Results 91 to 100 of about 1,628,666 (344)
The major silk gene, h‐fibroin, was annotated in high‐quality genomes of two unusual case‐making Trichoptera. H‐Fibroin of Limnocentropus insolitus shows a similar amino acid composition to other case‐making species, while the amino acid composition of h‐fibroin of Phryganopsyche brunnea resembles that of retreat‐making species.
Xiling Deng+4 more
wiley +1 more source
Optimize data-driven multi-agent simulation for COVID-19 transmission
Background Multi-Agent Simulation is an essential technique for exploring complex systems. In research of contagious diseases, it is widely exploited to analyze their spread mechanisms, especially for preventing COVID-19.
Chao Jin+4 more
doaj +1 more source
Cannabinoids and the Endocannabinoid System in the Treatment of Chronic Rhinosinusitis
The objective of this scoping review is to explore the role of the ECS in the pathophysiology of CRS. We identified five studies, all supporting a common conclusion that the ECS is implicated in regulating cellular inflammatory pathways potentially involved in sinonasal disease.
John J. W. Lee+7 more
wiley +1 more source
Space-efficient computation of k-mer dictionaries for large values of k
Computing k-mer frequencies in a collection of reads is a common procedure in many genomic applications. Several state-of-the-art k-mer counters rely on hash tables to carry out this task but they are often optimised for small k as a hash table keeping ...
Diego Díaz-Domínguez+2 more
doaj +1 more source
Update of Long‐Term Outcomes After Cricotracheal Resection for Idiopathic Subglottic Stenosis
Cricotracheal resection is associated with a low rate of recurrence. However, recurrence may occur later than expected after an average of 13.8 years. ABSTRACT Objectives Idiopathic subglottic stenosis (iSGS) is a rare disease in which patients develop dyspnea from recurrent tracheal granulation scar.
Breanne L. Schiffer+2 more
wiley +1 more source
More Analysis of Double Hashing for Balanced Allocations
With double hashing, for a key $x$, one generates two hash values $f(x)$ and $g(x)$, and then uses combinations $(f(x) +i g(x)) \bmod n$ for $i=0,1,2,...$ to generate multiple hash values in the range $[0,n-1]$ from the initial two.
Mitzenmacher, Michael
core +1 more source
X‐ray CT metal artifact reduction using neural attenuation field prior
Abstract Background The presence of metal objects in computed tomography (CT) imaging introduces severe artifacts that degrade image quality and hinder accurate diagnosis. While several deep learning‐based metal artifact reduction (MAR) methods have been proposed, they often exhibit poor performance on unseen data and require large datasets to train ...
Jooho Lee+4 more
wiley +1 more source
We consider the hash function $h(x) = ((ax+b) \bmod p) \bmod n$ where $a,b$ are chosen uniformly at random from $\{0,1,\ldots,p-1\}$. We prove that when we use $h(x)$ in hashing with chaining to insert $n$ elements into a table of size $n$ the expected ...
Knudsen, Mathias Bæk Tejs
core +1 more source
Abstract Purpose To enhance the accessibility of advanced pulse sequences, or parts thereof, through the open‐source Pulseq framework. This work extends the Pulseq framework to Philips MRI systems and incorporates dynamic parallel‐transmit (pTx) capabilities within the constraints of the existing Pulseq format.
Thomas H. M. Roos+10 more
wiley +1 more source
Fast distributed video deduplication via locality-sensitive hashing with similarity ranking
The exponentially growing amount of video data being produced has led to tremendous challenges for video deduplication technology. Nowadays, many different deduplication approaches are being rapidly developed, but they are generally slow and their ...
Yeguang Li, Liang Hu, Ke Xia, Jie Luo
doaj +1 more source