-
501
Affective prosody in grunts of young chimpanzees
Published 2023-03-01“…Humans acoustically encode affective information into their utterances. …”
Get full text
Article -
502
Multiplexed Quantum Communication with Surface and Hypergraph Product Codes
Published 2025-01-01“…Transmission via these interconnects can be performed more efficiently using quantum multiplexing, where information is encoded in high-dimensional photonic degrees of freedom. …”
Get full text
Article -
503
High efficient shape coding based on the representation of contour and chain code
Published 2014-08-01“…Finally, different schemes are proposed to encode the straight-line sub-segments and ordinary curve sub-segments by employing the spatial correlations among contours aiming to acquire high coding performance. …”
Get full text
Article -
504
M2-M5 giant graviton expansions
Published 2024-12-01“…Abstract We examine the giant graviton expansions of the Coulomb and Higgs indices for the M2-brane SCFTs to find the closed-form expressions for the indices that encode the spectra of the 1/4-BPS M5-brane giant gravitons and the 1/3-BPS orbifold M5-brane giant gravitons. …”
Get full text
Article -
505
Genotype-Phenotype Correlations in Autosomal Dominant Osteogenesis Imperfecta
Published 2011-01-01“…Osteogenesis imperfecta, discussed in Baldridge et al. 2008 is an inherited bone fragility disorder with a wide range of clinical severity that in the majority of cases is caused by mutations in COL1A1 or COL1A2, the genes that encode the two collagen type I alpha chains. Here we describe genotype-phenotype correlations in OI patients who have mutations affecting collagen type I. …”
Get full text
Article -
506
Murine Leukemia Viruses: Objects and Organisms
Published 2011-01-01“…Prototypical gammaretroviruses encode only the three polyproteins that will be used in the assembly of progeny virus particles. …”
Get full text
Article -
507
Holographic Carrollian currents for massless scattering
Published 2025-01-01“…We show that the large-time limit of their Ward identities implies an infinite tower of projected soft graviton theorems in the bulk, while their finite-time OPEs encode the collinear limit of scattering amplitudes.…”
Get full text
Article -
508
Computation of Topological Indices of NEPS of Graphs
Published 2021-01-01“…One of the methods in analyzing structural properties is obtaining quantitative measures that encode data of the whole network by a real quantity. …”
Get full text
Article -
509
Introduction d’un nouveau protagoniste dans le récit en français et en chinois : interaction des structures syntaxique et informationnelle
Published 2019-12-01“…The aim is to identify which constructions are used to encode this introductory function in French and Chinese. …”
Get full text
Article -
510
Genetic Diversity of Toll-Like Receptors and Immunity to M. leprae Infection
Published 2012-01-01“…As expected, many of the polymorphisms reside within genes that encode components of the innate and adaptive immune system. …”
Get full text
Article -
511
A complex network traffic prediction method for IP network expansion applications
Published 2023-08-01“…., which brings difficulties to prediction.A prediction method for complex network traffic was proposed.It adopted an encode-decode structure, adding global features to the encoding layer, and combining global features and local features in the decoding layer to solve local uncertainties.The model used sample balance, normalization and other methods to extract the commonality of the data as much as possible to avoid the heterogeneity of the data.And emergencies were alleviated by increasing prior knowledge.The overall model had fewer parameters and had strong generalization performance, at the same time, the combination of artificial features and automatic features ensured the accuracy of the shallow network.The experimental results show that the proposed method has the characteristics of high accuracy and strong generalization performance.At present, this method has been applied on a large scale in engineering.…”
Get full text
Article -
512
Multi-view graph neural network for fraud detection algorithm
Published 2022-11-01“…Aiming at the problem that in the field of fraud detection, imbalance labels and lack of necessary connections between fraud nodes, resulting in fraud detection tasks not conforming to the hypothesis of homogeneity of graph neural networks, multi-view graph neural network for fraud detection (MGFD) algorithm was proposed.First, A structure-independent encoder was used to encode the attributes of nodes in the network to learn the difference between the fraud node and the normal node.The hierarchical attention mechanism was designed to integrate the multi-view information in the network, and made full use of the interaction information between different perspectives in the network to model the nodes on the basis of learning differences.Then, based on the data imbalance ratio sampled subgraph, the sample was constructed according to the connection characteristics of fraud nodes for classification, which solved the problem of imbalance sample labels.Finally, the prediction label was used to identify whether a node is fraudulent.Experiments on real-world datasets have shown that the MGFD algorithm outperforms the comparison method in the field of graph-based fraud detection.…”
