Results 61 to 70 of about 7,552,191 (344)
LCSTS: A Large Scale Chinese Short Text Summarization Dataset [PDF]
Automatic text summarization is widely regarded as the highly difficult problem, partially because of the lack of large text summarization data set. Due to the great challenge of constructing the large scale summaries for full text, in this paper, we ...
Chen, Qingcai, Hu, Baotian, Zhu, Fangze
core +1 more source
Workflow of a high‐throughput technology for epigenotyping of differentially methylated CpGs in specific regions of the genome. The protocol works with small amounts of DNA extracted from blood or semen. The protocol consists of both enzymatic conversion of unmethylated cytosines and capture by hybridization with a custom panel.
Nathalie Iannuccelli +4 more
wiley +1 more source
Determining the Characteristic Vocabulary for a Specialized Dictionary using Word2vec and a Directed Crawler [PDF]
Specialized dictionaries are used to understand concepts in specific domains, especially where those concepts are not part of the general vocabulary, or having meanings that differ from ordinary languages.
Grefenstette, Gregory, Muchemi, Lawrence
core +3 more sources
ABSTRACT Background Neurodegeneration with brain iron accumulation (NBIA) comprises a genetically and clinically heterogeneous group of rare neurological disorders characterized particularly by iron accumulation in the basal ganglia. To date, 15 genes have been associated with NBIA.
Seda Susgun +95 more
wiley +1 more source
Ni‐base superalloys produced using additive manufacturing (AM) have a different response to heat treatments when compared to their conventional counterparts. Due to such unpredictability, various alloys with industrial interest are currently overlooked in most prior AM research.
Guilherme Maziero Volpato +6 more
wiley +1 more source
Malicious and Benign Webpages Dataset
Web Security is a challenging task amidst ever rising threats on the Internet. With billions of websites active on Internet, and hackers evolving newer techniques to trap web users, machine learning offers promising techniques to detect malicious ...
A.K. Singh
doaj +1 more source
This review explores wafer bonding technologies, covering wafer preparation, activation methods, and bonding mechanisms. It compares direct and indirect bonding, highlights recent advancements and future trends, and examines applications in 3D integration and packaging.
Abdul Ahad Khan +5 more
wiley +1 more source
Methodologies for the Automatic Location of Academic and Educational Texts on the Internet [PDF]
Traditionally online databases of web resources have been compiled by a human editor, or though the submissions of authors or interested parties. Considerable resources are needed to maintain a constant level of input and relevance in the face of ...
Oxnard, L., Evans, A.
core
High‐performance nickel‐based superalloys are often not processible in additive manufacturing (AM) due to hot cracking. The findings in this manuscript propose an efficient method to mitigate cracking and enhance mechanical properties of these alloys by producing a metal matrix composite, contributing to the material and process perspective of the AM ...
Klaus Büßenschütt +3 more
wiley +1 more source
Research and Application of Knowledge Resources Network for Product Innovation
In order to enhance the capabilities of knowledge service in product innovation design service platform, a method of acquiring knowledge resources supporting for product innovation from the Internet and providing knowledge active push is proposed ...
Chuan Li +4 more
doaj +1 more source

