Results 51 to 60 of about 20,383 (214)

Data‐Driven Engineering of Thermostable Collagen‐Mimetic Peptoid Triple Helices

open access: yesMacromolecular Rapid Communications, EarlyView.
Data‐driven active learning discovery of collagen‐mimetic peptoids capable of forming a thermostable collagen‐like triple helix using computational screening followed by experimental validation. ABSTRACT Collagen‐mimetic peptides (CMPs) are engineered molecules designed to replicate the triple‐helical structure of natural collagen.
Alex Berlaga   +6 more
wiley   +1 more source

Quantitative Imaging of Pyruvate Metabolism in a Patient With Anaplastic Thyroid Cancer

open access: yesMagnetic Resonance in Medicine, EarlyView.
ABSTRACT Purpose Magnetic resonance imaging using hyperpolarized (HP) [1‐13C]‐pyruvate enables assessment of pyruvate metabolism in vivo and offers new insight into metabolic changes in response to cancer therapy. Widely used semi‐quantitative metrics of pyruvate metabolism can be affected by physiological factors that are extrinsic to intracellular ...
James A. Bankson   +18 more
wiley   +1 more source

Solving for Blameless and Optimal Control Under Prioritized Safety Constraints

open access: yesOptimal Control Applications and Methods, EarlyView.
Summary of the proposed method for solving for blameless and optimal control sequences. ABSTRACT In many safety‐critical optimal control problems, users may request multiple safety constraints that are jointly infeasible due to external factors such as subsystem failures, unexpected disturbances, or fuel limitations.
Natalia Pavlasek   +3 more
wiley   +1 more source

All‐sky assimilation impacts of the Tomorrow.io microwave sounder constellation on global weather forecasts

open access: yesQuarterly Journal of the Royal Meteorological Society, EarlyView.
Key Findings: An assimilation methodology is established for the Tomorrow.io microwave sounder (TMS) flying on CubeSats in sun‐synchronous and inclined orbits, and in all cloud scenes. The TMS has a significant impact on weather forecast lead times up to 3 days in the Tropics in a research‐quality numerical weather prediction setting, and yields water ...
Jonathan J. Guerrette   +3 more
wiley   +1 more source

zk-REAL: A Zero-Knowledge-Based Protocol for Repeated Image Edit Authenticity Proof With Lattice Hashing

open access: yesIEEE Open Journal of the Computer Society
The rapid advancement of deepfake technology poses risks, including financial fraud and political misinformation, demanding robust methods for verifying image content authenticity.
Atsuki Koyama   +3 more
doaj   +1 more source

Attacks on double block length hash functions [PDF]

open access: yes, 1994
Attacks on double block length hash functions using a block cipher are considered in this paper. We present a general free-start attack, in which the attacker is free to choose the initial value, and a real attack on a large class of hash functions. Recent results on the complexities of attacks on double block hash functions are summarized.
Xuejia Lai, Lars R. Knudsen
openaire   +1 more source

Tumour‐informed workflow to use ctDNA as a biomarker for risk of recurrence in head and neck cancer patients post‐treatment

open access: yesVIEW, EarlyView.
Our study presents a tumour‐informed circulating tumour DNA (ctDNA) workflow designed to enhance the detection of recurrence in head and neck cancer patients, addressing key challenges such as low ctDNA tumour fractions and tumour heterogeneity. Abstract Circulating tumour DNA (ctDNA) is a promising minimally invasive biomarker for monitoring treatment
Xiaomin Huang   +8 more
wiley   +1 more source

Spatiotemporal mapping the usable space of free‐roaming equids across the western United States

open access: yesWildlife Society Bulletin, EarlyView.
Identification of the inter‐decadal (2010‐2011) enhancement‐degradation gradients in the usable space for wild equid Herd Management Areas in the Great Basin, USA. Abstract Management of feral equids in the American West is hindered by the lack of a formal habitat map and monitoring system.
Alexander Hernandez   +3 more
wiley   +1 more source

Hashing for Similarity Search: A Survey [PDF]

open access: yes, 2014
Similarity search (nearest neighbor search) is a problem of pursuing the data items whose distances to a query item are the smallest from a large database.
Ji, Jianqiu   +3 more
core  

Cache-Oblivious Peeling of Random Hypergraphs

open access: yes, 2013
The computation of a peeling order in a randomly generated hypergraph is the most time-consuming step in a number of constructions, such as perfect hashing schemes, random $r$-SAT solvers, error-correcting codes, and approximate set encodings.
Belazzougui, Djamal   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy