Results 61 to 70 of about 619,850 (264)

Minimum distance of symplectic Grassmann codes

open access: yesLinear Algebra and its Applications, 2016
Revised contents and ...
Cardinali, Ilaria, Giuzzi, Luca
openaire   +3 more sources

Infrared laser sampling of low volumes combined with shotgun lipidomics reveals lipid markers in palatine tonsil carcinoma

open access: yesMolecular Oncology, EarlyView.
Nanosecond infrared laser (NIRL) low‐volume sampling combined with shotgun lipidomics uncovers distinct lipidome alterations in oropharyngeal squamous cell carcinoma (OPSCC) of the palatine tonsil. Several lipid species consistently differentiate tumor from healthy tissue, highlighting their potential as diagnostic markers.
Leonard Kerkhoff   +11 more
wiley   +1 more source

Construction of Optimal Locally Repairable Codes of Triangular Association Schemes

open access: yesShanghai Jiaotong Daxue xuebao
As a new erasure code for distributed storage systems, locally repairable codes (LRCs) can effectively realize the reliable and efficient storage of massive data.
WANG Jing, LI Jinghui, YANG Jiarong, WANG E
doaj   +1 more source

Peroxidasin enables melanoma immune escape by inhibiting natural killer cell cytotoxicity

open access: yesMolecular Oncology, EarlyView.
Peroxidasin (PXDN) is secreted by melanoma cells and binds the NK cell receptor NKG2D, thereby suppressing NK cell activation and cytotoxicity. PXDN depletion restores NKG2D signaling and enables effective NK cell–mediated melanoma killing. These findings identify PXDN as a previously unrecognized immune evasion factor and a potential target to improve
Hsu‐Min Sung   +17 more
wiley   +1 more source

Non-Existence of Perfect Permutation Codes Under Crown Poset Metric

open access: yesIEEE Access
Permutation codes have been extensively investigated using various metrics such as Hamming metric, Ulam metric, Kendall $\tau $ metric, $l_{\infty }$ metric, Cayley metric etc., due to their potential applications in diverse fields such as rank ...
Rohini Baliram More, Venkatrajam Marka
doaj   +1 more source

Gröbner Bases and Minimum Distance of Affine Varieties Codes

open access: yesTrends in Computational and Applied Mathematics, 2012
Nesse trabalho apresentamos um método para estimar a distância mínima de códigos de variedades afins. Nossa técnica usa propriedades da pegada de um ideal obtido através do aumento do ideal de definição da variedade em questão.
Cícero Carvalho
doaj   +1 more source

Minimum Cuts of Distance-Regular Digraphs

open access: yesThe Electronic Journal of Combinatorics, 2017
In this paper, we investigate the structure of minimum vertex and edge cuts of distance-regular digraphs. We show that each distance-regular digraph $\Gamma$, different from an undirected cycle, is super edge-connected, that is, any minimum edge cut of $\Gamma$ is the set of all edges going into (or coming out of) a single vertex.
Ashkboos, Saleh   +3 more
openaire   +2 more sources

Phenotypic and genotypic characterization of single circulating tumor cells in the follow‐up of high‐grade serous ovarian cancer

open access: yesMolecular Oncology, EarlyView.
Single circulating tumor cells (sCTCs) from high‐grade serous ovarian cancer patients were enriched, imaged, and genomically profiled using WGA and NGS at different time points during treatment. sCTCs revealed enrichment of alterations in Chromosomes 2, 7, and 12 as well as persistent or emerging oncogenic CNAs, supporting sCTC identity.
Carolin Salmon   +9 more
wiley   +1 more source

Constructing DNA Codes with Larger Distance from Quaternary Words

open access: yesJambura Journal of Mathematics
In this work, we propose a novel method to construct DNA codes from quaternary words. The method uses permutation groups that act in the set {1, 2, …, 4n}, representing the coordinate and coordinate value of quaternary words.
Benediktus Panji Pradipta   +1 more
doaj   +1 more source

Minimum Barrier Distance-Based Object Descriptor for Visual Tracking

open access: yesApplied Sciences, 2018
In most visual tracking tasks, the target is tracked by a bounding box given in the first frame. The complexity and redundancy of background information in the bounding box inevitably exist and affect tracking performance.
Zhengzheng Tu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy