Results 91 to 100 of about 149,559 (301)
Scalable shared protection approach for mesh WDM-routed networks [PDF]
The paper proposes an approach for calculating the protection pool size on each link in a mesh WDMrouted network. The protection pool evaluation is part of a shared protection scheme applied to a failure dependent scenario and based on aggregated ...
Harle, D.A., Touvet, Florence
core
Smart Sampling Capsule for Capture and Detection of Enteric Pathogens in the Small Intestine
An ingestible smart sampling capsule for capturing asymptomatic enteric pathogens at their primary sites of interaction within the small intestine. This capability enables non‐invasive detection of early pathogen colonization within the gut environment prior to fecal shedding, providing a robust approach for pathogen surveillance and microbiome studies.
Akshay Krishnakumar +6 more
wiley +1 more source
Estimating the stochastic uncertainty in sample-based estimates of infant mortality in Ghana [PDF]
The Infant Mortality Rate (IMR) is an important population health statistic often used as one of the indicators of the health status of a nation. In many countries lacking adequate vital registration systems, sample methods are used to estimate IMRs ...
Baker, J, Kposowa, A, Swanson, DA
core
Discovery of a Potent and Selective TEAD Degrader with Durable Degradation Activity
KG‐FP‐003, a highly potent TEAD‐YAP PROTAC derived from the patented inhibitor is developed. It selectively degrades endogenous TEAD proteins in HiBiT systems without IMiD‐related off‐target effects. Screening across 867 cancer cell lines revealed broad and superior anti‐tumor activity, highlighting its therapeutic potential through targeted TEAD ...
Linhui Cao +25 more
wiley +1 more source
Circular Polya distributions of order k
Two circular Polya distributions of order k are derived by means of generalized urn models and by compounding, respectively, the type I and type II circular binomial distributions of order k of Makri and Philippou (1994) with the beta distribution. It is
Gregory A. Tripsiannis +1 more
doaj +1 more source
Information Entropy Based Multi-Source Power IoT Terminal Equipment Trust Degree Evaluation Method
Power Internet of things terminal (IoT) equipment is vulnerable to identity camouflage, information theft, data tampering and other security threats. Traditional security methods can not resist the network internal attacks from damaged terminals.
Feng ZHAI +5 more
doaj +1 more source
CellPhenoX is an explainable machine learning framework that identifies cell‐specific phenotypes and interaction effects from single‐cell omics data. By leveraging interpretable models, it enables robust discovery of cell‐level phenotypes that contribute to clinical outcomes.
Jade Young +4 more
wiley +1 more source
Modeling Stochastic Crop Yield Expectations with a Limiting Beta Distribution
The use of plausible stochastic price processes in price risk analysis has allowed advances not seen in crop yield risk analysis. This study develops a stochastic process for yield modeling and risk management.
David A. Hennessy
doaj +1 more source
NEAT1 Promotes Epileptogenesis in Tuberous Sclerosis Complex
The primary neurological manifestations of tuberous sclerosis complex (TSC) are intractable epilepsy and intellectual disability. NEAT1 is differentially expressed in TSC‐related epilepsy and influences neuronal excitability by regulating the PI3K/AKT/mTOR signaling pathway.
Suhui Kuang +8 more
wiley +1 more source
The Beta-Binomial Multivariate Model for Correlated Categorical Data
Over the past year, a significant amount of research has explored the logistic regression models for analyzing correlated categorical data. In these models, it is assumed that the data occur in clusters, where individuals within each cluster are ...
Nusar Hajarisman, Asep Saefuddin
doaj

