Suggested Topics within your search.
Suggested Topics within your search.
-
461
RQdeltaCT: an open-source R package for relative quantification of gene expression using delta Ct methods
Published 2025-08-01Get full text
Article -
462
Advances in preparation and application of coal-based functional nanomaterials
Published 2025-07-01“…However, traditional coal utilization as a primary carbon emission source fundamentally conflicts with the “dual-carbon” strategic goals. …”
Get full text
Article -
463
Joint Multifractal Analysis and Source Testing of River Level Records Based on Multifractal Detrended Cross-Correlation Analysis
Published 2020-01-01“…It is important for the detection of change in multifractality in space. Besides, the cross-correlations in two analyzed series make the analysis of sources of joint multifractality difficult. …”
Get full text
Article -
464
Vehicular cache nodes selection algorithm under load constraint in C-V2X
Published 2021-03-01“…In order to solve the problem that the C-V2X vehicle topology in urban environment was highly dynamic and the load capacity of vehicle nodes was limited, and improve the utilization of vehicular cache resources and reduce the load of base station, a vehicle cache nodes selection algorithm under load constraints was proposed.Firstly, by defining the link stability metric, the predicted weight adjacency matrix was constructed to describe the vehicular micro-topology in essence.Next, the objective function was further constructed under the load constraints and non-overlapping coverage constraint, which maximized the average link weight of the clusters by using the least cache nodes.Finally, the greedy concept was then introduced and the node states were reasonably defined.As a result, the minimum dominating set of the vehicle topology was figured out under the load constraints.Besides, the serviced neighbor nodes were then determined preferentially.The simulation results show that the proposed algorithm is close to the global optimal results in terms of the number of cache nodes and the average weight of cluster links.Moreover, the repeated response ratio of the proposed algorithm is always zero while the request response ratio can achieve the theoretical upper bound.Furthermore, the response times of cache resources can be also effectively improved.…”
Get full text
Article -
465
First Principles Calculation Guided Material Selection of Poly(propylenemonothiocarbonate) for High-Performance Triboelectric Nanogenerators
Published 2025-01-01“…This study drastically expands the material selection for TENGs, offering promising prospects for future applications.…”
Get full text
Article -
466
-
467
-
468
Selective Age Effects on Visual Attention and Motor Attention during a Cued Saccade Task
Published 2014-01-01“…The shift in relations among attention measures between the younger and older participants may indicate a need to prioritize attentional resources with age. These changes may impact an older adult’s ability to function in complex environments.…”
Get full text
Article -
469
Federated Learning for All: A Reinforcement Learning-Based Approach for Ensuring Fairness in Client Selection
Published 2025-01-01“…The method integrates data and system heterogeneity, along with selection history, into the reward function, and leverages Jain’s fairness index to balance selection frequency with client diversity. …”
Get full text
Article -
470
Genetic Structure and Selection Signals for Extreme Environment Adaptation in <i>Lop Sheep</i> of Xinjiang
Published 2025-03-01“…Using Yuli <i>Lop sheep</i> as the reference group, an analysis of the extreme environmental adaptability selection signal of <i>Lop sheep</i> was conducted. …”
Get full text
Article -
471
Algorithms for Automatic Detection and Location of Infrasound Events in the PSDL System
Published 2024-12-01“…An algorithm for detecting infrasound signals by calculating the cross-correlation function between records of individual sensors in a array is described. …”
Get full text
Article -
472
Code vulnerability detection method based on graph neural network
Published 2021-06-01“…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
Get full text
Article -
473
Detection, Parameter Estimation and Direction Finding of Periodic Pulse Signals
Published 2025-07-01“…Simple-to-implement algorithms for detecting periodic pulse signals, evaluating their parameters, and direction finding of the source have been developed. …”
Get full text
Article -
474
Exploring RNA cargo in extracellular vesicles for pleural mesothelioma detection
Published 2025-02-01“…Conclusions This is the first study to characterize the transcriptomic profile of EVs secreted by PM primary cell cultures, demonstrating their potential as biomarker source for early detection. Further investigation of the functional role of PM-EVs will provide new insights into disease biology and therapeutic avenues.…”
Get full text
Article -
475
Schizophrenia Detection and Classification: A Systematic Review of the Last Decade
Published 2024-11-01“…The SZ symptoms can significantly impair daily functioning, underscoring the need for advanced diagnostic tools. …”
Get full text
Article -
476
Assessing Water Resource Planning Policies in the Sefidroud Irrigation and Drainage Network Using the Water-Land-Food Nexus Approach
Published 2025-04-01“…Various management scenarios were implemented through the weighting of the objective functions. The results showed that selecting the best response from multi-objective optimization models depends on the weighted values of the objective functions, and by changing these values, decision-makers can provide various responses to complex optimization problems. …”
Get full text
Article -
477
Data‐Driven Materials Research and Development for Functional Coatings
Published 2024-11-01“…In this paper, recent advances in data‐driven materials research and development (R&D) for functional coatings, highlighting the importance, data sources, working processes, and applications of this paradigm are summarized. …”
Get full text
Article -
478
The role of vesicle trafficking genes in osteoblast differentiation and function
Published 2023-09-01“…The top 3 annotations are all associated with endoplasmic reticulum and Golgi vesicle transport. We selected 22 trafficking genes that have not been well characterized in bone for functional validation in MC3T3-E1 pre-osteoblasts. …”
Get full text
Article -
479
Assessment of Changes in Executive Functions and Attention of Cadets as a Result of Military Parachute Jumping
Published 2025-01-01“…Parachute jumping, as an intense stressor, mobilizes cognitive resources, which can lead to short-term improvements in executive functions. …”
Get full text
Article -
480
IMPLEMENTATION OF LEARNING MANAGEMENT SYSTEMS WITH GENERATIVE ARTIFICIAL INTELLIGENCE FUNCTIONS IN THE POST-PANDEMIC ENVIRONMENT
Published 2024-04-01“…The system goes beyond traditional LMS functionalities by providing suggestions to enhance and diversify lessons. …”
Get full text
Article