Showing 1,581 - 1,600 results of 2,943 for search '"ENCODE"', query time: 0.06s Refine Results
  1. 1581

    Role of the Forkhead box family protein FOXF2 in the progression of solid tumor: systematic review by Yuzhen Zheng, Liusheng Wu, Zhenyu Hu, Hongying Liao, Xiaoqiang Li

    Published 2024-12-01
    “…Conclusion FOXF2 is a gene encoding a forkhead transcription factor belonging to the Forkhead Box family. …”
    Get full text
    Article
  2. 1582

    Vertical flow immunoassay for multiplex mycotoxins based on photonic nitrocellulose and SERS nanotags by Ruipeng Chen, Jingfang Hu, Hui Wang, Cheng Li, Haiqi Kang, Yuxuan Chen, Liang Yang, Xiangfang Tang, Benhai Xiong, Xiangwei Zhao

    Published 2025-01-01
    “…In parallel, three kinds of Raman dyes encoding Au@NBAAg, Au@4-MBAAg and Au@DNTBAg SERS nanotags were synthesized for the detection of OTA, AFB1 and ZON. …”
    Get full text
    Article
  3. 1583

    HistoNeXt: dual-mechanism feature pyramid network for cell nuclear segmentation and classification by Junxiao Chen, Ruixue Wang, Wei Dong, Hua He, Shiyong Wang

    Published 2025-01-01
    “…HistoNeXt utilizes an encoder-decoder architecture, where the encoder, based on the advanced ConvNeXt convolutional framework, efficiently and accurately extracts multi-level abstract features from tissue images. …”
    Get full text
    Article
  4. 1584
  5. 1585

    Analisis Perbandingan Model Bert Dan Xlnet Untuk Klasifikasi Tweet Bully Pada Twitter by Teuku Radillah, Okta Veza, Sarjon Defit

    Published 2024-12-01
    “…Penelitian ini bertujuan untuk membandingkan performa dua model pemrosesan bahasa alami terbaru, yaitu BERT (Bidirectional Encoder Representations from Transformers) dan XLNet, dalam klasifikasi tweet yang mengandung bullying. …”
    Get full text
    Article
  6. 1586

    MSEANet: Multi-Scale Selective Edge Aware Network for Polyp Segmentation by Botao Liu, Changqi Shi, Ming Zhao

    Published 2025-01-01
    “…The model consists of three key components: (1) an Edge Feature Extractor (EFE) that captures polyp edge features with precision during the initial encoding phase, (2) the Cross-layer Context Fusion (CCF) block designed to extract and integrate multi-scale contextual information from diverse receptive fields, and (3) the Selective Edge Aware (SEA) module that enhances sensitivity to high-frequency edge details during the decoding phase, thereby improving edge preservation and segmentation accuracy. …”
    Get full text
    Article
  7. 1587

    Symplectic quantization and general constraint structure of a prototypical second-class system by Ignacio S. Gomez, Vipul Kumar Pandey, Ronaldo Thibes

    Published 2024-12-01
    “…We follow with the Faddeev–Jackiw–Barcelos–Wotzasek approach in which the geometric character of the mentioned submanifold is emphasized by means of an internal metric function encoding its symplectic properties. We consider two straightforward examples, applying our general results to constrained motion along a toroidal geometry and to a Lorentz violating toy model in field theory. …”
    Get full text
    Article
  8. 1588

    Oriental Hydrocyphon (Coleoptera: Scirtidae: Scirtinae): Seven New Species from Indonesia, Thailand, Malaysia, and India by Hiroyuki Yoshitomi

    Published 2012-01-01
    “…The approach has been validated against two different case studies, a filtering kernel and an M-JPEG encoding kernel. Moreover, the presented emulation toolchain couples FPGA emulation with activity-based physical modeling to extract area and power/energy consumption figures. …”
    Get full text
    Article
  9. 1589

    Role of the TGF-β cytokine and its gene polymorphisms in asthma etiopathogenesis by Jacek Plichta, Michał Panek

    Published 2025-01-01
    “…The expression of all TGF-β isoforms is affected by a number of single nucleotide polymorphisms found in the genes encoding these cytokines. Some of the SNPs that alter the level of TGF-β expression may be associated with the occurrence and severity of symptoms of asthma and other diseases. …”
    Get full text
    Article
  10. 1590

    Rupture in long-term vocal recognition of past social partners in bonobos by Sumir Keenan, Nicolas Mathevon, Jeroen Stevens, Jean-Pascal Guéry, Klaus Zuberbühler, Florence Levréro

    Published 2015-03-01
    “…To this end, individual signatures should be reliably encoded in vocal interactions and memorised by recipients over long periods. …”
    Get full text
    Article
  11. 1591

    Enhancement of Neocortical-Medial Temporal EEG Correlations during Non-REM Sleep by Nikolai Axmacher, Christoph Helmstaedter, Christian E. Elger, Juergen Fell

    Published 2008-01-01
    “…We found that the amplitudes of oscillations within the medial temporal lobe and the neocortex were more closely correlated during sleep, in particular during non-REM sleep, than during waking state. Possibly, the encoding of novel sensory inputs, which mainly occurs during waking state, requires that medial temporal dynamics are rather independent from neocortical dynamics, while the consolidation of memories during sleep may demand closer interactions between MTL and neocortex.…”
    Get full text
    Article
  12. 1592

