-
1581
Role of the Forkhead box family protein FOXF2 in the progression of solid tumor: systematic review
Published 2024-12-01“…Conclusion FOXF2 is a gene encoding a forkhead transcription factor belonging to the Forkhead Box family. …”
Get full text
Article -
1582
Vertical flow immunoassay for multiplex mycotoxins based on photonic nitrocellulose and SERS nanotags
Published 2025-01-01“…In parallel, three kinds of Raman dyes encoding Au@NBAAg, Au@4-MBAAg and Au@DNTBAg SERS nanotags were synthesized for the detection of OTA, AFB1 and ZON. …”
Get full text
Article -
1583
HistoNeXt: dual-mechanism feature pyramid network for cell nuclear segmentation and classification
Published 2025-01-01“…HistoNeXt utilizes an encoder-decoder architecture, where the encoder, based on the advanced ConvNeXt convolutional framework, efficiently and accurately extracts multi-level abstract features from tissue images. …”
Get full text
Article -
1584
From structure prediction to function: defining the domain on the African swine fever virus CD2v protein required for binding to erythrocytes
Published 2025-02-01“…This large DNA virus encodes more than 150 open reading frames, many of which are uncharacterized. …”
Get full text
Article -
1585
Analisis Perbandingan Model Bert Dan Xlnet Untuk Klasifikasi Tweet Bully Pada Twitter
Published 2024-12-01“…Penelitian ini bertujuan untuk membandingkan performa dua model pemrosesan bahasa alami terbaru, yaitu BERT (Bidirectional Encoder Representations from Transformers) dan XLNet, dalam klasifikasi tweet yang mengandung bullying. …”
Get full text
Article -
1586
MSEANet: Multi-Scale Selective Edge Aware Network for Polyp Segmentation
Published 2025-01-01“…The model consists of three key components: (1) an Edge Feature Extractor (EFE) that captures polyp edge features with precision during the initial encoding phase, (2) the Cross-layer Context Fusion (CCF) block designed to extract and integrate multi-scale contextual information from diverse receptive fields, and (3) the Selective Edge Aware (SEA) module that enhances sensitivity to high-frequency edge details during the decoding phase, thereby improving edge preservation and segmentation accuracy. …”
Get full text
Article -
1587
Symplectic quantization and general constraint structure of a prototypical second-class system
Published 2024-12-01“…We follow with the Faddeev–Jackiw–Barcelos–Wotzasek approach in which the geometric character of the mentioned submanifold is emphasized by means of an internal metric function encoding its symplectic properties. We consider two straightforward examples, applying our general results to constrained motion along a toroidal geometry and to a Lorentz violating toy model in field theory. …”
Get full text
Article -
1588
Oriental Hydrocyphon (Coleoptera: Scirtidae: Scirtinae): Seven New Species from Indonesia, Thailand, Malaysia, and India
Published 2012-01-01“…The approach has been validated against two different case studies, a filtering kernel and an M-JPEG encoding kernel. Moreover, the presented emulation toolchain couples FPGA emulation with activity-based physical modeling to extract area and power/energy consumption figures. …”
Get full text
Article -
1589
Role of the TGF-β cytokine and its gene polymorphisms in asthma etiopathogenesis
Published 2025-01-01“…The expression of all TGF-β isoforms is affected by a number of single nucleotide polymorphisms found in the genes encoding these cytokines. Some of the SNPs that alter the level of TGF-β expression may be associated with the occurrence and severity of symptoms of asthma and other diseases. …”
Get full text
Article -
1590
Rupture in long-term vocal recognition of past social partners in bonobos
Published 2015-03-01“…To this end, individual signatures should be reliably encoded in vocal interactions and memorised by recipients over long periods. …”
Get full text
Article -
1591
Enhancement of Neocortical-Medial Temporal EEG Correlations during Non-REM Sleep
Published 2008-01-01“…We found that the amplitudes of oscillations within the medial temporal lobe and the neocortex were more closely correlated during sleep, in particular during non-REM sleep, than during waking state. Possibly, the encoding of novel sensory inputs, which mainly occurs during waking state, requires that medial temporal dynamics are rather independent from neocortical dynamics, while the consolidation of memories during sleep may demand closer interactions between MTL and neocortex.…”
Get full text
Article -
1592
Joint embedding–classifier learning for interpretable collaborative filtering
Published 2025-01-01“…Moreover, JELI instantiates a generic approach to training recommender systems by encoding generic graph-regularization constraints. …”
Get full text
Article -
1593
