-
21
Newly Constructed Subway on Over-Track Bridge Safety and Vibration Reduction Measure
Published 2024-01-01Get full text
Article -
22
Evidence for a Role of the Long Non-Coding RNA ITGB2-AS1 in Eosinophil Differentiation and Functions
Published 2024-11-01“…To further explore its role in eosinophil biology, we generated a stable <i>ITGB2-AS1</i> knockdown in the HL-60 cell line. …”
Get full text
Article -
23
Stochastic Technique on Assigning Adaptive Minimal Code Bits to Locally Frequent Symbols in Continuous Data Stream
Published 2025-01-01“…We also found that an encoder can assign shorter code to the locally frequent symbols suddenly appeared in data stream, and that it results more data reduction than the conventional methods. …”
Get full text
Article -
24
Differential Cryptanalysis of the Reduced Pointer Authentication Code Function Used in Arm’s FEAT_PACQARMA3 Feature
Published 2025-03-01“… The Pointer Authentication Code (PAC) feature in the Arm architecture is used to enforce the Code Flow Integrity (CFI) of running programs. …”
Get full text
Article -
25
Flexible Edge-AI Software Execution Architecture Based on Cloud-Connected Incremental Learning
Published 2025-01-01Get full text
Article -
26
Iris: A Next Generation Digital Pathology Rendering Engine
Published 2025-01-01Get full text
Article -
27
Integer programming‐based non‐uniform window decoding schedules for spatially coupled low‐density parity‐check codes
Published 2022-10-01“…Abstract Spatially coupled low‐density parity‐check (SC‐LDPC) codes generally use a window decoding scheme, which is known to yield a near‐optimal decoding, compared to full block decoding. …”
Get full text
Article -
28
A Chisel Generator for Standardized 3-D Die-to-Die Interconnects
Published 2024-01-01“…A 3-D heterogeneous integration (3-D-HI) is poised to enable a new era of high-performance integrated circuits via a multitude of benefits, including a reduction in I/O power consumption and ability to tightly couple disparate technologies. …”
Get full text
Article -
29
Toward a thermodynamic theory of evolution: a theoretical perspective on information entropy reduction and the emergence of complexity
Published 2025-07-01“…Informational entropy reduction is conceptualized as operating in synergy with Darwinian mechanisms. …”
Get full text
Article -
30
A Low Complexity Algorithm for 3D-HEVC Depth Map Intra Coding Based on MAD and ResNet
Published 2025-01-01“…As an extension of HEVC, 3D-HEVC retains the quadtree structure inherent to HEVC and is currently recognized as the most widely adopted international standard for stereoscopic video coding. In intra coding, quadtree partitioning is determined recursively through rate-distortion cost calculations. …”
Get full text
Article -
31
Generative design and multi-objective optimization for enhanced building thermal performance
Published 2025-09-01Get full text
Article -
32
Damage Reduction of Explosively Driven Spallation by Machining V-Notch Rows on the Surfaces of 304 Stainless Steel Plates
Published 2014-09-01“…The cross-sectional observation of tested and recovered specimens shows that remarkable effects on the reduction of spall damages have been achieved in case of appropriate V-notch configurations. …”
Get full text
Article -
33
Exploration of novel harm reduction approaches to increase client engagement (ENHANCE): protocol for a prospective cohort study
Published 2025-05-01“…At enrollment, clients select a self-generated identification code that is documented in all subsequent harm reduction services received from ten SSPs in Wisconsin. …”
Get full text
Article -
34
Analysis and knowledge extraction of newborn resuscitation activities from annotation files
Published 2024-11-01“…The resuscitation activity timelines were manually annotated, but in future work we will use the proposed method on automatically generated timelines from video and sensor data. We propose an encoding generator with unique codes for combination of activities. …”
Get full text
Article -
35
Adaptation of the modular number system in threshold secret sharing schemes
Published 2025-03-01“…The results of the presented work allow to conclude for modular threshold cryptosystems of secret sharing in distributed data processing systems that the use of a linear masking function and narrowing the range of changes in the masking analogue S̃ of the original secret S, allowing for minimally redundant coding for the selected p1, p2, …, pn, causes a significant reduction in the computational complexity of the calculated minimal-redundant modular arithmetic relations of integral characteristics within the framework of the model under study. …”
Get full text
Article -
36
Whole brain functional connectivity: Insights from next generation neural mass modelling incorporating electrical synapses.
Published 2024-12-01“…Recently, a new class of neural mass model has been developed from an exact mean field reduction of a network of spiking cortical cell models with a biophysically realistic model of the chemical synapse. …”
Get full text
Article -
37
Parallel boosting neural network with mutual information for day-ahead solar irradiance forecasting
Published 2025-04-01Get full text
Article -
38
On Simplifying Expressions with Mixed Boolean-Arithmetic
Published 2023-06-01“…Based on the length reduction algorithm, an algorithm is constructed that allows to estimate the resistance of an MBA-expression to simplification. …”
Get full text
Article -
39
Comparative Analysis of Input Image Characteristics in Convolutional Neural Network-based Signature Detection
Published 2025-06-01“…Subsequently, machine code instructions are generated and then converted into four distinct image format options. …”
Get full text
Article -
40
Enhancing Malware Detection via RGB Assembly Visualization and Hybrid Deep Learning Models
Published 2025-06-01“…This research introduces a novel image-based malware classification framework that uses hybrid-model Convolutional Neural Networks to process RGB images generated from assembly code. We present MalevisAsm, an enriched dataset that merges MaleVis malware samples with benign files, and propose a hybrid deep learning model that combines EfficientNetB0 and DenseNet121 for robust feature extraction. …”
Get full text
Article