Showing 81 - 100 results of 1,646 for search 'code small', query time: 0.12s Refine Results
  1. 81

    The role of long, non-coding RNA in the biology of tumors by O. A. Beylerli, I. F. Gareev

    Published 2020-04-01
    “…In addition to small RNAs (such as microRNAs (miRNA)), long non-coding RNAs (lncRNAs), which are a large  group of non-coding RNAs (ncRNAs) over 200 nucleotides in length, have been discovered. …”
    Get full text
    Article
  2. 82

    Parallel evolution of chordate cis-regulatory code for development. by Laura Doglio, Debbie K Goode, Maria C Pelleri, Stefan Pauls, Flavia Frabetti, Sebastian M Shimeld, Tanya Vavouri, Greg Elgar

    Published 2013-11-01
    “…Consequently the evolution of the cis-regulatory code for urochordate development remains largely uncharacterised. …”
    Get full text
    Article
  3. 83

    An Over-the-Air Multi-User Convolutional Code for URLLC by Rafael Santos, Daniel Castanheira, Adao Silva, Atilio Gameiro

    Published 2025-01-01
    “…These applications typically involve the exchange of small information blocks. Convolutional codes (CC) exhibit near-optimal performance when encoding short blocks. …”
    Get full text
    Article
  4. 84
  5. 85

    Coding and non-coding RNA expression in NSC34 cells following TDP-43 depletion and mutant TDP-43 M337V expression by Ismail Gbadamosi, Sandra Binias, Bartłomiej Gielniewski, Ramiro Magno, Isabel Duarte, Ali Jawaid

    Published 2025-07-01
    “…Additionally, the inclusion of non-coding RNAs facilitates the construction of gene regulatory networks, providing insights into the interplay between coding and non-coding RNAs in gene expression regulation under TDP-43 loss-of-function or pathogenic mutation conditions.…”
    Get full text
    Article
  6. 86

    Suppression of Side Lobe Signals Based on Compound Barker Codes by V. A. Syanov

    Published 2017-04-01
    “…A method of side lobe suppression for PSK signals based on the compound Barker codes with a small number of distinct weights is considered. …”
    Get full text
    Article
  7. 87

    Data distribution strategy based on the X-RDP array codes by Wu-nan WAN, Wang SUO, Yun CHEN, Tuo WANG

    Published 2013-08-01
    “…The theoretical analysis shows that the comprehensive proper-ties of the X-RDP codeis better than other popular MDS codes in encoding and decoding efficiency, small writes and bal-ance performance, thus the X-RDP code is practically meaningful for storage systems.…”
    Get full text
    Article
  8. 88

    On Reducing Communication Energy Using Cross-Sensor Coding Technique by Kien Nguyen, Thinh Nguyen, Sen-Ching Cheung

    Published 2011-02-01
    “…We formulate our coding problem as an integer linear programming problem and show how to construct a number of codes based on different criteria. …”
    Get full text
    Article
  9. 89

    Characterization of errors in a CNOT between surface code patches by Bálint Domokos, Áron Márton, János K. Asbóth

    Published 2024-12-01
    “…Here, we investigate a lattice-surgery-based CNOT operation between two surface code patches under phenomenological error models. …”
    Get full text
    Article
  10. 90

    City as Part of the Spanish Cultural Code: The «Inside» and the «Outside» View by Yu. L. Obolenskaya

    Published 2024-03-01
    “…The article seeks to determine the extent to which the national cultural code of the Spaniards is influenced by the designations of people’s place of residence or birth. …”
    Get full text
    Article
  11. 91
  12. 92

    Hard-coded backdoor detection method based on semantic conflict by Anxiang HU, Da XIAO, Shichen GUO, Shengli LIU

    Published 2023-02-01
    “…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
    Get full text
    Article
  13. 93

    Exploring RNA modifications in infectious non-coding circular RNAs by Pavel Vopalensky, Anton Škríba, Michela Chiumenti, Lucia Ďuričeková, Anna Šimonová, Ondřej Lukšan, Francesco Di Serio, Beatriz Navarro, Hana Cahova

    Published 2025-12-01
    “…Viroids, small circular non-coding RNAs, act as infectious pathogens in higher plants, demonstrating high stability despite consisting solely of naked RNA. …”
    Get full text
    Article
  14. 94
  15. 95

    Non-coding glucometers among pediatric patients with diabetes: looking for the target population and an accuracy evaluation of no-coding personal glucometer Glukometry bez kodowani... by Wojciech Fendler, Anna Hogendorf, Agnieszka Szadkowska, Wojciech Młynarski

    Published 2011-09-01
    “…Aim of the study: To evaluate the potential for miscoding of a personal glucometer, to define a target population among pediatric patients with diabetes for a non-coding glucometer and the accuracy of the Contour TS non-coding system. …”
    Get full text
    Article
  16. 96
  17. 97
  18. 98
  19. 99

    Bosonic Pauli+: Efficient Simulation of Concatenated Gottesman-Kitaev-Preskill Codes by Florian Hopfmueller, Maxime Tremblay, Philippe St-Jean, Baptiste Royer, Marc-Antoine Lemonde

    Published 2024-11-01
    “…We demonstrate the method by simulating a hybrid surface code, where the data qubits are finite-energy GKP qubits stabilized using the small-Big-small (sBs) protocol, and the syndrome qubits are standard two-level systems. …”
    Get full text
    Article
  20. 100

    Research on Code-Division Multiple-Access of DS-SS/EBPSK Modulation by Peng Zhang, Lenan Wu

    Published 2015-01-01
    “…In order to realize multiple-access communication of direct sequence spread spectrum extended binary phase shift keying(DS-SS/EBPSK)modulation, a realization method based on code-division was researched. Firstly, based on the analysis of DS-SS/EBPSK modulation signal, the effective spread spectrum sequence which can be used for dispreading and code division multiple-access was obtained by formulizing the DS-SS/EBPSK modulation process. …”
    Get full text
    Article