-
881
Epigenetic and epitranscriptomic regulation during oncogenic γ-herpesvirus infection
Published 2025-01-01“…The key viral proteins such as EBNA1 and LMP1 encoded by EBV; LANA and vGPCR encoded by KSHV; play pivotal roles in these modifications by interacting with host factors, and dysregulating signaling pathways. …”
Get full text
Article -
882
Image tampering localization model for intensive post-processing scenarios
Published 2024-04-01“…Simultaneously, an end-to-end encoder-decoder structure, reminiscent of the UNet architecture, was formulated. …”
Get full text
Article -
883
GAD:topology-aware time series anomaly detection
Published 2020-06-01“…To solve the problems of anomaly detection,intelligent operation,root cause analysis of node equipment in the network,a graph-based gated convolutional codec anomaly detection model was proposed for time series data such as link delay,network throughput,and device memory usage.Considering the real-time requirements of network scenarios and the impact of network topology connections on time series data,the time dimension features of time series were extracted in parallel based on gated convolution and the spatial dependencies were mined through graph convolution.After the encoder composed of the spatio-temporal feature extraction module encoded the original input time series data,the decoder composed of the convolution module was used to reconstruct the time series data.The residuals between the original data and the reconstructed data were further used to calculate the anomaly score and detect anomalies.Experiments on public data and simulation platforms show that the proposed model has higher recognition accuracy than the current time series anomaly detection benchmark algorithm.…”
Get full text
Article -
884
H.264 SVC Complexity Reduction Based on Likelihood Mode Decision
Published 2015-01-01“…Scaling consumes more encoding time and computational complexity during mode selection. …”
Get full text
Article -
885
A Simple Binary Run-Length Compression Technique for Non-Binary Sources Based on Source Mapping
Published 2001-01-01“…Compression is achieved by encoding the number of “ones” between two consecutive “zeros” using either a fixed-length code or a variable-length code. …”
Get full text
Article -
886
Multiple symbol soft-output non-coherent detection of serial concatenated CPM
Published 2012-08-01“…A non-coherent detection algorithm for CPM was proposed.Several sequential symbols were used as the observation window to calculate the prior probability for codeword in CPM soft demodulation process,and the more observation symbols were used,the better performance the algorithm achieved.Non-coherent receiver architecture was given,in which expansion method of Walsh basis function was utilized to reduce the calculating amount in matched filtering.Non-coherent detection performances of convolutional encoding CPM system adopting the proposed algorithm,with different CPM modulation parameters,were compared through simulation.The results indicate that proposed non-coherent detection algorithm brings significant robustness.As to 2CPM,4CPM serial concatenated encoding modulation,when the observation length gets to 4 symbols,system with the proposed algorithm gets nearly 6dB performance improvement than with the single-symbol non-coherent detection algorithm.…”
Get full text
Article -
887
Quantum secure communication algorithm based on cyclic code and information compression
Published 2020-03-01“…For the problem that the classical secure communication was challenging to transmit information,a quantum secure communication algorithm based on cyclic code and information compression was proposed.First,the data was encoded into two sets of data with different lengths by the sender,one set of data was used for cycling coding and the other one was used to compress coding.Second,single-photon sequence was transmitted to the receiver on the quantum channel by the sender.The error number was used as the basis of channel security detection.If the channel was secure,quantum states were encoded for the data,and segment transmitted by quantum stabilizer codes.The error caused by the environment can be overcome according to characteristic of the stable code.Finally,the information was decoded after receiving the quantum information,then recirculated and decompressed to obtain data.The security analysis shows that the quantum secure communication algorithm can resist the attack of jamming and spoofing attacked.The simulation results show that good results can be obtained to 5 segments for data compression.…”
Get full text
Article -
888
SER Performance of Enhanced Spatial Multiplexing Codes with ZF/MRC Receiver in Time-Varying Rayleigh Fading Channels
Published 2014-01-01“…We propose enhanced spatial multiplexing codes (E-SMCs) to enable various encoding rates. The symbol error rate (SER) performance of the E-SMC is investigated when zero-forcing (ZF) and maximal-ratio combining (MRC) techniques are used at a receiver. …”
Get full text
Article -
889
Dissipative Protection of a GKP Qubit in a High-Impedance Superconducting Circuit Driven by a Microwave Frequency Comb
