Search alternatives:
generate » general (Expand Search)
generated » generald (Expand Search)
Showing 1,461 - 1,480 results of 2,920 for search 'more function (generate OR (generated OR generated))', query time: 0.21s Refine Results
  1. 1461

    Randomness-free detection of non-projective measurements: qubits & beyond by Sumit Rout, Some Sankar Bhattacharya, Paweł Horodecki

    Published 2025-01-01
    “…We provide numerical evidence for the robustness of this scheme under arbitrary depolarizing noise. For a more generic consideration (bipartite and tripartite scenario), we provide numerical evidence for a projective-simulable bound on the reward function for our task. …”
    Get full text
    Article
  2. 1462

    Crosstalk between metabolism and epigenetics during macrophage polarization by Kangling Zhang, Chinnaswamy Jagannath

    Published 2025-03-01
    “…These epigenetic modifications control gene expression by regulating chromatin accessibility, thereby modulating macrophage function and polarization. Histone acetylation generally promotes a more open chromatin structure conducive to gene activation, while histone methylation can either activate or repress gene expression depending on the specific residue and its methylation state. …”
    Get full text
    Article
  3. 1463

    Social Brain Perspectives on the Social and Evolutionary Neuroscience of Human Language by Nathan Oesch

    Published 2024-02-01
    “…But perhaps most critically, the following article argues that this and related research will allow scientists to generate a holistic profile and deeper understanding of the healthy adult social brain while developing more innovative and effective diagnoses, prognoses, and treatments for maladies and deficits also associated with the social brain.…”
    Get full text
    Article
  4. 1464

    Valency-affinity mapping of multivalent liposomes for tunable target cell discrimination by Victor A. Garcia, Paulina M. Eberts, Brenda M. Ogle, Casim A. Sarkar

    Published 2025-12-01
    “…To further map the BPI landscape, we measured particle binding to HEK293T cells transiently transfected with HER2-EGFP, leveraging the inherent transfection heterogeneity to generate continuous binding response curves as a function of HER2 expression. …”
    Get full text
    Article
  5. 1465

    A Fast Recognition Method for Space Targets in ISAR Images Based on Local and Global Structural Fusion Features with Lower Dimensions by Hong Yang, Yasheng Zhang, Wenzhe Ding

    Published 2020-01-01
    “…This method performs the trace transformation along the longest axis of the ISAR image to generate the global trace feature of the space target ISAR image. …”
    Get full text
    Article
  6. 1466

    SlidingConv: Domain-Specific Description of Sliding Discrete Cosine Transform Convolution for Halide by Yamato Kanetaka, Hiroyasu Takagi, Yoshihiro Maeda, Norishige Fukushima

    Published 2024-01-01
    “…In addition, a domain-specific language (DSL) of RecFilter was proposed to generate efficient IIR code for various hardware applications as an extension of image processing language, Halide. …”
    Get full text
    Article
  7. 1467

    Multiple Rows Mixers and Hsilu by Xiaobin Yu, Meicheng Liu

    Published 2025-06-01
    “…This approach can automatically generate linear layers that meet the requirements of a given branch number. …”
    Get full text
    Article
  8. 1468

    Multidimensional Fragility Analysis for a NEES Frame Structure by Integrating a New Energy Damage Index: Cumulative Plastic Strain by Qiang Wang, Ziyan Wu

    Published 2019-01-01
    “…Results show that (1) CPS damage index can fully consider the cumulative effect of damage under earthquakes, which makes up for the deficiency of the interstory drift damage index in this aspect, (2) the multidimensional fragility framework can deal with the PLS correlation and EDP correlation simultaneously, which will generate a more precise seismic damage assessment result, and (3) multidimensional fragility is sensitive to PLS threshold values and PLS correlation parameters.…”
    Get full text
    Article
  9. 1469

    Optimization of a Navigation System for Autonomous Charging of Intelligent Vehicles Based on the Bidirectional A* Algorithm and YOLOv11n Model by Shengkun Liao, Lei Zhang, Yunli He, Junhui Zhang, Jinxu Sun

    Published 2025-07-01
    “…The system utilizes the improved bidirectional A* algorithm to generate collision-free paths from the starting point to the charging area, dynamically adjusting the heuristic function by combining node–target distance and search iterations to optimize bidirectional search weights, pruning expanded nodes via a greedy strategy and smoothing paths into cubic Bézier curves for practical vehicle motion. …”
    Get full text
    Article
  10. 1470

    A novel lightweight hybrid cryptographic framework for secure smart card operations by Kranthi Kumar Singamaneni

    Published 2025-05-01
    “…In this article, we propose a novel hybrid crypto standard to enhance the security and privacy of the transactions using smart cards, to achieve this we integrate Elliptic Curve Cryptography Curve25519 to generate secure keys, SPECK block cipher for lightweight encipherment with a powerful hash function for message authentication and integrity checks called PHOTON. …”
    Get full text
    Article
  11. 1471

    Análisis de imágenes mediante el método de los momentos usando funciones de base continuas a intervalos (PCBF) by Sergio Domínguez

    Published 2015-01-01
    “…Abstract: Invariants generated departing from moments, previously extracted from an image, appear frequently in the bibliography as one of the most powerful means of describing images, and more precisely shapes. …”
    Get full text
    Article
  12. 1472

