-
1301
Super-Resolution and Large Depth of Field Model for Optical Microscope Imaging
Published 2021-01-01“…The proposed M-Deblurgan consists of three parts: (i) a deblurring module equipped with an encoder-decoder network for feature extraction, (ii) an optimal approximation module to reduce the error propagation between the two tasks, and (iii) an SR module to super-resolve the image from the output of the optimal approximation module. …”
Get full text
Article -
1302
Substrates, regulation, cellular functions, and disease associations of P4-ATPases
Published 2025-01-01“…These enzymes are conserved across all eukaryotes, and the human genome encodes 14 distinct P4-ATPases. Initially identified as aminophospholipid translocases, P4-ATPases have since been found to translocate other phospholipids, including phosphatidylcholine, phosphatidylinositol, and even glycosphingolipids. …”
Get full text
Article -
1303
Multiobjective Construction Optimization Model Based on Quantum Genetic Algorithm
Published 2019-01-01“…In order to improve the adaptability of the quantum genetic algorithm for the multiobjective model, the encoding form, quantum revolving door, and genetic flow of the algorithm were reconstructed. …”
Get full text
Article -
1304
Multi-objective cloud workflow scheduling algorithm based on grid variance
Published 2019-02-01“…Multi-objective cloud workflow scheduling algorithm based on grid variance and the strategy of bad particles self-learning were presented.Firstly,the characteristics of task scheduling was token into consideration,and particle encoding was discredited.Secondly,the strategy of mapping Pareto optimal workflow scheduling set to self-adaptive grid coordinate system,and calculating the grid distribution value of each Pareto optimal solution was used.Thirdly,grid variance was adopted to evaluate the diversity of current Pareto front and dynamically adjust evolution strategies.Finally,the concept of being dominated times was introduced into bad particles self-learning strategy for filtering out bad particles in population.The simulation experiment shows that workflow scheduling solution set by this algorithm is better than the MOPSO algorithm on both IGD and S performance indexes,and the optimal value is superior to the ε-FDPSO and NSGA-Ⅱ algorithm.…”
Get full text
Article -
1305
Learning the simplicity of scattering amplitudes
Published 2025-02-01“…We demonstrate that an encoder-decoder transformer architecture achieves impressive simplification capabilities for expressions composed of handfuls of terms. …”
Get full text
Article -
1306
Research Developments in Generative Adversarial Networks for Image Restoration and Communication
Published 2025-01-01“…The system can realize encoding and decoding of input bits of arbitrary length with good generalization ability. …”
Get full text
Article -
1307
MicroRNAs in Development
Published 2006-01-01“…Over 10 years ago, the lab of Victor Ambros cloned an unusual gene, lin-4, which encodes two small RNA transcripts[1]. In the past few years, hundreds more of these tiny transcripts, termed microRNAs (miRNAs), have been uncovered in over a dozen species. …”
Get full text
Article -
1308
Modes and mechanisms for the inheritance of mitochondria and plastids in pathogenic protists.
Published 2025-01-01“…Therefore, it is important to understand how organellar genomes, and the resistance mutations encoded within them, are inherited during protist sexual reproduction and how this may impact the spread of drug resistance and future therapeutic approaches to target these organelles. …”
Get full text
Article -
1309
THERAPEUTIC GENE EDITING FOR HEMOGLOBINOPATHIES
Published 2024-08-01“…Initial studies of gene therapy for hemoglobinopathies involved the use of lentiviral vectors to add functional copies of the gene encoding b-globin in defective CD34 cells; more recently, gene editing techniques have been used involving either CRISPR-Cas9, transcription activation-like effector protein nuclease, zinc finger nuclease, and base editing to either induce fetal hemoglobin production at therapeutic levels or to genetically repair the underlying molecular defect causing the disease. …”
Get full text
Article -
1310
Lightweight privacy protection data auditing scheme for regenerating-coding-based distributed storage
Published 2021-07-01“…To reduce the security implementation cost of the outsourcing data audit mechanism for the regenerating-coding-based distributed storage systems, an orthogonal algebraic coding method was put forward to construct a lightweight privacy-preserving audit scheme based on linear homomorphic authentication.The homomorphic authentication tags were generated with the orthogonalization between the file encoded data and the private secret key vector, and the privacy protection of the auditing response message was achieved by using the random masking that was constructed by randomizing the orthogonal basis vectors of the specific sub-vector of the user’s secret key.The work realized the effective integration of algebraic coding, privacy protection, and security auditing.Theoretical analysis shows that the proposed scheme can realize the information-theoretic security in the regenerating-coding-based storage applications.Compared with the existing works, the proposed scheme is of low computational complexity and communication overhead, and better performance advantages.…”
