Results 71 to 80 of about 764,565 (289)

Optimal Dual Frames for Probabilistic Erasures

open access: yesIEEE Access, 2019
Assume that a frame is given for encoding in a communication system. J. Leng et al. investigated its dual frames for signal decoding which minimize the maximal error when the probabilistic erasures occur in the transmission process.
Dongwei Li, Jinsong Leng, Miao He
doaj   +1 more source

Optimal k-Deletion Correcting Codes [PDF]

open access: yes2019 IEEE International Symposium on Information Theory (ISIT), 2019
Levenshtein introduced the problem of constructing $k$-deletion correcting codes in 1966, proved that the optimal redundancy of those codes is $O(k\log N)$, and proposed an optimal redundancy single-deletion correcting code (using the so-called VT construction).
Sima, Jin, Bruck, Jehoshua
openaire   +3 more sources

The (Glg)ABCs of cyanobacteria: modelling of glycogen synthesis and functional divergence of glycogen synthases in Synechocystis sp. PCC 6803

open access: yesFEBS Letters, EarlyView.
We reconstituted Synechocystis glycogen synthesis in vitro from purified enzymes and showed that two GlgA isoenzymes produce glycogen with different architectures: GlgA1 yields denser, highly branched glycogen, whereas GlgA2 synthesizes longer, less‐branched chains.
Kenric Lee   +3 more
wiley   +1 more source

Optimal Linear Codes and Their Hulls

open access: yesMathematics
The hull of a linear code C is the intersection of C with its dual code. The goal is to study the dimensions of the hulls of optimal binary and ternary linear codes for a given length and dimension.
Stefka Bouyuklieva   +1 more
doaj   +1 more source

Optimal bounds for parity-oblivious random access codes

open access: yesNew Journal of Physics, 2016
Random access coding is an information task that has been extensively studied and found many applications in quantum information. In this scenario, Alice receives an n -bit string x , and wishes to encode x into a quantum state ${\rho }_{x}$ , such that ...
André Chailloux   +3 more
doaj   +1 more source

Optimal Weakly Secure Minimum Storage Regenerating Codes Scheme

open access: yesIEEE Access, 2019
In a distributed storage system, regenerating codes can be utilized to ensure data availability. This reduces the repair bandwidth but increases the risk of data eavesdropping on each node.
Jianchao Bian   +3 more
doaj   +1 more source

Structural biology of ferritin nanocages

open access: yesFEBS Letters, EarlyView.
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley   +1 more source

On Optimal Nonlinear Systematic Codes [PDF]

open access: yesIEEE Transactions on Information Theory, 2016
arXiv admin note: substantial text overlap with arXiv:1502 ...
Guerrini, Eleonora   +2 more
openaire   +4 more sources

Characterizing the salivary RNA landscape to identify potential diagnostic, prognostic, and follow‐up biomarkers for breast cancer

open access: yesMolecular Oncology, EarlyView.
This study explores salivary RNA for breast cancer (BC) diagnosis, prognosis, and follow‐up. High‐throughput RNA sequencing identified distinct salivary RNA signatures, including novel transcripts, that differentiate BC from healthy controls, characterize histological and molecular subtypes, and indicate lymph node involvement.
Nicholas Rajan   +9 more
wiley   +1 more source

Optimal quinary cyclic codes with minimum distance four

open access: yesTongxin xuebao, 2017
Cyclic codes are an extremely important subclass of linear codes.They are widely used in the communication systems and data storage systems because they have efficient encoding and decoding algorithm.Until now,how to construct the optimal ternary cyclic ...
Ye TIAN, Yu-qing ZHANG, Yu-pu HU
doaj   +2 more sources

Home - About - Disclaimer - Privacy