Results 121 to 130 of about 2,163,207 (263)
Adaptive DNA Cryptography With Intelligent Machine Learning for Cloud Data Defense
Algorithm 2 outlines the process of decrypting DNA‐encoded data retrieved from cloud storage. The DNA‐encoded fragments are first retrieved from the cloud and then concatenated to reconstruct the complete DNA‐encoded data. Subsequently, the DNA sequence is decoded back into encrypted digital data using the reverse of the defined encoding scheme ...
Animesh Kairi+4 more
wiley +1 more source
A comparison of integration methods for single‐cell RNA sequencing data and ATAC sequencing data
Abstract Single‐cell genomics give us a new perspective to understand multivariate phenotypic and genetic effects at the cellular level. Recently, technologies have started measuring different modalities of individual cells, such as transcriptomes, epigenomes, metabolomes, and spatial profiling.
Yulong Kan+5 more
wiley +1 more source
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci+7 more
wiley +1 more source
Key Distribution using Double Keyed-hash Chains for Wireless Sensor Networks
Jianmin Zhang, Jianwei Tan, Jian Li
openalex +1 more source
Vertically Recurrent Neural Networks for Sub‐Grid Parameterization
Abstract Machine learning has the potential to improve the physical realism and/or computational efficiency of parameterizations. A typical approach has been to feed concatenated vertical profiles to a dense neural network. However, feed‐forward networks lack the connections to propagate information sequentially through the vertical column.
P. Ukkonen, M. Chantry
wiley +1 more source
In this paper, we give theoretically and practically efficient implementations of Big Atomics, i.e., $k$-word linearizable registers that support the load, store, and compare-and-swap (CAS) operations. While modern hardware supports $k = 1$ and sometimes $k = 2$ (e.g., double-width compare-and-swap in x86), our implementations support arbitrary $k ...
arxiv
An Efficient data management Scheme for Hierarchical Multi-processing using Double Hash Chain
Yoon-Su Jeong+2 more
openalex +2 more sources
Durvalumab plus tremelimumab (Dur/Tre) therapy is expected to have good therapeutic efficacy for patients with unresectable hepatocellular carcinoma (u‐HCC). We revealed that the neutrophil‐to‐lymphocyte ratio at the start of the second course (NLR‐2c) value is useful for predicting PFS in u‐HCC patients treated with Dur/Tre therapy.
Takanori Suzuki+19 more
wiley +1 more source
Quantum One-Wayness of the Single-Round Sponge with Invertible Permutations [PDF]
Sponge hashing is a widely used class of cryptographic hash algorithms which underlies the current international hash function standard SHA-3. In a nutshell, a sponge function takes as input a bit-stream of any length and processes it via a simple iterative procedure: it repeatedly feeds each block of the input into a so-called block function, and then
arxiv
Memory-Efficient FastText: A Comprehensive Approach Using Double-Array Trie Structures and Mark-Compact Memory Management [PDF]
FastText has established itself as a fundamental algorithm for learning word representations, demonstrating exceptional capability in handling out-of-vocabulary words through character-level n-gram embeddings. However, its hash-based bucketing mechanism introduces critical limitations for large-scale industrial deployment: hash collisions cause ...
arxiv