    Joint embedding–classifier learning for interpretable collaborative filtering by Clémence Réda, Jill-Jênn Vie, Olaf Wolkenhauer

    Published 2025-01-01
    “…Moreover, JELI instantiates a generic approach to training recommender systems by encoding generic graph-regularization constraints. …”
    Get full text
    Article
  13. 1593

    Cryptanalysis of an Image Encryption Algorithm Using DNA Coding and Chaos by Yuzhuo Zhao, Qiqin Shi, Qun Ding

    Published 2025-01-01
    “…We broke an image encryption scheme using chaos and DNA encoding. Through our comprehensive security analysis, we found a security vulnerability in the mechanism of the association between the key and plaintext and proposed a breaking scheme. …”
    Get full text
    Article
  14. 1594

    Tackling misinformation in mobile social networks a BERT-LSTM approach for enhancing digital literacy by Jun Wang, Xiulai Wang, Airong Yu

    Published 2025-01-01
    “…This study presents a novel hybrid model that combines Bidirectional Encoder Representations from Transformers (BERT) with Long Short-Term Memory (LSTM) networks to enhance the detection of misinformation using only textual content. …”
    Get full text
    Article
  15. 1595

    System Level Evaluation of Innovative Coded MIMO-OFDM Systems for Broadcasting Digital TV by Y. Nasser, J.-F. Hélard, M. Crussière

    Published 2008-01-01
    “…First, we investigate the possibility of applying a space-time (ST) encoder between the antennas of two sites in SFN. …”
    Get full text
    Article
  16. 1596

    Optimal quinary cyclic codes with minimum distance four by Ye TIAN, Yu-qing ZHANG, Yu-pu HU

    Published 2017-02-01
    “…Cyclic codes are an extremely important subclass of linear codes.They are widely used in the communication systems and data storage systems because they have efficient encoding and decoding algorithm.Until now,how to construct the optimal ternary cyclic codes has received a lot of attention and much progress has been made.However,there is less research about the optimal quinary cyclic codes.Firstly,an efficient method to determine if cyclic codes C<sub>(1,e,t)</sub>were optimal codes was obtained.Secondly,based on the proposed method,when the equation e=5<sub>k</sub>+1 or e=5<sub>m</sub>−2hold,the theorem that the cyclic codes C<sub>(1,e,t)</sub>were optimal quinary cyclic codes was proved.In addition,perfect nonlinear monomials were used to construct optimal quinary cyclic codes with parameters[5<sub>m</sub>−1,5<sub>m</sub>−2m−2,4]optimal quinary cyclic codes over <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <msub> <mi>F</mi> <mrow> <msup> <mn>5</mn> <mi>m</mi> </msup> </mrow> </msub> </math></inline-formula>.…”
    Get full text
    Article
  17. 1597

    Drug discovery and mechanism prediction with explainable graph neural networks by Conghao Wang, Gaurav Asok Kumar, Jagath C. Rajapakse

    Published 2025-01-01
    “…However, existing methods mainly focus on forward encoding of drugs, which is to obtain an accurate prediction of the response levels, but omitted to decipher the reaction mechanism between drug molecules and genes. …”
    Get full text
    Article
  18. 1598

    Graph-to-sequence deep reinforcement learning based complex task deployment strategy in MEC by Zhuo CHEN, Mintao CAO, Zhiyuan ZHOU, Xin HUANG, Yan LI

    Published 2024-03-01
    “…With the help of mobile edge computing (MEC) and network virtualization technology, the mobile terminals can offload the computing, storage, transmission and other resource required for executing various complex applications to the edge service nodes nearby, so as to obtain more efficient service experience.For edge service providers, the optimal energy consumption decision-making problem when deploying complex tasks was comprehensively investigated.Firstly, the problem of deploying complex tasks to multiple edge service nodes was modeled as a mixed integer programming (MIP) model, and then a deep reinforcement learning (DRL) solution strategy that integrated graph to sequence was proposed.Potential dependencies between multiple subtasks through a graph-based encoder design were extracted and learned, thereby automatically discovering common patterns of task deployment based on the available resource status and utilization rate of edge service nodes, and ultimately quickly obtaining the deployment strategy with the optimal energy consumption.Compared with representative benchmark strategies in different network scales, the experimental results show that the proposed strategy is significantly superior to the benchmark strategies in terms of task deployment error ratio, total power consumption of MEC system, and algorithm solving efficiency.…”
    Get full text
    Article
  19. 1599

    Two-Party Quantum Private Comparison Protocol Based on Rotational Encryption by Min Hou, Yue Wu

    Published 2025-01-01
    “…The participants’ private data are encoded as single photons, which are encrypted using a rotational encryption method. …”
    Get full text
    Article
  20. 1600

    Chinese Universities’ Image Repair after Network Public Opinion Events: Strategy Choice and Effect Evaluation by Jing Jiang, Juanjuan Ren

    Published 2022-01-01
    “…The study aims to address Chinese universities’ image repair strategies after network public opinion events in the field of crisis management; therefore, it takes 43 network public opinion events in Chinese universities as the research object, encodes the official texts issued by universities according to the image restoration strategy, and sums up the image repair strategies commonly used by Chinese universities. …”
    Get full text
    Article