Showing 1,501 - 1,520 results of 2,943 for search '"ENCODE"', query time: 0.05s Refine Results
  1. 1501

    Enhancing Smart Grids for Sustainable Energy Transition and Emission Reduction with Advanced Forecasting Techniques by Farah Rania, Farou Brahim, Kouahla Zineddine and Seridi Hamid

    Published 2024-12-01
    “…To achieve this goal, we propose a transformer-based encoder architecture for load forecasting by modifying the transformer workflow and designing a novel technique for handling contextual features. …”
    Get full text
    Article
  2. 1502

    LπCET: A Logic Security Analysis for Cryptographic Protocols Based on π-Calculus Extension Theory by Fusheng Wu, Jinhui Liu, Yanbin Li, Mingtao Ni

    Published 2024-01-01
    “…The aim is to analyze whether there are logical flaws in the design and the implementation of a cryptographic protocol, to ensure the security of the cryptographic protocol when it is encoded into software and implemented. This paper presents the logical security proof and analysis of the TLS1.3 protocol’s interactional implementation process. …”
    Get full text
    Article
  3. 1503

    Comparison of Diagnostic Cytomorphology of Natural Killer/T-Cell Lymphoma (Nasal Type) in Conventional Smears, Liquid-Based Preparations, and Histopathology by Chih-Yi Liu, Hui-Chih Tsai

    Published 2018-01-01
    “…The diagnosis of NK/T-cell lymphoma was confirmed based on pathological and immunohistochemical analyses, as well as in situ hybridization for EBV-encoded mRNA (EBER). The present case report underlines the importance of prompt clinicopathological assessment in suspected cases. …”
    Get full text
    Article
  4. 1504

    Aspectual reduplication in Sign Language of the Netherlands: reconsidering phonological constraints and aspectual distinctions by van Boven Cindy

    Published 2025-01-01
    “…The study focuses on three aspect types that have been found to be encoded by reduplication across sign languages – habitual, continuative, and iterative – and addresses potential phonological restrictions. …”
    Get full text
    Article
  5. 1505

    PINOID‐centered genetic interactions mediate auxin action in cotyledon formation by Wei Zeng, Xiutao Wang, Mengyuan Li

    Published 2024-05-01
    “…However, the molecular mechanism by which auxin is involved in cotyledon formation remains to be elucidated. PID, which encodes a serine/threonine kinase localized to the plasma membrane, has been found to phosphorylate the PIN1 protein and regulate its polar distribution in the cell. …”
    Get full text
    Article
  6. 1506

    Characterization of the Complete Mitochondrial Genome of Kaloula mediolineata (Microhylidae, Anura) and Its Phylogenetic Analysis by Thu-Thao Thi Huynh, Minh Trong Quang, Hoang Danh Nguyen

    Published 2024-12-01
    “…Results: The mitochondrial genome of K. mediolineata is a circular DNA molecule of 16,812 base pairs, encoding 37 genes, including 13 protein-coding genes, 22 transfer RNA genes, 2 ribosomal RNA genes, and a control region. …”
    Get full text
    Article
  7. 1507

    Data poisoning attack detection approach for quality of service aware cloud API recommender system by Zhen CHEN, Wenchao QI, Taiyu BAO, Limin SHEN

    Published 2023-08-01
    “…To solve the problem that existing studies usually assumed that the QoS data of cloud API recommender system was reliable, ignoring the data poisoning attack on cloud API recommender system by malicious users in open network environment, a data poisoning attack detection approach based on multi-feature fusion was proposed.Firstly, a user connected network graph was constructed based on the designed similarity function, and users’ neighborhood features were captured using Node2vec.Secondly, sparse auto-encoder was used to mine user QoS deep feature, and user interpretation feature based on QoS data weighted average deviation was designed.Furthermore, a fake user detection model based on support vector machine was established by integrating user neighborhood feature, QoS deep feature, and interpretation feature, the model parameters were learned using grid search and alternating iterative optimization strategy to complete fake user detection.Finally, the effectiveness and superiority of the proposed approach were verified through extensive experiments, realizing the poison attack defense against QoS aware cloud API recommender system at the data side.…”
    Get full text
    Article
  8. 1508

    Rare diagnosis of an Epstein-Barr virus-positive extracavitary/solid variant of primary effusion lymphoma by duodenal endoscopic biopsy in a human immunodeficiency virus-seronegati... by Beril Guler, Guven Cetin

    Published 2023-03-01
    “…HHV-8 and Epstein-Barr virus-encoded small RNAs (EBER) were diffuse positive. The patient, who did not have an effusion, was diagnosed with an extracavitary/solid variant of primary effusion lymphoma. …”
    Get full text
    Article
  9. 1509

    A New Chaotic System with Only Nonhyperbolic Equilibrium Points: Dynamics and Its Engineering Application by Maryam Zolfaghari-Nejad, Mostafa Charmi, Hossein Hassanpoor

    Published 2022-01-01
    “…Finally, chaos-based encoding/decoding algorithms for secure data transmission are developed by designing a state chain diagram, which indicates the applicability of the new chaotic system.…”
    Get full text
    Article
  10. 1510

    Macromodel of Precise Signal-Phase Meter by Matej Šalamon, Bojan Jarc

    Published 2012-01-01
    “…It has been developed as a support tool during the design process of a signal-conditioning circuit for incremental position encoders. The development of a signal conditioning circuit requires precise measurements of small signal phases, amplitudes and offsets using the analog/digital circuit simulator. …”
    Get full text
    Article
  11. 1511

    A fast VVC intra-coding algorithm based on graph neural network and statistical analysis by LI Tiansong, LIU Haokun, CUI Shaoguo, LIU Shucen, CHEN Yan, WANG Hongkui