Get full text
Article -
1311
Reputation mechanism based on multi-path routing protocol in ad hoc networks
Published 2008-01-01“…Data packets were all encoded by RS codes and cut into pieces before sending in different paths. …”
Get full text
Article -
1312
Alternative Splicing Programs in Prostate Cancer
Published 2013-01-01“…Key genes for the biology of normal and neoplastic prostate cells, such as those encoding for the androgen receptor and cyclin D1, are alternatively spliced to yield protein isoforms with different or even opposing functions. …”
Get full text
Article -
1313
Image privacy preservation scheme based on QR code and reversible visible watermarking
Published 2019-11-01“…With the privacy leakage problem of image delivery in networks,an image privacy preservation scheme based on QR code and reversible visible watermarking was proposed.In order to preserve the privacy information including shooting time,shooting location and detailed description,the encrypted privacy information was stored in cloud platforms and corresponding universal resource locator was generated firstly.Secondly,the universal resource locator was encoded as the QR code and it was embedded into the cover image using reversible visible watermarking.Therefore,the access control for privacy information could be achieved.The visual perceptual model was utilized to select adaptive watermark embedding parameters to balance watermark visibility and marked image quality.Experimental results demonstrate that the good visual quality of marked images can be obtained and the embedded QR code can be correctly decoded.The proposed scheme can guarantee marked image quality and reduce the risk of private information leakage.…”
Get full text
Article -
1314
Long Non-coding RNA: Characterizing the Locus Features by the Approaches
Published 2017-12-01“…There is limited knowledge of genetic and epigenetic elements and their interactions for the gene encoding HOTAIR. Therefore, understanding the molecular mechanism and its regulation remains to be challenging. …”
Get full text
Article -
1315
“Poo-tee-weet?” and Other Pastoral Questions
Published 2017-06-01“…If an aural locus amoenus exists, how is it encoded? With reference to Kurt Vonnegut, William Blake, Allen Ginsberg and others, this paper will underline the elementary but crucial distinction between sound and meaning and how the representation of sound can point toward pastoral meanings. …”
Get full text
Article -
1316
Nanodiamond-mediated delivery of microRNA-7 for the neuroprotection of dopaminergic neurons
Published 2025-01-01“…MicroRNA-7 (miR-7) targets the gene SNCA, which encodes α-synuclein, reducing its expression and alleviating neuronal damage in PD. …”
Get full text
Article -
1317
Joint vibrotactile coding for machine recognition and human perception
Published 2023-05-01“…In order to accurately transmit the content meaning of vibrotactile signals and achieve intelligent recognition and signal reconstruction, a joint vibrotactile coding scheme for machine recognition and human perception was proposed.At the encoding end, the original three-dimensional vibrotactile signals were converted into one-dimensional signals.Then the semantic information of the signals was extracted using a short-time Fourier transform before being effectively compressed and transmitted.At the decoding end, a fully convolutional neural network was used to intelligently recognize based on the semantic information.The difference between the original signals and the reconstructed signals based on semantic information was used as compensation for the semantic information, and the quality of the reconstructed signals was gradually improved to meet human perceptual needs.The experimental results show that the proposed scheme achieve tactile recognition with semantic information at a lower bit rate while improving the compression efficiency of tactile data, thus satisfying human perceptual needs.…”
Get full text
Article -
1318
DEVELOPMENT OF ELECTRONIC TEXTBOOKS IN HELPNDOC SYSTEM
Published 2016-12-01“…The article pays attention to the most important details relating to the layout of e-courses: support for Cyrillic encodings, the import of content from text documents, a built-in editing and formatting tools, choosing the types of media files, integration of existing materials into courses. …”
Get full text
Article -
1319
High-Performance Region-of-Interest Image Error Concealment with Hiding Technique
Published 2010-01-01“…Based on the progressive transformation, the low-frequency components of ROI are encoded to disperse its information into the high-frequency bank of original image. …”
Get full text
Article -
1320
Advancements in End-to-End Audio Style Transformation: A Differentiable Approach for Voice Conversion and Musical Style Transfer
Published 2025-01-01“…Methods: The proposed method employs an encoder–decoder architecture with a global conditioning mechanism. …”
Get full text
Article