Showing 481 - 500 results of 2,943 for search '"ENCODE"', query time: 0.04s Refine Results
  1. 481

    Pharmacogenetics of Oral Antidiabetic Drugs by Matthijs L. Becker, Ewan R. Pearson, Ivan Tkáč

    Published 2013-01-01
    “…The gene variants in CYP2C9, ABCC8/KCNJ11, and TCF7L2 were associated with the effect of sulfonylureas. CYP2C9 encodes sulfonylurea metabolizing cytochrome P450 isoenzyme 2C9, ABCC8 and KCNJ11 genes encode proteins constituting ATP-sensitive K+ channel which is a therapeutic target for sulfonylureas, and TCF7L2 is a gene with the strongest association with type 2 diabetes. …”
    Get full text
    Article
  2. 482

    Global biogeography and projection of antimicrobial toxin genes by Ya Liu, Yu Geng, Yiru Jiang, Jingyu Sun, Peng Li, Yue-zhong Li, Zheng Zhang

    Published 2025-02-01
    “…Abstract Background Antimicrobial toxin genes (ATGs) encode potent antimicrobial weapons in nature that rival antibiotics, significantly impacting microbial survival and offering potential benefits for human health. …”
    Get full text
    Article
  3. 483

    LLM-Guided Crowdsourced Test Report Clustering by Ying Li, Ye Zhong, Lijuan Yang, Yanbo Wang, Penghua Zhu

    Published 2025-01-01
    “…The method in this paper uses a pre-trained LLM (such as GPT-4) to encode the text in the test report, and uses a visual model such as CLIP to encode the application screenshots, converting the text descriptions and images into high-dimensional semantic vectors. …”
    Get full text
    Article
  4. 484

    Provable secure digital watermarking scheme

    Published 2008-01-01
    “…A novel provable security watermarking scheme was presented by adopting the digital watermarking technol-ogy,cryptology and encode method,it comprises embedding watermarks scheme and detecting watermarks scheme.The participant ID,Hash of the digital work and watermarking keys are regarded as the watermarks in the scheme,so that the watermarks can be used to authenticate lawful user and judge the ownership.The scheme has rigorously security almost against all watermarks protocol attacks.Especially,it has correct ability,as so as higher efficiency.…”
    Get full text
    Article
  5. 485

    Exploring Aggregated wav2vec 2.0 Features and Dual-Stream TDNN for Efficient Spoken Dialect Identification by Ananya Angra, H. Muralikrishna, Dileep Aroor Dinesh, Veena Thenkanidiyoor

    Published 2025-01-01
    “…Efficiency of a DID system depends on how well the input features encode the DID-specific contents in the speech that is spread across the utterance. …”
    Get full text
    Article
  6. 486

    Designing Instruction to Guide Reflection by R.G. (Tre) Easterly

    Published 2024-07-01
    “… Reflection is critical because it helps the learner encode their new knowledge, helping them tie what they experienced in class with what they already know and believe. …”
    Get full text
    Article
  7. 487

    Aberrant Alternative Splicing Is Another Hallmark of Cancer by Michael Ladomery

    Published 2013-01-01
    “…Splice isoforms often encode proteins that have distinct and even antagonistic properties. …”
    Get full text
    Article
  8. 488

    Zabawy dzieci w różnych kulturach – perspektywa antropologiczno-pedagogiczna by Urszula Markowska-Manista

    Published 2022-10-01
    “…New global processes and transformations, in which children are the most numerous group of participants, enable a broader insight into their situation and, above all, into play and toys – tools with which they recognize, encode and learn about the surrounding world. …”
    Get full text
    Article
  9. 489

    Dynamic representation of appetitive and aversive stimuli in nucleus accumbens shell D1- and D2-medium spiny neurons by Ana Verónica Domingues, Tawan T. A. Carvalho, Gabriela J. Martins, Raquel Correia, Bárbara Coimbra, Ricardo Bastos-Gonçalves, Marcelina Wezik, Rita Gaspar, Luísa Pinto, Nuno Sousa, Rui M. Costa, Carina Soares-Cunha, Ana João Rodrigues

    Published 2025-01-01
    “…Abstract The nucleus accumbens (NAc) is a key brain region for motivated behaviors, yet how distinct neuronal populations encode appetitive or aversive stimuli remains undetermined. …”
    Get full text
    Article
  10. 490

    fragSMILES as a chemical string notation for advanced fragment and chirality representation by Fabrizio Mastrolorito, Fulvio Ciriaco, Maria Vittoria Togo, Nicola Gambacorta, Daniela Trisciuzzi, Cosimo Damiano Altomare, Nicola Amoroso, Francesca Grisoni, Orazio Nicolotti

    Published 2025-01-01
    “…String based molecular representations, such as SMILES (Simplified Molecular Input Line Entry System) and SELFIES (Self-Referencing Embedded Strings), have played a pivotal role in the success of generative approaches, thanks to their capacity to encode atom- and bond- information and ease-of-generation. …”
    Get full text
    Article
  11. 491

    Automatic extraction for the traffic of unknown network applications by Bian-qin WANG, Shun-zheng YU

    Published 2014-07-01
    “…The proposed method can firstly encode certain bytes of message payload, then separate and classify the unknown mixed traffic using an extended ROCK algorithm. …”
    Get full text
    Article
  12. 492

    Orbifold ETW brane and half-indices by Yasuyuki Hatsuda, Hai Lin, Tadashi Okazaki

    Published 2024-12-01
    “…We find precise matching pairs of the half-indices as strong evidence of dualities of the half-BPS boundary conditions and interfaces. The half-indices encode the spectra of excitations on the holographically dual orbifold ETW brane and giant gravitons. …”
    Get full text
    Article
  13. 493