Published 2025-01-01“…In a state-of-the-art experimental setup, we estimate that the encoded qubit lifetime could extend 2 orders of magnitude beyond the break-even point, with substantial margin for improvement through progress in fabrication and control electronics. …”
Get full text
Article -
890
Network structure influences the strength of learned neural representations
Published 2025-01-01“…Referred to as graph learning, the process produces a model encoding the graph of event-to-event transition probabilities. …”
Get full text
Article -
891
Mitochondrial Ribosomal Proteins and Cancer
Published 2025-01-01“…Mitochondrial ribosomal proteins (MRPs) are encoded by nuclear genes and are assembled within the mitochondria. …”
Get full text
Article -
892
Variational Estimation of Optimal Signal States for Quantum Channels
Published 2024-01-01“…This article explores the performance of quantum communication systems in the presence of noise and focuses on finding the optimal encoding for maximizing the classical communication rate, approaching the classical capacity in some scenarios. …”
Get full text
Article -
893
Thyroid Nodule Ultrasound Image Segmentation Based on Improved Swin Transformer
Published 2025-01-01“…First, depthwise convolutional layers are integrated into the encoder/decoder of the Swin Transformer to enhance global-local feature representations. …”
Get full text
Article -
894
Generation of a transgene-free Induced pluripotent stem (iPS) cell line (JNCHi002-A) from a female heterozygous carrier of the low density lipoprotein receptor (LDLR) gene mutation...
Published 2025-04-01“…The low density lipoprotein receptor (LDLR) gene (OMIM#606945)encodes a protein of 860 amino acids. The encoded protein typically anchors itself to the cell membrane, where it facilitates the binding and internalization of low-density lipoprotein/cholesterol into the cell. …”
Get full text
Article -
895
A novel artificial intelligence search algorithm and mathematical model for the hybrid flow shop scheduling problem
Published 2025-02-01“…Additionally, using this encoding, a proper decomposition of the problem is feasible. …”
Get full text
Article -
896
Upper circumpolar deep water influences microbial functional gene composition and diversity along the southern Central Indian Ridge and eastern Southwest Indian Ridge
Published 2025-02-01“…Up to 41% of microbial functional genes at both locations encoded for C-cycling. Availability of hydrothermally derived substrates in plumes detected along the ridges triggered an increase in the abundance of genes encoding for remediation of polycyclic aromatics, nitrate reduction, and arsenic and mercury resistance. …”
Get full text
Article -
897
Error-driven upregulation of memory representations
Published 2025-01-01“…Increased hemodynamic responses in posterior medial frontal cortex were found for internal and external origins of memory error evidence, and during post-error encoding success as quantified by subsequent recall of face-associated memories. …”
Get full text
Article -
898
Named entity recognition based on span and category enhancement for Chinese news
Published 2024-12-01“…This model was developed based on the bidirectional encoder representation pre-trained model with a Transformer structure (BERT) and was enhanced by span prediction and category description to improve recognition performance. …”
Get full text
Article -
899
Diverse neuronal activity patterns contribute to the control of distraction in the prefrontal and parietal cortex.
Published 2025-01-01“…We found that in both areas, salient distractors are encoded by both response enhancement and suppression by distinct neuronal populations. …”
Get full text
Article -
900
Network threat situation assessment based on unsupervised multi-source data feature analysis
Published 2020-02-01“…Aiming at the limitations of supervised neural network in the network threat testing task relying on data category tagging,a network threat situation evaluation method based on unsupervised multi-source data feature analysis was proposed.Firstly,a variant auto encoder-generative adversarial network (V-G) for security threat assessment was designed.The training data set containing only normal network traffic was input to the network collection layer of V-G to perform the model training,and the reconstruction error of the network output of each layer was calculated.Then,the reconstruction error learning was performed by the three-layer variation automatic encoder of the output layer,and the training abnormal threshold was obtained.The packet threat was tested by using the test data set containing the abnormal network traffic,and the probability of occurrence of the threat of each group of tests was counted.Finally,the severity of the network security threat was determined according to the probability of threat occurrence,and the threat situation value was calculated according to the threat impact to obtain the network threat situation.The simulation results show that the proposed method has strong characterization ability for network threats,and can effectively and intuitively evaluate the overall situation of network threat.…”
Get full text
Article