Results 121 to 130 of about 2,163,207 (263)

Adaptive DNA Cryptography With Intelligent Machine Learning for Cloud Data Defense

open access: yesEngineering Reports, Volume 7, Issue 6, June 2025.
Algorithm 2 outlines the process of decrypting DNA‐encoded data retrieved from cloud storage. The DNA‐encoded fragments are first retrieved from the cloud and then concatenated to reconstruct the complete DNA‐encoded data. Subsequently, the DNA sequence is decoded back into encrypted digital data using the reverse of the defined encoding scheme ...
Animesh Kairi   +4 more
wiley   +1 more source

A comparison of integration methods for single‐cell RNA sequencing data and ATAC sequencing data

open access: yesQuantitative Biology, Volume 13, Issue 2, June 2025.
Abstract Single‐cell genomics give us a new perspective to understand multivariate phenotypic and genetic effects at the cellular level. Recently, technologies have started measuring different modalities of individual cells, such as transcriptomes, epigenomes, metabolomes, and spatial profiling.
Yulong Kan   +5 more
wiley   +1 more source

Assessment of Practical Satellite Quantum Key Distribution Architectures for Current and Near‐Future Missions

open access: yesInternational Journal of Satellite Communications and Networking, Volume 43, Issue 3, Page 164-192, May/June 2025.
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci   +7 more
wiley   +1 more source

Vertically Recurrent Neural Networks for Sub‐Grid Parameterization

open access: yesJournal of Advances in Modeling Earth Systems, Volume 17, Issue 6, June 2025.
Abstract Machine learning has the potential to improve the physical realism and/or computational efficiency of parameterizations. A typical approach has been to feed concatenated vertical profiles to a dense neural network. However, feed‐forward networks lack the connections to propagate information sequentially through the vertical column.
P. Ukkonen, M. Chantry
wiley   +1 more source

Big Atomics [PDF]

open access: yesarXiv
In this paper, we give theoretically and practically efficient implementations of Big Atomics, i.e., $k$-word linearizable registers that support the load, store, and compare-and-swap (CAS) operations. While modern hardware supports $k = 1$ and sometimes $k = 2$ (e.g., double-width compare-and-swap in x86), our implementations support arbitrary $k ...
arxiv  

Neutrophil‐to‐lymphocyte ratio at the start of the second course of durvalumab plus tremelimumab therapy predicts therapeutic efficacy in patients with advanced hepatocellular carcinoma: A multicenter analysis

open access: yesHepatology Research, Volume 55, Issue 6, Page 883-895, June 2025.
Durvalumab plus tremelimumab (Dur/Tre) therapy is expected to have good therapeutic efficacy for patients with unresectable hepatocellular carcinoma (u‐HCC). We revealed that the neutrophil‐to‐lymphocyte ratio at the start of the second course (NLR‐2c) value is useful for predicting PFS in u‐HCC patients treated with Dur/Tre therapy.
Takanori Suzuki   +19 more
wiley   +1 more source

Quantum One-Wayness of the Single-Round Sponge with Invertible Permutations [PDF]

open access: yesarXiv
Sponge hashing is a widely used class of cryptographic hash algorithms which underlies the current international hash function standard SHA-3. In a nutshell, a sponge function takes as input a bit-stream of any length and processes it via a simple iterative procedure: it repeatedly feeds each block of the input into a so-called block function, and then
arxiv  

Memory-Efficient FastText: A Comprehensive Approach Using Double-Array Trie Structures and Mark-Compact Memory Management [PDF]

open access: yesarXiv
FastText has established itself as a fundamental algorithm for learning word representations, demonstrating exceptional capability in handling out-of-vocabulary words through character-level n-gram embeddings. However, its hash-based bucketing mechanism introduces critical limitations for large-scale industrial deployment: hash collisions cause ...
arxiv  

Home - About - Disclaimer - Privacy