    Towards accurate L4 ocean colour products: Interpolating remote sensing reflectance via DINEOF by Christian Marchese, Simone Colella, Vittorio Ernesto Brando, Maria Laura Zoffoli, Gianluca Volpe

    Published 2024-12-01
    “…These approaches, however, often fail to capture anomalous events or fine-scale resolution processes, calling for more advanced methods. The Data Interpolating Empirical Orthogonal Function (DINEOF) method has proved effective in reconstructing missing OC data and capturing smaller-scale features in noisy fields. …”
    Get full text
    Article
  13. 1473

    Metastable Reprogramming State of Single Transcription Factor-Derived Induced Hepatocyte-Like Cells by Seon In Hwang, Tae Hwan Kwak, Ji Hyun Kang, Jonghun Kim, Hyunseong Lee, Kee-Pyo Kim, Kinarm Ko, Hans R. Schöler, Dong Wook Han

    Published 2019-01-01
    “…These iHeps represent a hepatic state that is more mature compared with iHeps generated with multiple hepatic factors. …”
    Get full text
    Article
  14. 1474

    Social Networks Link Prediction Based on Incremental Learning by Jian SHU, Zhichen CHEN

    Published 2025-03-01
    “…An incremental update strategy is designed for each network layer to generate updated random walk sequences, employing a temporal random walk approach. …”
    Get full text
    Article
  15. 1475

    PA6 Stromal Cell Co-Culture Enhances SH-SY5Y and VSC4.1 Neuroblastoma Differentiation to Mature Phenotypes. by Ross Ferguson, Vasanta Subramanian

    Published 2016-01-01
    “…Since neuroblastoma cells proliferate and generally do not express markers of mature or functional neurons, we exploited a co-culture system with the stromal cell line PA6 to better induce differentiation to a more physiologically relevant status. …”
    Get full text
    Article
  16. 1476

    Software diversity evaluation method based on the properties of ROP/JOP gadgets by Yuning CHI, Yunfei GUO, Yawen WANG, Hongchao HU

    Published 2022-12-01
    “…In order to reduce the risk of rapid spread of homogeneous attacks in network systems, and enhance network and software security, software diversification technologies are applied widely nowadays.Software diversification aims to generate functionally equivalent but internally changed program variants, thereby alter a single operating environment and mitigating homogenization attacks.The existing diversified technical evaluation index ROP gadgets survival rate is difficult to directly reflect the safety impact and the evaluation method is single.In order to evaluate the effectiveness of the diversification method more comprehensively and effectively, a software diversification evaluation method based on the properties of ROP/JOP gadgets is proposed, by analyzing common code reuse attacks, and turns abstract quantification into concrete indicators evaluates the security gain and effect of diversified methods from three aspects of space, time and quality.The method first discusses how diversification techniques affect ROP/JOP attacks according to the three properties of gadgets similarity, damage degree and availability.Nine kinds of diversification methods, such as instruction replacement, NOP insertion, and control flow flattening, are used to diversify the GNU coreutils assembly to generate diversification assembly.Experiments based on the property of gadgets are carried out on the diverse assemblies, and the effectiveness of different diversification methods and the impact on attacks are evaluated according to the experimental results.The experimental results show that this method can accurately evaluate the security gain of software diversification methods, the diversification technology will lead to the increase of the attack chain space required by the ROP/JOP attack, the longer time to construct the attack chain and the lower the attack success rate.The effects of different diversification methods are different, it has a guiding role for the follow-up research on diversified technologies with higher safety gains.…”
    Get full text
    Article
  17. 1477

    Influence of land use intensity on ecological corridors and wildlife crossings’ effectiveness: comparison of 2 pilot areas in Austria by Mořic Jurečka, Richard Andrášik, Petr Čermák, Florian Danzinger, Christoph Plutzar, Roland Grillmayer, Tomáš Mikita, Tomáš Bartonička

    Published 2024-12-01
    “…Human development and induced activities significantly affect the natural functioning of ecosystems and hence landscape connectivity. …”
    Get full text
    Article
  18. 1478

    Green extraction method and microencapsulation of tannins from young coconut husks-based food waste using gelatin/nanofiber cellulose by Luh Putu Wrasiati, Ardhinata Antares, Anak Agung Made Dewi Anggreni, Bambang Admadi Harsojuwono, Ida Bagus Wayan Gunam, Vilas Nitivattananon, I Wayan Arnata

    Published 2025-06-01
    “…Young coconut husk, a by-product of food waste, is generated in significant quantities, yet the potential of its bioactive compounds has not been fully explored. …”
    Get full text
    Article
  19. 1479

    RMixDA: A Random Compound Data Augmentation Operation Framework for Neural Machine Translation by Huijun Wang, Xiaojing Du, Xinkun Hao

    Published 2025-01-01
    “…We further incorporate contrastive learning, identifying augmented data as positive or negative samples to evaluate similarity more effectively. Additionally, a novel evaluation method for augmented data quality is introduced, which is regularized by the NMT model’s loss function to improve the positive correlation between augmented data quality and model training. …”
    Get full text
    Article
  20. 1480

    Innovative Strategies For Social-Economic Development Financial Strategies In The Development Country by Chukwu Anthony Ogochukwu, Karina Kasztelnik

    Published 2021-03-01
    “…The research study highlighted the need for both the government and financing institutions to support small businesses to function effectively to remain relevant, continue to generate more employment, improve the living standard of the owners of small business, and ultimately impact development country at large. …”
    Get full text
    Article