Results 51 to 60 of about 20,383 (214)
Data‐Driven Engineering of Thermostable Collagen‐Mimetic Peptoid Triple Helices
Data‐driven active learning discovery of collagen‐mimetic peptoids capable of forming a thermostable collagen‐like triple helix using computational screening followed by experimental validation. ABSTRACT Collagen‐mimetic peptides (CMPs) are engineered molecules designed to replicate the triple‐helical structure of natural collagen.
Alex Berlaga +6 more
wiley +1 more source
Quantitative Imaging of Pyruvate Metabolism in a Patient With Anaplastic Thyroid Cancer
ABSTRACT Purpose Magnetic resonance imaging using hyperpolarized (HP) [1‐13C]‐pyruvate enables assessment of pyruvate metabolism in vivo and offers new insight into metabolic changes in response to cancer therapy. Widely used semi‐quantitative metrics of pyruvate metabolism can be affected by physiological factors that are extrinsic to intracellular ...
James A. Bankson +18 more
wiley +1 more source
Solving for Blameless and Optimal Control Under Prioritized Safety Constraints
Summary of the proposed method for solving for blameless and optimal control sequences. ABSTRACT In many safety‐critical optimal control problems, users may request multiple safety constraints that are jointly infeasible due to external factors such as subsystem failures, unexpected disturbances, or fuel limitations.
Natalia Pavlasek +3 more
wiley +1 more source
Key Findings: An assimilation methodology is established for the Tomorrow.io microwave sounder (TMS) flying on CubeSats in sun‐synchronous and inclined orbits, and in all cloud scenes. The TMS has a significant impact on weather forecast lead times up to 3 days in the Tropics in a research‐quality numerical weather prediction setting, and yields water ...
Jonathan J. Guerrette +3 more
wiley +1 more source
The rapid advancement of deepfake technology poses risks, including financial fraud and political misinformation, demanding robust methods for verifying image content authenticity.
Atsuki Koyama +3 more
doaj +1 more source
Attacks on double block length hash functions [PDF]
Attacks on double block length hash functions using a block cipher are considered in this paper. We present a general free-start attack, in which the attacker is free to choose the initial value, and a real attack on a large class of hash functions. Recent results on the complexities of attacks on double block hash functions are summarized.
Xuejia Lai, Lars R. Knudsen
openaire +1 more source
Our study presents a tumour‐informed circulating tumour DNA (ctDNA) workflow designed to enhance the detection of recurrence in head and neck cancer patients, addressing key challenges such as low ctDNA tumour fractions and tumour heterogeneity. Abstract Circulating tumour DNA (ctDNA) is a promising minimally invasive biomarker for monitoring treatment
Xiaomin Huang +8 more
wiley +1 more source
Spatiotemporal mapping the usable space of free‐roaming equids across the western United States
Identification of the inter‐decadal (2010‐2011) enhancement‐degradation gradients in the usable space for wild equid Herd Management Areas in the Great Basin, USA. Abstract Management of feral equids in the American West is hindered by the lack of a formal habitat map and monitoring system.
Alexander Hernandez +3 more
wiley +1 more source
Hashing for Similarity Search: A Survey [PDF]
Similarity search (nearest neighbor search) is a problem of pursuing the data items whose distances to a query item are the smallest from a large database.
Ji, Jianqiu +3 more
core
Cache-Oblivious Peeling of Random Hypergraphs
The computation of a peeling order in a randomly generated hypergraph is the most time-consuming step in a number of constructions, such as perfect hashing schemes, random $r$-SAT solvers, error-correcting codes, and approximate set encodings.
Belazzougui, Djamal +4 more
core +1 more source

