Showing 821 - 840 results of 10,293 for search 'data coding', query time: 0.21s Refine Results
  1. 821

    Data cleaning and harmonization of clinical trial data: Medication-assisted treatment for opioid use disorder. by Raymond R Balise, Mei-Chen Hu, Anna R Calderon, Gabriel J Odom, Laura Brandt, Sean X Luo, Daniel J Feaster

    Published 2024-01-01
    “…A systematic harmonization of OUD clinical trial data can be accomplished, despite heterogeneous data coding and classification procedures, by standardizing commonly assessed characteristics. …”
    Get full text
    Article
  2. 822

    Construction and validation of a prognostic model for colorectal cancer based on migrasome-related long non-coding RNAs by Qiang Lv, Qingzhu Yang, Hongsheng Chen, Yang Wang, Yuliuming Wang, Xu Hu, Ming Liu

    Published 2025-05-01
    “…Methods RNA sequencing data from COAD patients were acquired from The Cancer Genome Atlas Program (TCGA) database to construct a prognostic lncRNA model based on known migrasome-related genes (MRGs). …”
    Get full text
    Article
  3. 823

    The role of notch signaling pathway and non-coding RNAs in cancer and inflammation: progress, therapeutic insights, and future directions by Rong-Zu Nie, Rong-Zu Nie, Hang Wang, Hang Wang, Shuang-Shuang Wang, Shuang-Shuang Wang, Chen Chen, Chen Chen, Huo-Min Luo, Huo-Min Luo, Hao-Kun Zhang, Hao-Kun Zhang, Zhao-Hui Jing, Zhao-Hui Jing, Pei-Feng Li, Pei-Feng Li

    Published 2025-06-01
    “…The Notch signaling pathway and non-coding RNAs (ncRNAs) play significant roles in regulating key cellular processes such as cancer progression, metastasis, and drug resistance. …”
    Get full text
    Article
  4. 824
  5. 825

    Transcriptomic Analysis Reveals the Role of Long Non-Coding RNAs in Response to Drought Stress in Tibetan Hulless Barley by Zitao Wang, Yue Fang, Qinyue Min, Kaifeng Zheng, Yanrong Pang, Jinyuan Chen, Feng Qiao, Shengcheng Han

    Published 2025-06-01
    “…While substantial progress has been made in interpreting the functions and regulatory mechanisms of coding RNAs, the study of lncRNAs in Tibetan hulless barley remains incomplete. …”
    Get full text
    Article
  6. 826

    Preparation of highly multiplexed small RNA sequencing libraries by Helena Persson, Rolf Søkilde, Anna Chiara Pirona, Carlos Rovira

    Published 2017-08-01
    “…MicroRNAs (miRNAs) are ∼22-nucleotide-long small non-coding RNAs that regulate the expression of protein-coding genes by base pairing to partially complementary target sites, preferentially located in the 3´ untranslated region (UTR) of target mRNAs. …”
    Get full text
    Article
  7. 827
  8. 828
  9. 829
  10. 830

    Defining a minimal cell: essentiality of small ORFs and ncRNAs in a genome‐reduced bacterium by Maria Lluch‐Senar, Javier Delgado, Wei‐Hua Chen, Verónica Lloréns‐Rico, Francis J O'Reilly, Judith AH Wodke, E Besray Unal, Eva Yus, Sira Martínez, Robert J Nichols, Tony Ferrar, Ana Vivancos, Arne Schmeisky, Jörg Stülke, Vera van Noort, Anne‐Claude Gavin, Peer Bork, Luis Serrano

    Published 2015-01-01
    “…We found that the minimal essential genome is comprised of 33% (269,410 bp) of the M. pneumoniae genome. Our data highlight an unexpected hidden layer of smORFs with essential functions, as well as non‐coding regions, thus changing the focus when aiming to define the minimal essential genome.…”
    Get full text
    Article
  11. 831

    Alih Kode dan Campur Kode dalam Interaksi Mahasantri Putri Mahad Al-Jamiah IAIN Curup by Nisa Ul Amanah, Maria Botifar, Ummul Khair

    Published 2021-12-01
    “…This study aims to describe the form of code switching, code mixing and speech events in the interaction of female students of Mahad Al-Jamiah IAIN Curup. …”
    Get full text
    Article
  12. 832

    Optimizing Spatial Complexity of the Hard Decision Decoder Based on Hash and Syndrome Decoding (HSDec) by Seddiq El Kasmi Alaoui, Tarik Chanyour, Hamza Faham, Said Nouh

    Published 2024-12-01
    “…While maintaining the integrity of error correction, this new method guarantees memory reduction rates of over 96 % for the BCH(63, 39, 9) code and over 84 % for the QR(47, 24, 11) code compared to HSDec. …”
    Get full text
    Article
  13. 833

