Results 41 to 50 of about 77,938 (281)

FSH: fast spaced seed hashing exploiting adjacent hashes [PDF]

open access: yesAlgorithms for Molecular Biology, 2018
Patterns with wildcards in specified positions, namely spaced seeds, are increasingly used instead of k-mers in many bioinformatics applications that require indexing, querying and rapid similarity search, as they can provide better sensitivity. Many of these applications require to compute the hashing of each position in the input sequences with ...
Girotto, Samuele   +2 more
openaire   +3 more sources

Perceived Impacts and Predictors of Cannabis Products used by Rheumatology Patients in Alberta: A Multivariable Analysis of Cross‐sectional Survey Data

open access: yesArthritis Care &Research, Accepted Article.
Objective This study aimed to characterize cannabis product choices (cannabinoid content and formulation) among rheumatology patients, and their associations with patient factors, patient reported perceived side effects and positive impacts. Methods An online survey (delivered from March to November 2022) was distributed by Alberta Health Services to ...
Susan Zhang   +10 more
wiley   +1 more source

Deterministic Detection of Single Ion Implantation

open access: yesAdvanced Engineering Materials, EarlyView.
Focused ion beam implantation with high detection efficiencies will enable the rapid and scalable fabrication of advanced spin‐based technologies such as qubits. This work presents the detection efficiencies of a wide range of ions implanted into solid‐state hosts, with efficiencies of >90% recorded for ion species and substrate combinations of ...
Mason Adshead   +6 more
wiley   +1 more source

Multiview Inherent Graph Hashing for Large-Scale Remote Sensing Image Retrieval

open access: yesIEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 2021
Remote sensing image retrieval (RSIR) is one of the most challenging tasks in remote sensing (RS) community. With the volume of RS images increases explosively, conventional exhaustive search is often infeasible in real applications.
Yinghui Sun   +3 more
doaj   +1 more source

Ranking-based Deep Cross-modal Hashing

open access: yes, 2019
Cross-modal hashing has been receiving increasing interests for its low storage cost and fast query speed in multi-modal data retrievals. However, most existing hashing methods are based on hand-crafted or raw level features of objects, which may not be ...
Domeniconi, Carlotta   +5 more
core   +1 more source

Purpose‐Adaptable Reinforced 3D Hyaluronic‐Acid Based Platform to Study Pathomechanisms of the Central Nervous System

open access: yesAdvanced Healthcare Materials, EarlyView.
Platform system to create biofabricated 3D spinal cord tissue models: Combining high resolution PCL fiber placement, a customized, hyaluronic acid‐based hydrogel, two cell types (spinal cord neurons and astrocytes) together with three distinct laminin isoforms allow the formation of functional cell–cell network interactions.
Nicoletta Murenu   +12 more
wiley   +1 more source

Bottom‐Up Programming of Cell States in Cancer Organoids with Defined Synthetic Adhesion Cues

open access: yesAdvanced Materials, EarlyView.
A bottom‐up biomaterial platform is developed to program transcriptomic states in pancreatic cancer organoids by tuning adhesion cues within synthetic matrices. By combining a Design of Experiments framework with multiobjective optimization, matrix compositions are identified that enrich specific cellular programs like EMT.
Ali Nadernezhad   +6 more
wiley   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Image Hashing for Tamper Detection with Multiview Embedding and Perceptual Saliency

open access: yesAdvances in Multimedia, 2018
Perceptual hashing technique for tamper detection has been intensively investigated owing to the speed and memory efficiency. Recent researches have shown that leveraging supervised information could lead to learn a high-quality hashing code.
Ling Du, Zhen Chen, Yongzhen Ke
doaj   +1 more source

Efficient computation of spaced seed hashing with block indexing

open access: yesBMC Bioinformatics, 2018
Background Spaced-seeds, i.e. patterns in which some fixed positions are allowed to be wild-cards, play a crucial role in several bioinformatics applications involving substrings counting and indexing, by often providing better sensitivity with respect ...
Samuele Girotto   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy