-
81
The role of long, non-coding RNA in the biology of tumors
Published 2020-04-01“…In addition to small RNAs (such as microRNAs (miRNA)), long non-coding RNAs (lncRNAs), which are a large group of non-coding RNAs (ncRNAs) over 200 nucleotides in length, have been discovered. …”
Get full text
Article -
82
Parallel evolution of chordate cis-regulatory code for development.
Published 2013-11-01“…Consequently the evolution of the cis-regulatory code for urochordate development remains largely uncharacterised. …”
Get full text
Article -
83
An Over-the-Air Multi-User Convolutional Code for URLLC
Published 2025-01-01“…These applications typically involve the exchange of small information blocks. Convolutional codes (CC) exhibit near-optimal performance when encoding short blocks. …”
Get full text
Article -
84
The Regulatory Role of LncRNAs in Modulating Autophagy and Drug Resistance in Non-Small-Cell Lung Cancer: Focus on Targeted Therapeutic Approaches
Published 2025-07-01Subjects: “…long non-coding RNA (lncRNAs)…”
Get full text
Article -
85
Coding and non-coding RNA expression in NSC34 cells following TDP-43 depletion and mutant TDP-43 M337V expression
Published 2025-07-01“…Additionally, the inclusion of non-coding RNAs facilitates the construction of gene regulatory networks, providing insights into the interplay between coding and non-coding RNAs in gene expression regulation under TDP-43 loss-of-function or pathogenic mutation conditions.…”
Get full text
Article -
86
Suppression of Side Lobe Signals Based on Compound Barker Codes
Published 2017-04-01“…A method of side lobe suppression for PSK signals based on the compound Barker codes with a small number of distinct weights is considered. …”
Get full text
Article -
87
Data distribution strategy based on the X-RDP array codes
Published 2013-08-01“…The theoretical analysis shows that the comprehensive proper-ties of the X-RDP codeis better than other popular MDS codes in encoding and decoding efficiency, small writes and bal-ance performance, thus the X-RDP code is practically meaningful for storage systems.…”
Get full text
Article -
88
On Reducing Communication Energy Using Cross-Sensor Coding Technique
Published 2011-02-01“…We formulate our coding problem as an integer linear programming problem and show how to construct a number of codes based on different criteria. …”
Get full text
Article -
89
Characterization of errors in a CNOT between surface code patches
Published 2024-12-01“…Here, we investigate a lattice-surgery-based CNOT operation between two surface code patches under phenomenological error models. …”
Get full text
Article -
90
City as Part of the Spanish Cultural Code: The «Inside» and the «Outside» View
Published 2024-03-01“…The article seeks to determine the extent to which the national cultural code of the Spaniards is influenced by the designations of people’s place of residence or birth. …”
Get full text
Article -
91
Zernike Moments Description of Solar and Astronomical Features: Python Code
Published 2023-11-01Get full text
Article -
92
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
93
Exploring RNA modifications in infectious non-coding circular RNAs
Published 2025-12-01“…Viroids, small circular non-coding RNAs, act as infectious pathogens in higher plants, demonstrating high stability despite consisting solely of naked RNA. …”
Get full text
Article -
94
Contribution of rare coding variants to microcephaly in individuals with neurodevelopmental disorders
Published 2025-08-01“…Abstract Background Microcephaly, characterized by an abnormally small head size, frequently co-occurs with neurodevelopmental disorders (NDDs). …”
Get full text
Article -
95
Non-coding glucometers among pediatric patients with diabetes: looking for the target population and an accuracy evaluation of no-coding personal glucometer Glukometry bez kodowani...
Published 2011-09-01“…Aim of the study: To evaluate the potential for miscoding of a personal glucometer, to define a target population among pediatric patients with diabetes for a non-coding glucometer and the accuracy of the Contour TS non-coding system. …”
Get full text
Article -
96
-
97
Problematic issues of granting subsidies to business entities: Russian experience
Published 2018-12-01Subjects: Get full text
Article -
98
Time-resolved miRNA-mRNA integrated analysis reveals the miRNA-mRNA networks underlying plasma membrane damage-dependent senescence and DNA damage response-dependent senescence in...
Published 2025-08-01Subjects: “…Small non-coding RNAs…”
Get full text
Article -
99
Bosonic Pauli+: Efficient Simulation of Concatenated Gottesman-Kitaev-Preskill Codes
Published 2024-11-01“…We demonstrate the method by simulating a hybrid surface code, where the data qubits are finite-energy GKP qubits stabilized using the small-Big-small (sBs) protocol, and the syndrome qubits are standard two-level systems. …”
Get full text
Article -
100
Research on Code-Division Multiple-Access of DS-SS/EBPSK Modulation
Published 2015-01-01“…In order to realize multiple-access communication of direct sequence spread spectrum extended binary phase shift keying(DS-SS/EBPSK)modulation, a realization method based on code-division was researched. Firstly, based on the analysis of DS-SS/EBPSK modulation signal, the effective spread spectrum sequence which can be used for dispreading and code division multiple-access was obtained by formulizing the DS-SS/EBPSK modulation process. …”
Get full text
Article