    Protection of personal data of the employee by S. M. Gusarov, K. Yu. Melnyk

    Published 2023-06-01
    “…Problematic aspects of the Code of Labor Laws of Ukraine, the Law of Ukraine “On Protection of Personal Data” and the draft Law of Ukraine “On Labor” regarding the completeness of legal regulations on the protection of personal data of employees are outlined. …”
    Get full text
    Article
  14. 834

    NORDIC denoising on VASO data by Lasse Knudsen, Lasse Knudsen, Luca Vizioli, Federico De Martino, Lonike K. Faes, Daniel A. Handwerker, Steen Moeller, Peter A. Bandettini, Peter A. Bandettini, Laurentius Huber

    Published 2025-01-01
    “…Since very few groups currently have 3T VASO data, by sharing our analysis and code, we can compile and compare the effects of NORDIC across a broader range of acquisition parameters and study designs. …”
    Get full text
    Article
  15. 835

    Data-Efficient Reinforcement Learning Framework for Autonomous Flight Based on Real-World Flight Data by Uicheon Lee, Seonah Lee, Kyonghoon Kim

    Published 2025-03-01
    “…Although reinforcement learning offers an alternative, its practical application in real-world settings is hindered by the substantial data requirements. In this study, we develop a framework that integrates a Generative Adversarial Network (GAN) and Hindsight Experience Replay (HER) into model-based reinforcement learning to enhance data efficiency and accuracy. …”
    Get full text
    Article
  16. 836

    Threat analysis and defense methods of deep-learning-based data theft in data sandbox mode by Hezhong PAN, Peiyi HAN, Xiayu XIANG, Shaoming DUAN, Rongfei ZHUANG, Chuanyi LIU

    Published 2021-11-01
    “…The threat model of deep-learning-based data theft in data sandbox model was analyzed in detail, and the degree of damage and distinguishing characteristics of this attack were quantitatively evaluated both in the data processing stage and the model training stage.Aiming at the attack in the data processing stage, a data leakage prevention method based on model pruning was proposed to reduce the amount of data leakage while ensuring the availability of the original model.Aiming at the attack in model training stage, an attack detection method based on model parameter analysis was proposed to intercept malicious models and prevent data leakage.These two methods do not need to modify or encrypt data, and do not need to manually analyze the training code of deep learning model, so they can be better applied to data theft defense in data sandbox mode.Experimental evaluation shows that the defense method based on model pruning can reduce 73% of data leakage, and the detection method based on model parameter analysis can effectively identify more than 95% of attacks.…”
    Get full text
    Article
  17. 837

    Human Contributions to Safety Data Testbed Flight Simulation Study: Data Methods, Processing, and Quality by Tyler Fettrow, Chad Stephens, Lance Prinzel, Jon Holbrook, Kathryn Ballard, Sepehr Bastami, Michael Stewart, Daniel Kiggins

    Published 2025-07-01
    “…The data and code are publicly available providing a dynamic resource that encourages public contribution to quantification of resilient behavior in commercial airline pilots.…”
    Get full text
    Article
  18. 838

    Maturity of Employment Data Interoperability in supporting One Employment Data at the Ministry and Regional Government Level by Herpita Wahyuni, Dyah Mutiarin, Wahyudi Kumorotomo, Ulung Pribadi, Nur Syakiran Akmal Ismail

    Published 2023-12-01
    “…The research results show that the Preparedness indicator with a percentage of NVivo 12 Plus analysis results is 20.00% with the implementation of strengthening the implementation of one employment data policy by coordinating between central and regional employment agencies which aims to unify perceptions between the Ministry of Manpower and the Department in charge of employment regarding data standards, metadata, and employment data reference codes. …”
    Get full text
    Article
  19. 839

    Predicting drug protein interactions based on improved support vector data description in unbalanced data by Alireza Khorramfard, Jamshid Pirgazi, Ali Ghanbari Sorkhi

    Published 2024-12-01
    “…To address the challenge of unbalanced datasets, a Support Vector Data Description (SVDD) approach is employed, outperforming standard techniques like SMOTE and ENN in balancing data. …”
    Get full text
    Article
  20. 840

    An Autoencoder-Based Task-Oriented Semantic Communication System for M2M Communication by Prabhath Samarathunga, Hossein Rezaei, Maheshi Lokumarambage, Thushan Sivalingam, Nandana Rajatheva, Anil Fernando

    Published 2024-11-01
    “…The proposed autoencoder architecture, with a semantically modeled encoder and decoder, transmits image data as a reduced-dimension vector (latent vector) through an error-prone channel. …”
    Get full text
    Article