Suggested Topics within your search.
Suggested Topics within your search.
- Agriculture 1
- Artificial Intelligence 1
- Artificial intelligence 1
- Automobiles 1
- Data Mining and Knowledge Discovery 1
- Data mining 1
- Economic Policy 1
- Economic policy 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Environmental Economics 1
- Environmental economics 1
- Fault location (Engineering) 1
- Industrial Organization 1
- Industrial organization 1
- Maintenance and repair 1
- Soil Science & Conservation 1
- Soil conservation 1
- Soil science 1
- Sustainable Development 1
- Sustainable development 1
-
821
Data cleaning and harmonization of clinical trial data: Medication-assisted treatment for opioid use disorder.
Published 2024-01-01“…A systematic harmonization of OUD clinical trial data can be accomplished, despite heterogeneous data coding and classification procedures, by standardizing commonly assessed characteristics. …”
Get full text
Article -
822
Construction and validation of a prognostic model for colorectal cancer based on migrasome-related long non-coding RNAs
Published 2025-05-01“…Methods RNA sequencing data from COAD patients were acquired from The Cancer Genome Atlas Program (TCGA) database to construct a prognostic lncRNA model based on known migrasome-related genes (MRGs). …”
Get full text
Article -
823
The role of notch signaling pathway and non-coding RNAs in cancer and inflammation: progress, therapeutic insights, and future directions
Published 2025-06-01“…The Notch signaling pathway and non-coding RNAs (ncRNAs) play significant roles in regulating key cellular processes such as cancer progression, metastasis, and drug resistance. …”
Get full text
Article -
824
Novel non-coding FOXP3 transcript isoform associated to potential transcriptional interference in human regulatory T cells
Published 2025-12-01“…Western blotting, analysis of public mass spectrometry data, and transfection of in vitro transcribed RNA suggested that longFOXP3 is not coding. …”
Get full text
Article -
825
Transcriptomic Analysis Reveals the Role of Long Non-Coding RNAs in Response to Drought Stress in Tibetan Hulless Barley
Published 2025-06-01“…While substantial progress has been made in interpreting the functions and regulatory mechanisms of coding RNAs, the study of lncRNAs in Tibetan hulless barley remains incomplete. …”
Get full text
Article -
826
Preparation of highly multiplexed small RNA sequencing libraries
Published 2017-08-01“…MicroRNAs (miRNAs) are ∼22-nucleotide-long small non-coding RNAs that regulate the expression of protein-coding genes by base pairing to partially complementary target sites, preferentially located in the 3´ untranslated region (UTR) of target mRNAs. …”
Get full text
Article -
827
Question–Answer Methodology for Vulnerable Source Code Review via Prototype-Based Model-Agnostic Meta-Learning
Published 2025-01-01“…In cybersecurity, identifying and addressing vulnerabilities in source code is essential for maintaining secure IT environments. …”
Get full text
Article -
828
Cracking the code of a correlate of protection against SARS-CoV-2 breakthrough infection in cancer patients
Published 2025-03-01Get full text
Article -
829
Decoding circRNA translation: challenges and advances in computational method development
Published 2025-07-01Get full text
Article -
830
Defining a minimal cell: essentiality of small ORFs and ncRNAs in a genome‐reduced bacterium
Published 2015-01-01“…We found that the minimal essential genome is comprised of 33% (269,410 bp) of the M. pneumoniae genome. Our data highlight an unexpected hidden layer of smORFs with essential functions, as well as non‐coding regions, thus changing the focus when aiming to define the minimal essential genome.…”
Get full text
Article -
831
Alih Kode dan Campur Kode dalam Interaksi Mahasantri Putri Mahad Al-Jamiah IAIN Curup
Published 2021-12-01“…This study aims to describe the form of code switching, code mixing and speech events in the interaction of female students of Mahad Al-Jamiah IAIN Curup. …”
Get full text
Article -
832
Optimizing Spatial Complexity of the Hard Decision Decoder Based on Hash and Syndrome Decoding (HSDec)
Published 2024-12-01“…While maintaining the integrity of error correction, this new method guarantees memory reduction rates of over 96 % for the BCH(63, 39, 9) code and over 84 % for the QR(47, 24, 11) code compared to HSDec. …”
Get full text
Article -
833
Protection of personal data of the employee
Published 2023-06-01“…Problematic aspects of the Code of Labor Laws of Ukraine, the Law of Ukraine “On Protection of Personal Data” and the draft Law of Ukraine “On Labor” regarding the completeness of legal regulations on the protection of personal data of employees are outlined. …”
Get full text
Article -
834
NORDIC denoising on VASO data
Published 2025-01-01“…Since very few groups currently have 3T VASO data, by sharing our analysis and code, we can compile and compare the effects of NORDIC across a broader range of acquisition parameters and study designs. …”
Get full text
Article -
835
Data-Efficient Reinforcement Learning Framework for Autonomous Flight Based on Real-World Flight Data
Published 2025-03-01“…Although reinforcement learning offers an alternative, its practical application in real-world settings is hindered by the substantial data requirements. In this study, we develop a framework that integrates a Generative Adversarial Network (GAN) and Hindsight Experience Replay (HER) into model-based reinforcement learning to enhance data efficiency and accuracy. …”
Get full text
Article -
836
Threat analysis and defense methods of deep-learning-based data theft in data sandbox mode
Published 2021-11-01“…The threat model of deep-learning-based data theft in data sandbox model was analyzed in detail, and the degree of damage and distinguishing characteristics of this attack were quantitatively evaluated both in the data processing stage and the model training stage.Aiming at the attack in the data processing stage, a data leakage prevention method based on model pruning was proposed to reduce the amount of data leakage while ensuring the availability of the original model.Aiming at the attack in model training stage, an attack detection method based on model parameter analysis was proposed to intercept malicious models and prevent data leakage.These two methods do not need to modify or encrypt data, and do not need to manually analyze the training code of deep learning model, so they can be better applied to data theft defense in data sandbox mode.Experimental evaluation shows that the defense method based on model pruning can reduce 73% of data leakage, and the detection method based on model parameter analysis can effectively identify more than 95% of attacks.…”
Get full text
Article -
837
Human Contributions to Safety Data Testbed Flight Simulation Study: Data Methods, Processing, and Quality
Published 2025-07-01“…The data and code are publicly available providing a dynamic resource that encourages public contribution to quantification of resilient behavior in commercial airline pilots.…”
Get full text
Article -
838
Maturity of Employment Data Interoperability in supporting One Employment Data at the Ministry and Regional Government Level
Published 2023-12-01“…The research results show that the Preparedness indicator with a percentage of NVivo 12 Plus analysis results is 20.00% with the implementation of strengthening the implementation of one employment data policy by coordinating between central and regional employment agencies which aims to unify perceptions between the Ministry of Manpower and the Department in charge of employment regarding data standards, metadata, and employment data reference codes. …”
Get full text
Article -
839
Predicting drug protein interactions based on improved support vector data description in unbalanced data
Published 2024-12-01“…To address the challenge of unbalanced datasets, a Support Vector Data Description (SVDD) approach is employed, outperforming standard techniques like SMOTE and ENN in balancing data. …”
Get full text
Article -
840
An Autoencoder-Based Task-Oriented Semantic Communication System for M2M Communication
Published 2024-11-01“…The proposed autoencoder architecture, with a semantically modeled encoder and decoder, transmits image data as a reduced-dimension vector (latent vector) through an error-prone channel. …”
Get full text
Article