Showing 1,601 - 1,620 results of 2,943 for search '"ENCODE"', query time: 0.05s Refine Results
  1. 1601

    Personal Authentication Using Multifeatures Multispectral Palm Print Traits by Gayathri Rajagopal, Senthil Kumar Manoharan

    Published 2015-01-01
    “…The proposed method efficiently accommodates the rotational, potential deformations and translational changes by encoding the orientation conserving features. The proposed system analyses the hand vascular authentication using two databases acquired with touch-based and contactless imaging setup collected from multispectral Poly U palm print database and CASIA database. …”
    Get full text
    Article
  2. 1602

    Human-Specific Endogenous Retroviruses by Anton Buzdin

    Published 2007-01-01
    “…Finally, a comprehensive database, is available for download, of human-specific and polymorphic endogenous retroviruses is presented, which encompasses the data on their genomic localization, primary structure, encoded viral genes, human gene neighborhood, transcriptional activity, and methylation status.…”
    Get full text
    Article
  3. 1603

    Deep learning-based method for mobile social networks with strong sparsity for link prediction by HE Yadi, LIU Linfeng

    Published 2024-06-01
    “…This method was designed to employ a combination of a Graph Auto-Encoder (GAE), feature matrix aggregation, and multi-layer long short-term memory networks (LSTM). …”
    Get full text
    Article
  4. 1604

    Quantitative Detection of Financial Fraud Based on Deep Learning with Combination of E-Commerce Big Data by Jian Liu, Xin Gu, Chao Shang

    Published 2020-01-01
    “…Therefore, in the context of e-commerce big data, this paper proposes a quantitative detection algorithm for financial fraud based on deep learning. First, the encoders are used to extract the features of the behaviour. …”
    Get full text
    Article
  5. 1605

    Demonstrating Efficient and Robust Bosonic State Reconstruction via Optimized Excitation Counting by Tanjung Krisnanda, Clara Yun Fontaine, Adrian Copetudo, Pengtao Song, Kai Xiang Lee, Ni-Ni Huang, Fernando Valadares, Timothy C.H. Liew, Yvonne Y. Gao

    Published 2025-01-01
    “…This task is particularly demanding for high-dimensional states encoded in continuous-variable (CV) systems, where a large number of grid-based measurements are often used to adequately sample relevant regions of phase space. …”
    Get full text
    Article
  6. 1606

    Evaluation-Focused Multidimensional Score for Turkish Abstractive Text Summarization by Sevinç İlhan Omurca, Nihal Zuhal Kayalı

    Published 2024-12-01
    “…For this purpose, we utilize BERTurk, mT5 and mBART as transformer-based encoder-decoder models. Each of the models was trained separately with MLSUM, TR-News, WikiLingua and Fırat_DS datasets. …”
    Get full text
    Article
  7. 1607

    AFRICAN SWINE FEVER VIRUS: USE OF GENETIC MARKERS IN ANALYSIS OF ITS ROUTES OF SPREAD by A. Mazloum, A. S. Igolkin, N. N. Vlasova, D. V. Romenskaya

    Published 2019-10-01
    “…Specific structure of the virus and long genome, encoding genes with unknown function, and circulation of 24 genotypes and 9 serotypes of the virus hinder the development of ASF vaccine. …”
    Get full text
    Article
  8. 1608

    A multi-source threat intelligence confidence value evaluation method based on machine learning by Hansheng LIU, Hongyu TANG, Mingxia BO, Jianfeng NIU, Tianbo LI, Lingxiao LI

    Published 2020-01-01
    “…During the collection process of multi-source threat intelligence,it is very hard for the intelligence center to make a scientific decision to massive intelligence because the data value density is low,the intelligence repeatabil-ity is high,and the ineffective time is very short,etc.Based on those problems,a new multi-source threat intelligence confidence value evaluation method was put forward based on machine learning.First of all,according to the STIX intelligence standard format,a multi-source intelligence data standardization process was designed.Secondly,ac-cording to the characteristic of data,14 characteristics were extracted from four dimensions of publishing time,source,intelligence content and blacklist matching degree to be the basis of determining the intelligence reliability.After getting the feature encoding,an intelligence confidence value evaluation model was designed based on deep neural network algorithm and Softmax classifier.Backward propagation algorithm was also used to minimize recon-struction error.Last but not least,according to the 2 000 open source marked sample data,k-ford cross-validation method was used to evaluate the model and get an average of 91.37% macro-P rate and 84.89% macro-R rate.It was a good reference for multi-source threat intelligence confidence evaluation.…”
    Get full text
    Article
  9. 1609

    Multi-pulse Fourier codes for bit transmission at the quantum limit by Matteo Rosati

    Published 2025-01-01
    “…Explicit JDR designs proposed so far employ the Hadamard or Fourier transform to perform a phase-to-intensity translation of the information encoding, effectively falling in the class of on-off-keying (OOK) modulation techniques; they improve over classical decoders but fall short of the Holevo capacity, particularly at large signal mean photon number $n\gtrsim1$ . …”
    Get full text
    Article
  10. 1610

