Results 121 to 130 of about 74,857 (256)
Microcircuit learning nets: Hamming-distance behaviour
A probabilistic method based on the Hamming distance is presented for calculating the pattern-recognition response of a class of single-layer microcircuit learning nets. The prediction of the behaviour of a 12-element machine is shown to agree with measured responses.
openaire +1 more source
ABSTRACT Hybrid nanofluids, known for their superior thermal and electrical conductivity, have demonstrated remarkable potential in enhancing the heat transfer capability of conventional base fluids. This study analyzes the effects of viscous dissipation and heat radiation on two‐dimensional unsteady incompressible squeezing flow transporting hybrid ...
Hajra Batool +3 more
wiley +1 more source
ABSTRACT This paper presents a comprehensive numerical analysis of magnetohydrodynamic (MHD) Casson nanofluid movement over a permeable, linearly stretching sheet, integrating the contributions of non‐uniform heat generation or absorption and chemical interaction.
Manoj Kumar Sahoo +3 more
wiley +1 more source
Regional Shopping Objectives in British Grocery Retail Transactions Using Segmented Topic Models
ABSTRACT Understanding the customer behaviours behind transactional data has high commercial value in the grocery retail industry. Customers generate millions of transactions every day, choosing and buying products to satisfy specific shopping needs.
Mariflor Vega Carrasco +4 more
wiley +1 more source
New opportunities for bioscaffold‐enabled spinal cord injury repair
Schematic illustration of bioscaffolds for spinal cord injury repair. We summarize the effects of bioscaffold properties on SCI repair, highlight different types of bioscaffolds, various fabrication strategies, and in vivo transformations for the clinical development of SCI‐repairing bioscaffolds.
Xiaoqing Qi +11 more
wiley +1 more source
Power model in power analysis attack
A mapping relation model should be established between data value and power value which is collected from device under attack when the power analysis attack accuse.The sensitive information can be fund through the power trace analysis using this type of ...
Peng LUO, Deng-guo FENG, Yong-bin ZHOU
doaj +2 more sources
Large-scale content-based image retrieval system with metric learning and discrete binary encoding
Hashing methods have been widely used in large-scale content-based image retrieval systems, which have extensive and practical applications in search engines and social networks.
Yahui Liu +3 more
doaj +1 more source
Cold atmospheric plasma‐mediated tumor microenvironment remodeling for cancer treatment
Schematic presentation of CAP‐mediated TME remodeling. This review summarizes recent efforts in cold atmospheric plasma (CAP) application in cancer treatment, highlighting the anticancer potential of CAP, molecular mechanisms, and future perspectives for further improvement and clinical translation.
Israr Khan +8 more
wiley +1 more source
ABSTRACT Tick‐borne filarial nematodes are a complex and understudied group of parasites that rely on ticks for transmission in vertebrates. This review examines how intrinsic and extrinsic factors may influence the successful transmission of filarial nematodes in tick vectors, drawing insights from extensively studied haematophagous dipteran vector ...
Oluwaseun D. Ajileye +4 more
wiley +1 more source
Dynamics of natural killer cell function upon recurrent stimulation
Weekly stimulation of peripheral blood‐derived NK cells with engineered K562 feeder cells resulted in two distinct growth phases, shifting around Day 21–26. Cells in growth phase 2 exhibited slower growth, reduced metabolic activity, and lower cytotoxicity than cells from growth phase 1, which has implications for NK cell biomanufacturing.
Jennifer One +4 more
wiley +1 more source

