Results 11 to 20 of about 40,967 (246)
We consider the problem of error control in a coded, multicast network, focusing on the scenario where the errors can occur only on a proper subset of the network edges. We model this problem via an adversarial noise, presenting a formal framework and a series of techniques to obtain upper and lower bounds on the network's (1-shot) capacity, improving ...
Allison Beemer +2 more
openaire +4 more sources
The security of code-based cryptography relies primarily on the hardness of generic decoding with linear codes. The best generic decoding algorithms are all improvements of an old algorithm due to Prange: they are known under the name of information set decoding techniques (ISD).
Debris-Alazard, Thomas +1 more
openaire +2 more sources
Non-coding RNAs (ncRNAs) have been considered as unimportant additions to the transcriptome. Yet, in light of numerous studies, it has become clear that ncRNAs play important roles in development, health and disease. Long-ignored, long non-coding RNAs (lncRNAs), ncRNAs made of more than 200 nucleotides have gained attention due to their involvement as ...
Lidia Borkiewicz +4 more
openaire +3 more sources
The strength of many synapses is modified by various use and time-dependent processes, including facilitation and depression. A general description of synaptic transfer characteristics must account for the history-dependence of synaptic efficacy and should be able to predict the postsynaptic response to any temporal pattern of presynaptic activity.
K, Sen +3 more
openaire +2 more sources
RSI-Net: Two-Stream Deep Neural Network for Remote Sensing Images-Based Semantic Segmentation
For semantic segmentation of remote sensing images (RSI), trade-off between representation power and location accuracy is quite important. How to get the trade-off effectively is an open question, where current approaches of utilizing very deep models ...
Shuang He +8 more
doaj +1 more source
. Background. Computer circuits enable almost every piece of electronics to function. An opportunity for their optimization was found in one of the ways to implement a circuit, which involves a decoder.
M. Onai, H. Skopyk
doaj +3 more sources
Clinical tooth segmentation based on local enhancement
The tooth arrangements of human beings are challenging to accurately observe when relying on dentists’ naked eyes, especially for dental caries in children, which is difficult to detect. Cone-beam computer tomography (CBCT) is used as an auxiliary method
Jipeng Wu +8 more
doaj +1 more source
A Voxel Generator Based on Autoencoder
In recent years, 3D models have been widely used in the virtual/augmented reality industry. The traditional way of constructing 3D models for real-world objects remains expensive and time-consuming. With the rapid development of graphics processors, many
Bo-Cheng Huang +2 more
doaj +1 more source
The Development and Progress of the UWB Physical Layer
Ultra-wideband (UWB) technology has been applied in many fields, such as radar and indoor positioning, because of its advantages of having a high transmission rate, anti-multipath interference, and good concealment.
Ziteng Lv +8 more
doaj +1 more source
In this issue of Blood, Alvarez-Dominguez et al reveal the strategies used to achieve precise but highly dynamic translational control of protein synthesis during red blood cell development.
openaire +3 more sources