    Research on rotor fault identification based on the integration of symbolic entropy and evidence theory by SHAN Song, CHEN HongMing, LIU JingXuan, DENG ShuaiQin, SU Yu

    Published 2024-06-01
    “…Thirdly the symbol sequence was obtained by encoding to calculate the symbol entropy. In this paper, the code length in the calculation of symbol entropy was determined by an indicator of the relative growth rate of the mean value of symbol entropy. …”
    Get full text
    Article
  11. 1611

    Finding the Correct Partner: The Meiotic Courtship by Tomás Naranjo

    Published 2012-01-01
    “…In the worm Caenorhabditis elegans, each chromosome carries a pairing center consisting of a chromosome-specific DNA-protein complex, and in the fission yeast Schizosaccharomyces pombe, the sme2 locus encodes a meiosis-specific non-coding RNA that mediates on homologous recognition. …”
    Get full text
    Article
  12. 1612

    Targeting TRPM3 as a potential therapeutic approach for autosomal dominant polycystic kidney disease by Hüseyin Gül, Jamie A. Davies

    Published 2025-02-01
    “…Most ADPKD cases are caused by mutations in PKD1 or PKD2, encoding polycystin-1 (PC1) and polycystin-2 (PC2). …”
    Get full text
    Article
  13. 1613

    Caused motion events in Modern Uyghur: a typological perspective by Tusun Alimujiang, Hendriks Henriëtte

    Published 2022-09-01
    “…Consequently, proposals have been made to expand the typology and/or reconceptualize it as a typology of constructional strategies for encoding events. This article furthers this line of inquiry by examining caused-motion expressions by adult speakers of an understudied Turkic language, Modern Uyghur. …”
    Get full text
    Article
  14. 1614

    Coordinated neuron-glia regeneration through Notch signaling in planarians. by M Lucila Scimone, Bryanna Isela-Inez Canales, Patrick Aoude, Kutay D Atabay, Peter W Reddien

    Published 2025-01-01
    “…We found that planarians first regenerate neurons expressing a Delta-encoding gene, delta-2, at key positions in the central and peripheral nervous systems. …”
    Get full text
    Article
  15. 1615

    Subregions in the ventromedial prefrontal cortex integrate threat and protective information to meta-represent safety. by Sarah M Tashjian, Joseph Cussen, Wenning Deng, Bo Zhang, Dean Mobbs

    Published 2025-01-01
    “…Here, we examine the neural systems underlying the online dynamic encoding of safety. The current preregistered study used 2 novel tasks to test 4 facets of safety estimation: Safety Prediction, Meta-representation, Recognition, and Value Updating. …”
    Get full text
    Article
  16. 1616

    Die buitebladkunswerk by Maritha Snyman

    Published 2022-11-01
    “…Co vers must thus be considered part of the encoded text and can there fore be analysed as such. …”
    Get full text
    Article
  17. 1617

    A Novel Psychovisual Threshold on Large DCT for Image Compression by Nur Azman Abu, Ferda Ernawan

    Published 2015-01-01
    “…The quantization process is used as a threshold of the human visual system tolerance to reduce the amount of encoded transform coefficients. It is very challenging to generate an optimal quantization value based on the contribution of the transform coefficient at each frequency order. …”
    Get full text
    Article
  18. 1618

    Recombinant Adenovirus siRNA Knocking Down the Ndufs4 Gene Alleviates Myocardial Apoptosis Induced by Oxidative Stress Injury by Beibei Wang, Jinsheng Zhang, Aijun Xu

    Published 2023-01-01
    “…Specific blocking of the complex I could reduce cell apoptosis. Ndufs4 is a nuclear-encoded subunit of the mitochondrial complex I and participates in the electron transport chain. …”
    Get full text
    Article
  19. 1619

    Efficient Computation of Shortest Paths in Networks Using Particle Swarm Optimization and Noising Metaheuristics by Ammar W. Mohemmed, Nirod Chandra Sahoo

    Published 2007-01-01
    “…This hybrid search process combines PSO for iteratively finding a population of better solutions and noising method for diversifying the search scheme to solve this problem. A new encoding/decoding scheme based on heuristics has been devised for representing the SPP parameters as a particle in PSO. …”
    Get full text
    Article
  20. 1620

    Abandoning the EPP-feature in Polish dual copula clauses by redefining the predication relation by Rafał Jurczyk

    Published 2021-12-01
    “…The criticism follows from: (i) – Chomsky’s (2000, 2001) downward Agree operation; (ii) – the view that the predicator encodes the predication relation between the pre-copular subject and the post-copular predicate; (iii) – selective multiple Agree, whereby the satisfaction of the EPP- and uφ-features is divorced. …”
    Get full text
    Article