    Published 2024-09-01
    “…Experimental results show that this algorithm can save 64.04% of encoding time at the cost of increasing BDBR by 2.29%.…”
    Get full text
    Article
  12. 1512

    Translational Modulation of Proteins Expressed from Bicistronic Vectors by Prasun J. Mishra, Lata G. Menon, Pravin J. Mishra, Philipp Mayer-Kuckuk, Joseph R. Bertino, Debabrata Banerjee

    Published 2009-11-01
    “…To overcome this limitation, we explored use of dihydrofolate reductase (DHFR) complementary DNA encoded in bicistronic vectors to induce a second protein of interest by methotrexate (MTX) treatment. …”
    Get full text
    Article
  13. 1513

    Androgen Receptor Regulates Transcription of the ZEB1 Transcription Factor by Bynthia M. Anose, Michel M. Sanders

    Published 2011-01-01
    “…Because it is induced by estrogen and progesterone and is high in prostate cancer, we investigated whether tcf8, which encodes ZEB1, is regulated by androgen. Data herein demonstrate that tcf8 is induced by dihydrotestosterone (DHT) in the human PC-3/AR prostate cancer cell line and that this induction is mediated by two androgen response elements (AREs). …”
    Get full text
    Article
  14. 1514

    Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map by Jiseung Kim, Changmin Lee

    Published 2022-05-01
    “…Through the conversion, the authors obtain two zerotest parameters and encodings of zero except for two non‐zero slots. Then, they are used to mitigate parameter constraints of the message space recovering algorithm. …”
    Get full text
    Article
  15. 1515

    Transcription termination and antitermination are critical for the fitness and function of the integrative and conjugative element Tn916. by Erika S Wirachman, Alan D Grossman

    Published 2024-12-01
    “…Further, we identified an element-encoded antiterminator (named canT for conjugation-associated antitermination) that is essential for transcription of Tn916 genes after excision of the element from the host chromosome. …”
    Get full text
    Article
  16. 1516

    Scalable Multilabel Learning Based on Feature and Label Dimensionality Reduction by Jaesung Lee, Dae-Won Kim

    Published 2018-01-01
    “…To obtain a model within an acceptable computational cost that is restricted by practical constraints, the learning algorithm may need to identify essential data that carries important knowledge on the relation between the observed features representing the measurement value and labels encoding the multiple target concepts. This results in an increased computational burden owing to the concurrent learning of multiple labels. …”
    Get full text
    Article
  17. 1517

    Computing Resource Allocation Strategy Using Biological Evolutionary Algorithm in UAV-Assisted Mobile Edge Computing by Li Wang, Xiang Yao, Zhenqi Yuan

    Published 2022-01-01
    “…On the basis of data encoding, crossover, mutation, and termination operations, the optimization performance of algorithm is greatly improved by multiple iterations of fitness function. …”
    Get full text
    Article
  18. 1518

    Digital watermarking method based on context word prediction and window compression coding by Lingyun XIANG, Minghao HUANG, Chenling ZHANG, Chunfang YANG

    Published 2024-02-01
    “…To address the problems of limited number of substitutable words and low watermark extraction efficiency in the existing natural language digital watermarking methods, a creative method based on context word prediction and window compression coding was proposed.Firstly, the contextual semantic features of each word in the original text were automatically learned through a neural network language model, and then the candidate word set for each word was predicted, thus the number of substitutable words that could be utilized for carrying watermark information was expanded.Meanwhile, considering the difference of the semantic impact caused by the substitutions of candidate words at different positions, the watermark information was embedded into each window containing several words, and the selection of candidate words for watermark embedding was optimized by the similarity between sentences before and after performing word substitutions.Finally, a semantic-independent window compression coding method was proposed, which encoded each window as appointed watermark information in terms of the character information of words contained in the window.So that during watermark extraction, the dependence on the original context at the position of word substitution was eliminated.The experimental results show that the proposed method greatly improves the watermark extraction efficiency with high embedding capacity and text quality.…”
    Get full text
    Article
  19. 1519

    Self-supervised speech representation learning based on positive sample comparison and masking reconstruction by Wenlin ZHANG, Xuepeng LIU, Tong NIU, Qi CHEN, Dan QU

    Published 2022-07-01
    “…To solve the problem that existing contrastive prediction based self-supervised speech representation learning methods need to construct a large number of negative samples, and their performance depends on large training batches, requiring a lot of computing resources, a new speech representation learning method based on contrastive learning using only positive samples was proposed.Combined with reconstruction loss, the proposed method could obtain better representation with lower training cost.The proposed method was inspired by the idea of the SimSiam method in image self-supervised representation learning.Using the siamese network architecture, two random augmentations of the input speech signals were processed by the same encoder network, then a feed-forward network was applied on one side, and a stop-gradient operation was applied on the other side.The model was trained to maximize the similarity between two sides.During training processing, negative samples were not required, so small batch size could be used and training efficiency was improved.Experimental results show that the representation model obtained by the new method achieves or exceeds the performance of existing mainstream speech representation learning models in multiple downstream tasks.…”
    Get full text
    Article
  20. 1520

    An Indian Case Study on Mitochondrial Neurogastrointestinal Encephalomyopathy by Shabana Kareem, Reemy Sara Mathai

    Published 2024-05-01
    “…Mitochondrial neurogastrointestinal encephalomyopathy (MNGIE) is a unique autosomal recessive disorder characterized by mitochondrial changes resulting from mutations in the TYMP gene, responsible for encoding thymidine phosphorylase. Despite its genetic origin, the study indicates that the manifestation of MNGIE does not strictly adhere to a hereditary pattern. …”
    Get full text
    Article