This study introduces DualPG‐DTA, a framework integrating two pre‐trained models to generate molecular and protein representations. It constructs dual graphs processed by specialized neural networks with dynamic attention for feature fusion, achieving superior benchmark performance.
Yihao Chen +7 more
wiley +1 more source
Enhanced backpropagation neural network accuracy through an improved genetic algorithm for tourist flow prediction in an ecological village. [PDF]
Chen X, Wong CUI, Zhang H, Song Z.
europepmc +1 more source
Assembly and comparative analysis of the complete mitochondrial genome of Tetrastigma Hemsleyanum Diels & Gilg: an invaluable traditional Chinese medicine. [PDF]
Han S, Lai J, Cheng S, Wu Y, Fan M.
europepmc +1 more source
Development and Validation of the Primary School Students' Perceived Teacher Trust Behaviors Scale. [PDF]
Wang Y, Chen J, Li G, Zheng X, Liu X.
europepmc +1 more source
Regulatory Landscapes of Non-Coding RNAs During Drought Stress in Plants. [PDF]
Bolc P +4 more
europepmc +1 more source
ERAP1 Allotypes 2 and 10 Differentially Regulate the Immunopeptidome of Melanocytes. [PDF]
Nikopaschou M +6 more
europepmc +1 more source
Concerted genetic and transcriptomic shifts underlie adaptation to a latitudinal thermal gradient within a widespread mantis shrimp. [PDF]
Zhang L, Sha Z, Cheng J.
europepmc +1 more source
Forward Computations for Context-Adaptive Variable-Length Coding Design
IEEE Transactions on Circuits and Systems II: Express Briefs, 2010This brief presents an innovative high-speed context-adaptive variable-length encoder. First, a direct forward algorithm rather than backward tracking is proposed to compute the coding parameters. The forward computation without data reordering can shorten the latency time and the processing cycle. Based on the algorithm, the real-time chip is designed
Shih-Chang Hsia, Wen-Hsien Liao
openaire +1 more source
Enhanced Image Encryption Scheme using Context Adaptive Variable Length Coding
The Journal of the Institute of Webcasting, Internet and Telecommunication, 2013Abstract o achieve real-time encryption and video data transcoding, current video encryption methods usually integrate encryption algorithm with video compression course. This paper is devoted to discussing the video encryption technology, by encrypting to avoid unauthorized person getting video data.
Gab-Yong Shim, Malrey Lee
openaire +1 more source

