Showing 2,961 - 2,980 results of 6,432 for search '"memory"', query time: 0.05s Refine Results
  1. 2961

    Inhibition of Germinal Centre Apoptotic Programmes by Epstein-Barr Virus by Lindsay C. Spender, Gareth J. Inman

    Published 2011-01-01
    “…Only cells receiving adequate survival signals will differentiate fully to be released into the periphery as long-term memory B cells (the site of persistence). In this review, we detail the apoptotic pathways potentially encountered by EBV-infected B cells during the process of infection, and we describe the functions of those EBV-regulated cellular and viral genes that help promote survival of the host B cell.…”
    Get full text
    Article
  2. 2962

    A Simple Mathematical Model of Cyclic Circadian Learning by J. Šimon, M. Bulko

    Published 2014-01-01
    “…The model is based on known memory retention functions that are in good agreement with experimental results. …”
    Get full text
    Article
  3. 2963

    Sampling method for IDS in high bandwidth network by NING Zhuo1, GONG Jian1, GU Wen-jie1

    Published 2009-01-01
    “…A novel sampling method,IDSampling,was developed to solve the performance unbalance problem that IDS could not scale well in G+bit/s link,which was adaptive with the consumption of the memory bottleneck.With the help of the heuristic messages,such as the entropy of the single-packet flow and the flow length,IDSampling applied the simple sampling strategy based on the entropy of the single-packet flow when the large-scale anomaly occurred,or another complicated one instructed by the feedback of the rear detection results by default.In both cases IDSampling tried to guaran-tee the equal security with detection cost as low as it could.The results of experiment show that ①IDSampling keeps IDS effective by cutting off its load significantly when it is overloaded,at the same time it can guarantee the detection accuracy of the large-scale attack;②Comparing with the other two overwhelming sampling methods,the random packet sampling and the random flow sampling,the number of attack packets sampled by IDSampling is higher than that of the former two,the number outweighs the former two one order of magnitude especially in the large-scale anomaly case.…”
    Get full text
    Article
  4. 2964

    Comparing ChatGPT And LSTM In Predicting Changes In Quarterly Financial Metrics by Vitali Chaiko

    Published 2024-06-01
    “…The performance of ChatGPT is compared against Long Short-Term Memory (LSTM) neural network models developed as part of this research. …”
    Get full text
    Article
  5. 2965

    Ozone Treatment Improved the Resistive Switching Uniformity of HfAlO2 Based RRAM Devices by Lifeng Liu, Yi Hou, Weibing Zhang, Dedong Han, Yi Wang

    Published 2015-01-01
    “…HfAlO2 based resistive random access memory (RRAM) devices were fabricated using atomic layer deposition by modulating deposition cycles for HfO2 and Al2O3. …”
    Get full text
    Article
  6. 2966

    Machine Learning-Based Multitarget Tracking of Motion in Sports Video by Xueliang Zhang, Fu-Qiang Yang

    Published 2021-01-01
    “…According to the requirements of real time, accuracy, and occupying less video memory space in intelligent video surveillance systems, this paper improves the streamlined version of the algorithm. …”
    Get full text
    Article
  7. 2967

    Hagiographie liturgique et construction identitaire dans un néo-diocèse (XVIIIe-XIXe siècles). Le Proprium Sanctorum dans les bréviaires des diocèses français créés sous Louis XIV... by Philippe Castagnetti

    Published 2013-07-01
    “…Liturgical hagiography allows the constituting of an official religious memory in the clergy of each diocese and makes the idealization and standardization process of holiness easier. …”
    Get full text
    Article
  8. 2968

    Subject in the age of technological domination: Fahrenheit 451 by Ray Bradbury by Ahmetagić Jasmina

    Published 2024-01-01
    “…In Bradbury's novel, the subject is determined by participation in one of the most strongly confronted processes: forgetting and technology stand in opposition to memory and high culture.…”
    Get full text
    Article
  9. 2969

    RP-Ring: A Heterogeneous Multi-FPGA Accelerator by Shuaizhi Guo, Tianqi Wang, Linfeng Tao, Teng Tian, Zikun Xiang, Xi Jin

    Published 2018-01-01
    “…The dividing of workload is based on the logic resource, memory access bandwidth, and communication bandwidth of each FPGA chip. …”
    Get full text
    Article
  10. 2970

    Spatial “Artistic” Networks: From Deconstructing Integer-Functions to Visual Arts by Ernesto Estrada, Puri Pereira-Ramos

    Published 2018-01-01
    “…Here, we identify some general characteristics of this style, such as decomposition of the whole into parts, superposition of layers, and conservation of the memory of the whole. Using these attributes, we propose a method to deconstruct functions based on integers. …”
    Get full text
    Article
  11. 2971

    Performance evaluation of designated containerization and virtualization solutions using a synthetic benchmark by Sebastian Tarasiuk, Damian Traczuk, Kacper Szczepaniuk, Patryk Stoń, Jakub Smołka

