Results 41 to 50 of about 2,087,550 (284)
Comments on all-loop constraints for scattering amplitudes and Feynman integrals
We comment on the status of “Steinmann-like” constraints, i.e. all-loop constraints on consecutive entries of the symbol of scattering amplitudes and Feynman integrals in planar N $$ \mathcal{N} $$ = 4 super-Yang-Mills, which have been crucial for the ...
Song He, Zhenjie Li, Qinglin Yang
doaj +1 more source
Cauchy Density-Based Algorithm for VANETs Clustering in 3D Road Environments
Vehicular ad hoc networks (VANETs) are emerging to serve various types of applications for serving smart cities and intelligent transportation systems. There are several challenging factors for ensuring reliable and stable VANETs communications.
Ahmed Salih Al-Obaidi+7 more
doaj +1 more source
Common methods of texture reconstruction first build a visual list for each triangular face, and then select the best image for each triangular face based on the graph-cut method.
Fei Wang+5 more
doaj +1 more source
ЗБЕРІГАННЯ ІЄРАРХІЧИХ СТРУКТУР В РЕЛЯЦІЙНИХ БАЗАХ ДАНИХ
Системи управління реляційними базами даних і сама мова SQL не мають жодних вбудованих механізмів для зберігання та управління ієрархічними структурами. Існує кілька різних способів представлення дерев в реляційних базах даних. В роботі розглянуто метод
Volodymyr Markitan+3 more
doaj +1 more source
The specific characteristics of graph workloads make it hard to design a one-size-fits-all graph storage system. Systems that support transactional updates use data structures with poor data locality, which limits the efficiency of analytical workloads or even simple edge scans.
Wenguang Chen+7 more
openaire +4 more sources
A Distribution Testing Oracle Separating QMA and QCMA
It is a long-standing open question in quantum complexity theory whether the definition of non-deterministic quantum computation requires quantum witnesses ( QMA ) or if classical witnesses suffice ( QCMA ).
Anand Natarajan, Chinmay Nirkhe
semanticscholar +1 more source
Research on incremental deployment mechanism of network modality for polymorphic network environment
Polymorphic networks support diverse network requirements and can coexist, evolve, and change on a unified physical or logical infrastructure in the form of network modality.They can maximize the innovation vitality of network technology driven by new ...
Jiong LI+4 more
doaj +2 more sources
Disruption of SETD3‐mediated histidine‐73 methylation by the BWCFF‐associated β‐actin G74S mutation
The β‐actin G74S mutation causes altered interaction of actin with SETD3, reducing histidine‐73 methylation efficiency and forming two distinct actin variants. The variable ratio of these variants across cell types and developmental stages contributes to tissue‐specific phenotypical changes. This imbalance may impair actin dynamics and mechanosensitive
Anja Marquardt+8 more
wiley +1 more source
This study reveals how prime editing guide RNA (pegRNA) secondary structure and reverse transcriptase template length affect prime editing efficiency in correcting the phospholamban R14del cardiomyopathy‐associated mutation. Insights support the design of structurally optimized enhanced pegRNAs for precise gene therapy.
Bing Yao+7 more
wiley +1 more source
Social Network Graph Generation Method Satisfying Personalized Differential Privacy
Purposes Aiming at the problem that the randomized neighbor list method of directly disturbing the neighbor list in the existing local differential privacy social network graph generation algorithm will lead to excessive noise and imbalanced privacy ...
Rui GAO+3 more
doaj +1 more source