a more precise seismic damage assessment result, and (3) multidimensional fragility is sensitive to PLS threshold values and PLS correlation parameters.…”
Get full text
Article -
1469
Optimization of a Navigation System for Autonomous Charging of Intelligent Vehicles Based on the Bidirectional A* Algorithm and YOLOv11n Model
Published 2025-07-01“…The system utilizes the improved bidirectional A* algorithm to generate collision-free paths from the starting point to the charging area, dynamically adjusting the heuristic function by combining node–target distance and search iterations to optimize bidirectional search weights, pruning expanded nodes via a greedy strategy and smoothing paths into cubic Bézier curves for practical vehicle motion. …”
Get full text
Article -
1470
A novel lightweight hybrid cryptographic framework for secure smart card operations
Published 2025-05-01“…In this article, we propose a novel hybrid crypto standard to enhance the security and privacy of the transactions using smart cards, to achieve this we integrate Elliptic Curve Cryptography Curve25519 to generate secure keys, SPECK block cipher for lightweight encipherment with a powerful hash function for message authentication and integrity checks called PHOTON. …”
Get full text
Article -
1471
Análisis de imágenes mediante el método de los momentos usando funciones de base continuas a intervalos (PCBF)
Published 2015-01-01“…Abstract: Invariants generated departing from moments, previously extracted from an image, appear frequently in the bibliography as one of the most powerful means of describing images, and more precisely shapes. …”
Get full text
Article -
1472
Towards accurate L4 ocean colour products: Interpolating remote sensing reflectance via DINEOF
Published 2024-12-01“…These approaches, however, often fail to capture anomalous events or fine-scale resolution processes, calling for more advanced methods. The Data Interpolating Empirical Orthogonal Function (DINEOF) method has proved effective in reconstructing missing OC data and capturing smaller-scale features in noisy fields. …”
Get full text
Article -
1473
Metastable Reprogramming State of Single Transcription Factor-Derived Induced Hepatocyte-Like Cells
Published 2019-01-01“…These iHeps represent a hepatic state that is more mature compared with iHeps generated with multiple hepatic factors. …”
Get full text
Article -
1474
Social Networks Link Prediction Based on Incremental Learning
Published 2025-03-01“…An incremental update strategy is designed for each network layer to generate updated random walk sequences, employing a temporal random walk approach. …”
Get full text
Article -
1475
PA6 Stromal Cell Co-Culture Enhances SH-SY5Y and VSC4.1 Neuroblastoma Differentiation to Mature Phenotypes.
Published 2016-01-01“…Since neuroblastoma cells proliferate and generally do not express markers of mature or functional neurons, we exploited a co-culture system with the stromal cell line PA6 to better induce differentiation to a more physiologically relevant status. …”
Get full text
Article -
1476
Software diversity evaluation method based on the properties of ROP/JOP gadgets
Published 2022-12-01“…In order to reduce the risk of rapid spread of homogeneous attacks in network systems, and enhance network and software security, software diversification technologies are applied widely nowadays.Software diversification aims to generate functionally equivalent but internally changed program variants, thereby alter a single operating environment and mitigating homogenization attacks.The existing diversified technical evaluation index ROP gadgets survival rate is difficult to directly reflect the safety impact and the evaluation method is single.In order to evaluate the effectiveness of the diversification method more comprehensively and effectively, a software diversification evaluation method based on the properties of ROP/JOP gadgets is proposed, by analyzing common code reuse attacks, and turns abstract quantification into concrete indicators evaluates the security gain and effect of diversified methods from three aspects of space, time and quality.The method first discusses how diversification techniques affect ROP/JOP attacks according to the three properties of gadgets similarity, damage degree and availability.Nine kinds of diversification methods, such as instruction replacement, NOP insertion, and control flow flattening, are used to diversify the GNU coreutils assembly to generate diversification assembly.Experiments based on the property of gadgets are carried out on the diverse assemblies, and the effectiveness of different diversification methods and the impact on attacks are evaluated according to the experimental results.The experimental results show that this method can accurately evaluate the security gain of software diversification methods, the diversification technology will lead to the increase of the attack chain space required by the ROP/JOP attack, the longer time to construct the attack chain and the lower the attack success rate.The effects of different diversification methods are different, it has a guiding role for the follow-up research on diversified technologies with higher safety gains.…”
Get full text
Article -
1477
Influence of land use intensity on ecological corridors and wildlife crossings’ effectiveness: comparison of 2 pilot areas in Austria
Published 2024-12-01“…Human development and induced activities significantly affect the natural functioning of ecosystems and hence landscape connectivity. …”
Get full text
Article -
1478
Green extraction method and microencapsulation of tannins from young coconut husks-based food waste using gelatin/nanofiber cellulose
Published 2025-06-01“…Young coconut husk, a by-product of food waste, is generated in significant quantities, yet the potential of its bioactive compounds has not been fully explored. …”
Get full text
Article -
1479
RMixDA: A Random Compound Data Augmentation Operation Framework for Neural Machine Translation
Published 2025-01-01“…We further incorporate contrastive learning, identifying augmented data as positive or negative samples to evaluate similarity more effectively. Additionally, a novel evaluation method for augmented data quality is introduced, which is regularized by the NMT model’s loss function to improve the positive correlation between augmented data quality and model training. …”
Get full text
Article -
1480
Innovative Strategies For Social-Economic Development Financial Strategies In The Development Country
Published 2021-03-01“…The research study highlighted the need for both the government and financing institutions to support small businesses to function effectively to remain relevant, continue to generate more employment, improve the living standard of the owners of small business, and ultimately impact development country at large. …”
Get full text
Article