Get full text
Article -
513
Free fermions with dephasing and boundary driving: Bethe Ansatz results
Published 2025-01-01“…They give rise to diffusive scaling at intermediate times, when boundaries can be neglected. Moreover, they encode the breaking of diffusion at asymptotically long times. …”
Get full text
Article -
514
Design and implementation for partition dynamically vector quantization chip
Published 2009-01-01“…Partition dynamically vector quantization(PDVQ) chip was researched and produced to encode images.Before encoding,it first judged the correlation of the encoding image block,and then decided to choose the size of the image blocks.Test result shows that PDVQ chip can improve the compression rate to 27% in average by contrasting with the normal VQ,even to 64%.The size of the codebook in PDVQ chip was 256×16 byte,and all codevectors in the codebook were categorized by direction,in each category codebook codewords were sorted in the ascending order of their sum,this kind codebook architecture could reduce search range largely.The VLSI architecture of PDVQ chip was implemented based on Charter 0.35μm CMOS standard cell technology,its chip area was 2.08mm×2.08mm.Test result shows that,at 3.0V power supply,PDVQ chip can operate up to 100MHz.At this operation,its power dissipation is 295mW,and it can support real-time encoding application for 512×512 gray images at 30fame/s.…”
Get full text
Article -
515
Efficient conditional aggregation of encrypted data in tiered sensor networks
Published 2012-12-01“…A privacy preserving conditional aggregation protocol was proposed that enabled storage nodes to aggregate the data items satisfied sink issued queries correctly while prevented them from revealing both sensor collected data and Sink issued queries.To protect privacy for sensor col data and sink issued queries,an encoding method based on prefix membership verification and bloom filters was proposed to encode both sensor collected data and sink issued queries,which allowed storage nodes process queries correctly without knowing their actually value.Homomorphism encryption method was adopted to encrypt sensor collected data,which enabled storage nodes to process aggregation on encrypted data items.To reduce corresponding energy consumption between sensors and storage nodes,a code table method was proposed to represent and transmit data items.Analysis and experime validate the efficacy and efficiency of the proposed protocol.…”
Get full text
Article -
516
Non-Archimedean Green’s functions and Zariski decompositions
Published 2024-06-01“…Our examples are based on geometric constructions by Cutkosky and Lesieutre, and arise via base change from Green’s functions over a trivially valued field; this theory allows us to efficiently encode the Zariski decomposition of a pseudoeffective numerical class.…”
Get full text
Article -
517
Bad suffixes : morphological Pejoration in Old Sicilian
Published 2024-10-01“…The article describes some aspects of the evaluative morphology of Old Sicilian (14th–16th centuries), with a focus on suffixes that encode a pejorative meaning. Based on a survey of the ARTESIA corpus, we draw the semantic network of three suffixes inherited, as in other Romance languages, from Latin: -azzu, -a (< Lat. …”
Get full text
Article -
518
Sylvia Plath’s Poetry in Multiple Versions: A Case Study of UK School Anthologies
Published 2024-06-01“…This paper illustrates how two poems that are commonly featured in school poetry anthologies, Sylvia Plath’s “You’re” and “Morning Song,” encode a historical rationale for their material form in their bibliographic practices. …”
Get full text
Article -
519
Hexagons govern three-qubit contextuality
Published 2025-01-01“…Although neither of the two yields observable-based contextual configurations of their own, $classically$-embedded copies are found to fully encode contextuality properties of the most prominent three-qubit contextual configurations in the following sense: for each set of unsatisfiable contexts of such a contextual configuration there exists some classically-embedded hexagon sharing with the configuration exactly this set of contexts and nothing else. …”
Get full text
Article -
520
Anomaly Detection in Moving Crowds through Spatiotemporal Autoencoding and Additional Attention
Published 2018-01-01“…Convolutional AEs and LSTMs are used to encode spatial and temporal variations of input frames, respectively. …”
Get full text
Article