    Published 2024-09-01
    “…The comparative criteria on which the analysis is based include aspects of computing and memory performance. Tests conducted on selected technologies included testing CPU performance, RAM efficiency and disk speed for reading and writing data. …”
    Get full text
    Article
  12. 2972

    An intrusion detection method based on depthwise separable convolution and attention mechanism by Zhifei ZHANG, Feng LIU, Yiyang GE, Shuo LI, Yu ZHANG, Ke XIONG

    Published 2023-03-01
    “…In order to improve the accuracy of multi-classification in network intrusion detection, an intrusion detection method was proposed based on depthwise separable convolution and attention mechanism.By constructing a cascade structure combining depthwise separable convolution and long-term and short-term memory networks, the spatial and temporal features of network traffic data can be better extracted.A mixed-domain attention mechanism was introduced to enhance the detection performance.To solve the problem of low detection rate in some samples, a data balance strategy based on the combination of the variational auto-encoder (VAE) the generative adversarial network (GAN) and was designed, which can effectively cope with imbalanced datasets and improve the adaptability of the proposed detection method.The experimental results show that the proposed method is able to achieve 99.80%, 99.32%, and 83.87% accuracy on the CICIDS-2017, NSL-KDD and UNSW-NB15 datasets, which is improved by 0.6%, 0.5%, and 2.3%, respectively.…”
    Get full text
    Article
  13. 2973

    Cheeses Lying Fallow. The Difficult Revival of Cheese Production in a Post-industrial Ariège Valley (Pyrenees, France) by Tristan Fournier, Olivier Lepiller, Guillaume Simonet

    Published 2022-12-01
    “…It analyzes the conditions of the decline of its production and the blurring of its memory. While, for the last twenty years, this post-industrial valley has turned towards the development of tourism, the article provides an understanding of the constraints that have prevented any renewal of cheese production until recently. …”
    Get full text
    Article
  14. 2974

    Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK by Sugio Nobuyuki

    Published 2023-01-01
    “…The time complexity is 248 encryptions; the memory complexity is 245 bytes. Because the vulnerabilities are identified in the round function and the key scheduling part, we propose some improvements for RBFK against these attacks.…”
    Get full text
    Article
  15. 2975

    Is Kazan an oriental city? (Based on the guidebook of 1873) by E.M. Dusaeva, N.I. Khanbekova

    Published 2018-12-01
    “…The theoretical basis of the research is the methods of structural analysis, semiotics and memory studies. Based on the results of the analysis of the text of the “Index”, the following methods were distinguished as the characteristic methods of creating the image of Kazan: selection of objects, marking them from more to less significant ones, the historical ideology of the discourse of the events and places described, the use of a certain presentation style and ideological antitheses “ours” – “foreign”. …”
    Get full text
    Article
  16. 2976

    A Class of Three-Step Derivative-Free Root Solvers with Optimal Convergence Order by F. Soleymani, S. Karimi Vanani, M. Jamali Paghaleh

    Published 2012-01-01
    “…Each method of the class reaches the optimal efficiency index according to the Kung-Traub conjecture concerning multipoint iterative methods without memory. Moreover, the class is free from derivative calculation per full iteration, which is important in engineering problems. …”
    Get full text
    Article
  17. 2977

    Introduction: Indentured bodies/embodiments of indenture by Sinah Theres Kloß, Jennifer Leetsch

    Published 2024-11-01
    “…Recruitment processes, along with the harrowing conditions of transport and labour, radically reshaped the material and physical realities of indentured labourers, influencing not only their immediate bodily experiences but also the socio-cultural practices and embodied memories they would pass down to future generations. …”
    Get full text
    Article
  18. 2978

    Purging the Past and Gauging the Future: Stage Puritans as Manifestations of Religious Trauma in Restoration Comedies Adapted from European Sources (1660-1689) by Alice Marion-Ferrand

    Published 2024-12-01
    “…Looking at this corpus through the prism of religious figures, in particular that of the stage Puritan, this paper aims to show how Restoration comedies both deal with the trauma of the Interregnum and use its memory to question ongoing and potentially upcoming religious troubles. …”
    Get full text
    Article
  19. 2979

    Les marges renaissantes : Amazigh, Juif, Noir. Ce que la révolution a changé dans ce « petit pays homogène par excellence » qu’est la Tunisie by Stéphanie Pouessel

    Published 2012-10-01
    “…The phase of remodeling of the “nation’s” representations leads to the emergence of new insights on discrimination, recognition or plural memory : where does the Jewish heritage stand in a country dominated by political Islam ? …”
    Get full text
    Article
  20. 2980

    Simple-Random-Sampling-Based Multiclass Text Classification Algorithm by Wuying Liu, Lin Wang, Mianzhu Yi

    Published 2014-01-01
    “…Supported by a token level memory to store labeled documents, the SRSMTC algorithm uses a text retrieval approach to solve text classification problems. …”
    Get full text
    Article