Search alternatives:
generate » general (Expand Search)
generated » generald (Expand Search)
Showing 881 - 900 results of 2,920 for search 'more function (generate OR generated)', query time: 0.21s Refine Results
  1. 881

    Stem Cells as a Tool to Improve Outcomes of Islet Transplantation by Emily Sims, Carmella Evans-Molina

    Published 2012-01-01
    “…The publication of the promising results of the Edmonton protocol in 2000 generated optimism for islet transplantation as a potential cure for Type 1 Diabetes Mellitus. …”
    Get full text
    Article
  2. 882

    Haplotype-resolved genomes of Trichophyton mentagrophytes and Trichophyton tonsurans by Sijie Feng, Zhenhui Wang, Kainan Lin, Kun Wang, Shuting Zheng, Qianqian Wang, Lianyu Lin, Yunkun Lu

    Published 2025-04-01
    “…BUSCO analysis of the assemblies revealed approximately 99% of genome completeness. More than 7500 protein-coding genes were identified, and over 99% of the genes were well annotated through multiple gene function databases. …”
    Get full text
    Article
  3. 883

    Challenges in Detecting Ecological Interactions Using Sedimentary Ancient DNA Data by Fiona Margaret Callahan, Jacky Kaiyuan Li, Rasmus Nielsen

    Published 2025-03-01
    “…ABSTRACT With increasing availability of ancient and modern environmental DNA technology, whole‐community species occurrence and abundance data over time and space is becoming more available. Sedimentary ancient DNA data can be used to infer associations between species, which can generate hypotheses about biotic interactions, a key part of ecosystem function and biodiversity science. …”
    Get full text
    Article
  4. 884

    Advanced machine learning technique for solving elliptic partial differential equations using Legendre spectral neural networks by Ishtiaq Ali

    Published 2025-02-01
    “…A Legendre polynomial based approach is utilized to generate neurons that fulfill the boundary conditions. …”
    Get full text
    Article
  5. 885

    Graph-based vision transformer with sparsity for training on small datasets from scratch by Peng Li, Lu Huang, Jin Li, Haiyan Yan, Dongjing Shan

    Published 2025-07-01
    “…In each block, queries and keys are calculated through graph convolutional projection based on the spatial adjacency matrix, while dot-product attention is used in another graph convolution to generate values. When using more attention heads, the queries and keys become lower-dimensional, making their dot product an uninformative matching function. …”
    Get full text
    Article
  6. 886

    COP Enhancement of Peltier-Based Dehumidifiers by Srithar Karuppiah, Venkatesan Raman, Rajkumar Natarajan, Saravanan Rajagopal

    Published 2025-06-01
    “…The Peltier dehumidifier, sometimes referred to as a thermoelectric dehumidifier, removes moisture using the Peltier effect to generate a temperature differential across a Peltier module. …”
    Get full text
    Article
  7. 887

    The relationship between protein-energy wasting and cognitive impairment in patients receiving maintenance hemodialysis by Jun Liu, Jingfang Wan, Kehong Chen, Yani He, Weiwei Zhang, Jiyuan Luo, Dan Li

    Published 2025-07-01
    “…Those combined with PEW were more likely to develop CI, and to suffer from more severe CI. …”
    Get full text
    Article
  8. 888

    Hardcoded vulnerability detection approach for IoT device firmware by Chao MU, Xin WANG, Ming YANG, Heng ZHANG, Zhenya CHEN, Xiaoming WU

    Published 2022-10-01
    “…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
    Get full text
    Article
  9. 889

    Numerical Simulation and Optimization of Water Hammer Protection Schemes for Long-Distance Gravity-Pressurized Water Conveyance Systems by HUANG Wei, LIAO Chen-xi, HUANG Xin, GU Ping, LIU Bin, HUANG Zi-yang

    Published 2025-06-01
    “…The hydraulic characteristics of such systems are more complex than those of pure gravity-driven systems. …”
    Get full text
    Article
  10. 890

    Mechanical Behavior and Energy Evolution of Sandstone considering Slenderness Ratio Effect by Bibo Dai, Xingdong Zhao, Shuwen Zhang, Qian Kang, Zhonghua Zhu

    Published 2020-01-01
    “…When the slenderness ratio, D, is lower than 1.5, complex failures and multiple shear planes are formed, while simple failures and single shear planes are generated at D larger than 1.5. Besides, the AE ringing counts are more obvious with a higher slenderness ratio, D, at the initial compression stage due to the greater body volume and more defects in the sandstone. …”
    Get full text
    Article
  11. 891

    A 3D Most Vulnerable Path Search Method for Physical Protection Systems Based on the EASI Model by Aiguo Li, Yanfeng Deng

