Search alternatives:
dependency » independence (Expand Search)
Showing 3,681 - 3,700 results of 18,935 for search '(functional OR function) dependency', query time: 0.27s Refine Results
  1. 3681

    Evolutionary fates within a microbial population highlight an essential role for protein folding during natural selection by Matthew I Peña, Milya Davlieva, Matthew R Bennett, John S Olson, Yousif Shamoo

    Published 2010-07-01
    “…Abstract Systems biology can offer a great deal of insight into evolution by quantitatively linking complex properties such as protein structure, folding, and function to the fitness of an organism. Although the link between diseases such as Alzheimer's and misfolding is well appreciated, directly showing the importance of protein folding to success in evolution has been more difficult. …”
    Get full text
    Article
  2. 3682

    FLavourite: Horizontal and Vertical Federated Learning Setting Comparison by Walter Riviera, Ilaria Boscolo Galazzo, Gloria Menegaz

    Published 2025-01-01
    “…The results demonstrate how, with the same aggregation function, HFL converges faster to higher accuracy and f1-score than VFL and demonstrate how HFL can be further improved due to a more flexible architecture. …”
    Get full text
    Article
  3. 3683
  4. 3684

    Nonsingular Meshless Method in an Acoustic Indoor Problem by Adam BRANSKI, Edyta PREDKA

    Published 2017-10-01
    “…It is established any coefficient in the multiquadratic functions depend on the number of influence points, the frequency and the absorption coefficient. …”
    Get full text
    Article
  5. 3685

    The “Slightly Smiling Face” Emoji in WeChat: A Conversation Analytic Investigation by Zhuolei Li

    Published 2025-07-01
    “…This study investigates the interactional functions of the “Slightly Smiling Face” (SSF) emoji in Chinese WeChat conversations through the lens of Conversation Analysis (CA). …”
    Get full text
    Article
  6. 3686

    The “Slightly Smiling Face” Emoji in WeChat: A Conversation Analytic Investigation by Zhuolei Li

    Published 2025-07-01
    “…This study investigates the interactional functions of the “Slightly Smiling Face” (SSF) emoji in Chinese WeChat conversations through the lens of Conversation Analysis (CA). …”
    Get full text
    Article
  7. 3687

    Influence of Heat Transfer on Stress Components in Metallic Plates Weakened by Multi-Curved Holes by Faizah M. Alharbi, Nafeesa G. Alhendi

    Published 2025-05-01
    “…When the initial heat flow is directed to the plate system, complex variable procedures are used to compute the basic Goursat functions, taking into account the time-dependent variables through conformal mapping, which transfers the domain to the exterior of a unit circle. …”
    Get full text
    Article
  8. 3688
  9. 3689

    Nonlinear Dynamics of an Electromagnetically Actuated Cantilever Beam Under Harmonic External Excitation by Nicolae Herisanu, Bogdan Marinca, Vasile Marinca

    Published 2024-11-01
    “…For the first time, the Lyapunov function depends on the approximate solution obtained using OAFM. …”
    Get full text
    Article
  10. 3690

    Soil hydraulic properties database of the pampas region in Buenos Aires province by Golin Aile Selenne, Claudio Ramón Mujica, Ignacio Augusto Villanueva

    Published 2025-02-01
    “…This study demonstrated that model performance varies depending on the evaluated function, with specific models excelling in particular variables, highlighting the need for careful selection based on the characteristics of the dataset. …”
    Get full text
    Article
  11. 3691

    Hard-coded backdoor detection method based on semantic conflict by Anxiang HU, Da XIAO, Shichen GUO, Shengli LIU

    Published 2023-02-01
    “…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
    Get full text
    Article
  12. 3692

    Assessment of Climate Change Impacts on Drought Characteristics and Trivariate Return Period Risks in Western Iran by Behnoush Farokhzadeh, Sepideh Chobeh, Rasool Imani

    Published 2025-03-01
    “…Statistical trend analysis, probability distribution fitting, and copula functions were applied to evaluate the interdependence of drought characteristics and estimate joint return periods.Results: The findings indicate an increasing trend in drought severity, particularly in Hamedan and Saqez, with SSP5-8.5 showing the most extreme conditions. …”
    Get full text
    Article
  13. 3693

    Aligning fermentation conditions with non-canonical amino acid addition strategy is essential for Nε-((2-azidoethoxy)carbonyl)-L-lysine uptake and incorporation into the target pro... by Hana Hanaee-Ahvaz, Marina Alexandra Baumann, Christopher Tauer, Bernd Albrecht, Birgit Wiltschi, Monika Cserjan-Puschmann, Gerald Striedner

    Published 2024-10-01
    “…The developed process is scalable and provides excellent yields of 2.95 mg functionalized Fab per g CDM, which corresponds to 80% of yield obtained with the wild type Fab. …”
    Get full text
    Article
  14. 3694

    Recent advances in metal oxide-biochar composites for water and soil remediation: A review by Hermann Tamaguelon Dzoujo, Victor Odhiambo Shikuku, Sylvain Tome, Aurelle Clandy Ntinkam Simo, Emily C. Ng'eno, Zachary M. Getenga, Marie Annie Etoh, David Daniel Joh Dina

    Published 2024-12-01
    “…This review discusses recent advancements on the potential, limitations, and prospects of using metal-biochar composites for wastewater treatments and soil remediation. Functionalization of biochar with metal oxides can exacerbate the specific surface area up to 98 %, and diminish the porosity structure up to 89 %. …”
    Get full text
    Article
  15. 3695
  16. 3696

    The N-terminus of the Chlamydia trachomatis effector Tarp engages the host Hippo pathway by George F. Aranjuez, Om Patel, Dev Patel, Travis J. Jewett

    Published 2025-04-01
    “…In contrast, not much is known about the function of the N-terminus of Tarp (N-Tarp), though present in many Chlamydia spp. …”
    Get full text
    Article
  17. 3697

    Clusters of patients with non-ST-segment elevation acute coronary syndrome depending on the laboratory data by D. N. Nedbaeva, V. S. Mikhaleva, E. A. Zolotova, O. V. Sirotkina, G. A. Kukharchik

    Published 2024-08-01
    “…To identify clusters of patients with non-ST segment elevation acute coronary syndrome (NSTE-ACS) depending on the laboratory data, including platelet function tests.Material and methods. …”
    Get full text
    Article
  18. 3698

    Trypanosomes lack a canonical EJC but possess an UPF1 dependent NMD-like pathway. by Bernardo Papini Gabiatti, Eden Ribeiro Freire, Johanna Odenwald, Janaina de Freitas Nascimento, Fabiola Holetz, Mark Carrington, Susanne Kramer, Martin Zoltner

    Published 2025-01-01
    “…Altogether, we show that the almost intron-less trypanosomes are in the process of losing the canonical EJC/NMD pathways: Y14 and Magoh have become redundant and the still-functional UPF1-dependent NMD pathway is not essential.…”
    Get full text
    Article
  19. 3699

    Study on the Time-dependent Reliability of Corroded Reinforced Concrete Bridge Structures due to Ship Impact by Tao Fu, Zhixin Zhu, Yan Li, Yue Sun, Lingxiao Meng

    Published 2022-01-01
    “…Based on the study of the probabilistic model and parameters of random variables affecting the time-dependent reliability of ship-bridge collision, the typical damage modes of bridge structures under ship impact are analyzed, the time-dependent reliability analysis model of bridge structures under ship impact is established based on the structural damage criterion, the ship-bridge crash limit state functional function is given, and the time-dependent reliability analysis of ship-bridge collision is carried out based on the response surface method.…”
    Get full text
    Article
  20. 3700