    Fast inter prediction algorithm applied in quality SVC by WANG Da-yong1, SHU Jian2

    Published 2011-01-01
    “…Based on the characteristics of quality scalable video coding,a fast inter encoding algorithm was proposed on the enhancement layer for the medium-grain quality scalability(MGS).Firstly,based on the base layer macroblock mode and rate-distortion,the order of the coding mode for the current macro block was proposed.Then based on the encode structure,the correlation between layers,and the spatial correlation,desicions for the Direct coding mode,layer mode,and adjacent mode were proposed,respectively.Finally,the macroblocks were encoded in the order predicted,with the proposed three decisions to improve on the coding speed by early termination.The experimental results show that the computational complexity of the algorithm is reduced by 68% on the average compared to that of the standard method,with only negligible coding loss and bit-rate increase.…”
    Get full text
    Article
  14. 494

    Complementary Roles of Hippocampus and Medial Entorhinal Cortex in Episodic Memory by P. A. Lipton, H. Eichenbaum

    Published 2008-01-01
    “…These findings suggest complementary contributions of the hippocampus and medial entorhinal cortex in support of episodic memory, wherein hippocampal networks encode sequences of events that compose temporally and spatially extended episodes, whereas medial entorhinal networks disambiguate overlapping episodes by binding sequential events into distinct memories.…”
    Get full text
    Article
  15. 495

    Space-time coding scheme for the paired weak user in MIMO-NOMA systems by Mingyan GONG, Zhen YANG

    Published 2018-06-01
    “…In view of the paired weak user’s poor outage performance in multiple-input multiple-output non-orthogonal multiple access (MIMO-NOMA) systems,Alamouti code was adopted to encode for the weak user in order to improve its outage performance by means of diversity,and the closed-form expression of the strong user’s ergodic capacity as well as the boundary-form expressions of the weak user’s ergodic capacity and outage probability was derived in the proposed model.Moreover,a power allocation algorithm for optimizing the system’s throughput was proposed.Finally,the numerical results show the accuracy of the derived expressions,the efficacy of the proposed algorithm,and that the weak user’s outage performance in the proposed coding scheme is far superior to that in the current coding scheme only adopting vertical Bell lab layered space-time (V-BLAST) code.…”
    Get full text
    Article
  16. 496

    Wyner-Ziv spatial scalable video coding using compressive sensing in ubiquitous networks by GAN Zong-liang, QI Li-na, TANG Gui-jin, ZHU Xiu-chang

    Published 2010-01-01
    “…A novel Wyner-Ziv spatial scalable video coding using compressive sensing was proposed for the ubiquitous networks.At the encoder,both the base layer and enhancement layer encode the video signal independent,in which down-sampling video was coded by H.264 in the based layer and original video was coded with adaptive compressive sensing measurement,quantization and entropy coding in the enhancement layer.At the decoder,the base layer and enhancement layer jointly recovered the video signal using compressive sensing approach based on joint sparse model of inter frames.Theoretical analysis and experimental results show that the proposed video coding method can flexibly adjust the bit stream,and has better rate-distortion performance and the robustness of transmission.…”
    Get full text
    Article
  17. 497

    Imitation and the development of infant learning, memory, and categorisation by Emily JH Jones, Jane S Herbert

    Published 2009-11-01
    “…For this type of learning to have an impact over the long-term, the infant must be able to encode, store, and retrieve the information they receive for use at a later date. …”
    Get full text
    Article
  18. 498

    Learner preferences prediction with mixture embedding of knowledge and behavior graph by Xiaoguang LI, Lei GONG, Xiaoli LI, Xin ZHANG, Ge YU

    Published 2021-08-01
    “…To solve the problems of inaccurate prediction of learner preference and insufficient utilization of structural information in the knowledge recommendation model, for the knowledge structure and learner behavior structure in the learner’s preference prediction model, the model of learner preferences predication with mixture embedding of knowledge and behavior graph was proposed.First, considering using graph convolution network (GCN) to fit structural information, GCN was extended to knowledge graph and behavior graph, the purpose of which was to obtain learners’ overall learning pattern and individual learning pattern.Then, the difference between knowledge structure and behavior structure was used to fit learners’ individual preferences, and recurrent neural network was used to encode and decode learners’ preferences to obtain the distribution of learners’ preference distribution.The experimental results on the real datasets demonstrate that the proposed model has a good effect on predicting learner preferences.…”
    Get full text
    Article
  19. 499

    HVS-based rate-control scheme for object-based embedded image coding by Dong-jie LI, Zhong-jie ZHU, Yu-er WANG

    Published 2012-04-01
    “…A new rate control algorithm for object-based embedded coding was proposed by incorporating the characteristics of human visual systems (HVS).Firstly,the importance and coding priority of each visual object were estimated.Then,bit-plane modeling and entropy coding were implemented for each object based on the coding priority and its corresponding bit stream was outputted.Finally,bit streams of visual objects were truncated and reassembled based on the rate-distortion optimization principle under the given bit rate.Experimental results reveal that the proposed algorithm can encode and transmit different important objects with different strategies.Compared with the PCRD algorithm,the proposed algorithm can improve the overall visual quality of the reconstructed image.…”
    Get full text
    Article
  20. 500

    Monogamy relations for relativistically causal correlations by Mirjam Weilenmann

    Published 2025-01-01
    “…Abstract Non-signalling conditions encode minimal requirements that any (quantum) systems must satisfy in order to be consistent with special relativity. …”
    Get full text
    Article