Cryptanalysis of an Image Encryption Algorithm Using DNA Coding and Chaos
Published 2025-01-01“…We broke an image encryption scheme using chaos and DNA encoding. Through our comprehensive security analysis, we found a security vulnerability in the mechanism of the association between the key and plaintext and proposed a breaking scheme. …”
Get full text
Article -
1594
Tackling misinformation in mobile social networks a BERT-LSTM approach for enhancing digital literacy
Published 2025-01-01“…This study presents a novel hybrid model that combines Bidirectional Encoder Representations from Transformers (BERT) with Long Short-Term Memory (LSTM) networks to enhance the detection of misinformation using only textual content. …”
Get full text
Article -
1595
System Level Evaluation of Innovative Coded MIMO-OFDM Systems for Broadcasting Digital TV
Published 2008-01-01“…First, we investigate the possibility of applying a space-time (ST) encoder between the antennas of two sites in SFN. …”
Get full text
Article -
1596
Optimal quinary cyclic codes with minimum distance four
Published 2017-02-01“…Cyclic codes are an extremely important subclass of linear codes.They are widely used in the communication systems and data storage systems because they have efficient encoding and decoding algorithm.Until now,how to construct the optimal ternary cyclic codes has received a lot of attention and much progress has been made.However,there is less research about the optimal quinary cyclic codes.Firstly,an efficient method to determine if cyclic codes C<sub>(1,e,t)</sub>were optimal codes was obtained.Secondly,based on the proposed method,when the equation e=5<sub>k</sub>+1 or e=5<sub>m</sub>−2hold,the theorem that the cyclic codes C<sub>(1,e,t)</sub>were optimal quinary cyclic codes was proved.In addition,perfect nonlinear monomials were used to construct optimal quinary cyclic codes with parameters[5<sub>m</sub>−1,5<sub>m</sub>−2m−2,4]optimal quinary cyclic codes over <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <msub> <mi>F</mi> <mrow> <msup> <mn>5</mn> <mi>m</mi> </msup> </mrow> </msub> </math></inline-formula>.…”
Get full text
Article -
1597
Drug discovery and mechanism prediction with explainable graph neural networks
Published 2025-01-01“…However, existing methods mainly focus on forward encoding of drugs, which is to obtain an accurate prediction of the response levels, but omitted to decipher the reaction mechanism between drug molecules and genes. …”
Get full text
Article -
1598
Graph-to-sequence deep reinforcement learning based complex task deployment strategy in MEC
Published 2024-03-01“…With the help of mobile edge computing (MEC) and network virtualization technology, the mobile terminals can offload the computing, storage, transmission and other resource required for executing various complex applications to the edge service nodes nearby, so as to obtain more efficient service experience.For edge service providers, the optimal energy consumption decision-making problem when deploying complex tasks was comprehensively investigated.Firstly, the problem of deploying complex tasks to multiple edge service nodes was modeled as a mixed integer programming (MIP) model, and then a deep reinforcement learning (DRL) solution strategy that integrated graph to sequence was proposed.Potential dependencies between multiple subtasks through a graph-based encoder design were extracted and learned, thereby automatically discovering common patterns of task deployment based on the available resource status and utilization rate of edge service nodes, and ultimately quickly obtaining the deployment strategy with the optimal energy consumption.Compared with representative benchmark strategies in different network scales, the experimental results show that the proposed strategy is significantly superior to the benchmark strategies in terms of task deployment error ratio, total power consumption of MEC system, and algorithm solving efficiency.…”
Get full text
Article -
1599
Two-Party Quantum Private Comparison Protocol Based on Rotational Encryption
Published 2025-01-01“…The participants’ private data are encoded as single photons, which are encrypted using a rotational encryption method. …”
Get full text
Article -
1600
Chinese Universities’ Image Repair after Network Public Opinion Events: Strategy Choice and Effect Evaluation
Published 2022-01-01“…The study aims to address Chinese universities’ image repair strategies after network public opinion events in the field of crisis management; therefore, it takes 43 network public opinion events in Chinese universities as the research object, encodes the official texts issued by universities according to the image restoration strategy, and sums up the image repair strategies commonly used by Chinese universities. …”
Get full text
Article