    Published 2025-01-01
    “…The search efficiency is improved by restricting the intermediate points and the angle between the start and target points and improving the heuristic function. The improved algorithms are simulated and compared, and the results show that the paths generated by the improved algorithms are more reasonable, and the algorithms consume less time and have shorter path lengths.…”
    Get full text
    Article
  12. 892

    Automotive DNN-Based Object Detection in the Presence of Lens Obstruction and Video Compression by Gabriele Baris, Boda Li, Pak Hung Chan, Carlo Alberto Avizzano, Valentina Donzella

    Published 2025-01-01
    “…Recent advances in sensing, processing, machine learning, and communication technologies are accelerating assisted and automated functions development for commercial vehicles. Environmental perception sensor data streams are processed to generate a correct and complete situational awareness. …”
    Get full text
    Article
  13. 893

    Sucla2 Knock‐Out in Skeletal Muscle Yields Mouse Model of Mitochondrial Myopathy With Muscle Type–Specific Phenotypes by Makayla S. Lancaster, Paul Hafen, Andrew S. Law, Catalina Matias, Timothy Meyer, Kathryn Fischer, Marcus Miller, Chunhai Hao, Patrick Gillespie, David McKinzie, Jeffrey J. Brault, Brett H. Graham

    Published 2024-12-01
    “…Physiological and morphological analyses of hindlimb muscles showed remarkable differences in ex vivo function and cellular consequences between the EDL and SOL muscles, with SOL muscles significantly more impacted by Sucla2 inactivation. …”
    Get full text
    Article
  14. 894

    Identification of Ecological Security Pattern and Ecological Restoration Zoning Strategy in the Shandong Section of the Beijing-Hangzhou Grand Canal by Chizhou Xu, Yande Jing, Yiwen Zhang, Yingchun Liu, Wenyang Yin, Shiping Zhao

    Published 2025-02-01
    “…Additionally, 40 ecological corridors, 48 ecological pinch points, and 75 ecological barrier points were generated, densely distributed in the east. The area was divided into five core functional zones. (4) Conclusions: Establishing ecological function zones and considering landscape changes from high-frequency human activities in spatial planning can lead to a more reasonable division of ecological restoration areas. …”
    Get full text
    Article
  15. 895

    TRF1 and TRF2 form distinct shelterin subcomplexes at telomeres by Tomáš Janovič, Gloria I. Perez, Greta Boelting, Jens C. Schmidt

    Published 2025-09-01
    “…To quantitatively analyze shelterin function, we generated a panel of human cancer cell lines expressing HaloTagged shelterin proteins from their endogenous loci. …”
    Get full text
    Article
  16. 896
  17. 897

    A New Extention of the Odd Inverse Weibull-G Family of Distributions: Bayesian and Non-Bayesian Estimation with Engineering Applications by Yassmen Y. Abdelall, Amal Soliman Hassan, Ehab M. Almetwally

    Published 2024-11-01
    “…In this work, we propose a novel generator called the "extended odd inverse Weibull-generator" to obtain better distribution flexibility. …”
    Get full text
    Article
  18. 898

    On Convergence Rate of MRetrace by Xingguo Chen, Wangrong Qin, Yu Gong, Shangdong Yang, Wenhao Wang

    Published 2024-09-01
    “…In this paper, we propose an essentially simplified version of a convergence rate to generate general off-policy temporal difference learning algorithms. …”
    Get full text
    Article
  19. 899

    DEGNN: A Deep Learning-Based Method for Unmanned Aerial Vehicle Software Security Analysis by Jiang Du, Qiang Wei, Yisen Wang, Xingyu Bai

    Published 2025-02-01
    “…It uses call-enhanced control graphs and attention mechanisms to generate dual embeddings of functions and predict similarity based on graph structures and node features. …”
    Get full text
    Article
  20. 900

    Advances in the study of the role of high-frequency mutant subunits of the SWI/SNF complex in tumors by Jiumei Zhao, Jing Zhu, Yu Tang, Kepu Zheng, Ziwei Li

    Published 2024-12-01
    “…As a catalytic subunit of the SWI/SNF complex, SMARCA4 has ATPase activity that catalyzes the hydrolysis of ATP to produce energy and power the chromatin remodeling complex, which is critical to the function of the SWI/SNF complex. The study data indicate that approximately 25% of cancers have one or more SWI/SNF subunit genetic abnormalities, and at least nine different SWI/SNF subunits have been identified as having repeated mutations multiple times in various cancers, suggesting that mutations affecting SWI/SNF subunits may introduce vulnerabilities to these cancers. …”
    Get full text
    Article