Results 41 to 50 of about 3,500,013 (329)

MKTN: Adversarial-Based Multifarious Knowledge Transfer Network from Complementary Teachers

open access: yesInternational Journal of Computational Intelligence Systems
With the demands for light deep networks models in various front-end devices, network compression has attracted increasing interest for reducing model sizes yet without sacrificing much model accuracy.
Xiaobing Zhang   +3 more
doaj   +1 more source

Collective Information Security in Large-Scale Urban Protests: the Case\n of Hong Kong [PDF]

open access: green, 2021
M. Albrecht   +3 more
openalex   +1 more source

E2A selectively regulates TGF‐β–induced apoptosis in KRAS‐mutant non‐small cell lung cancer

open access: yesMolecular Oncology, EarlyView.
Ability to induce apoptosis by TGF‐β is frequently lost in advanced lung adenocarcinoma despite intact TGF‐β signaling. We identify E2A as a mutant KRAS–dependent mediator of resistance to TGF‐β–induced apoptosis. TGF‐β induces E2A via SMAD3 in mutant KRAS cells, and E2A silencing restores apoptosis and enhances radiation response in cell lines ...
Sergei Chuikov   +3 more
wiley   +1 more source

Mycobacterial cell division arrest and smooth‐to‐rough envelope transition using CRISPRi‐mediated genetic repression systems

open access: yesFEBS Open Bio, EarlyView.
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point   +7 more
wiley   +1 more source

Criminal Trajectory Reconstruction Method Based on a Mobile Reference System

open access: yesComputational Urban Science
Criminal trajectory reconstruction is a crucial area of study in the investigative and evidentiary processes of public security departments. This paper proposes a method for reconstructing criminal trajectories based on a mobile reference system ...
Zhengyan Ding   +4 more
doaj   +1 more source

A comprehensive review of cyber-physical security risks in new power system

open access: yesSecurity and Safety
This review systematically examines the multifaceted cyber-physical security risks facing new power systems during the global energy transition, with a focus on three critical dimensions.
Huang Huihui   +4 more
doaj   +1 more source

Sustainable bioplastics manufacturing from renewable sources

open access: yesFEBS Open Bio, EarlyView.
Bioplastics are manufactured by using polymers from different bio‐based sources. These novel materials not only offer biodegradability but also possess various functional properties that make them suitable for diverse applications. Recent developments in the preparation of bioplastics are reported, highlighting the distinct properties of each type of ...
C. Valeria L. Giosafatto   +6 more
wiley   +1 more source

An updatable encryption scheme for blockchain oracle based on post-quantum cryptography

open access: yesCybersecurity
The advancement of quantum attacks has posed a significant threat to blockchain cryptosystems. Furthermore, the finite lifecycles of ciphertext and keys may result in data leakage risks for long-term storage due to potential breaches in ciphertext ...
Shihao Wang   +5 more
doaj   +1 more source

Tracking Motor Progression and Device‐Aided Therapy Eligibility in Parkinson's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To characterise the progression of motor symptoms and identify eligibility for device‐aided therapies in Parkinson's disease, using both the 5‐2‐1 criteria and a refined clinical definition, while examining differences across genetic subgroups.
David Ledingham   +7 more
wiley   +1 more source

Influence Maximization with Priority in Online Social Networks

open access: yesAlgorithms, 2020
The Influence Maximization (IM) problem, which finds a set of k nodes (called seedset) in a social network to initiate the influence spread so that the number of influenced nodes after propagation process is maximized, is an important problem in ...
Canh V. Pham   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy