Results 51 to 60 of about 9,542 (233)

Tabular method of calculating Boolean partial derivative and difference of the OC type logic function(计算OC型逻辑函数的布尔偏导数与布尔差分的表格方法)

open access: yesZhejiang Daxue xuebao. Lixue ban, 2007
讨论了OC型逻辑函数一阶布尔偏导数的规范OC展开式.在此基础上提出了计算OC型逻辑函数一阶、二阶布尔偏导数的表格方法.根据二阶布尔差分的定义以及二阶布尔差分与布尔偏导数的关系提出了两种计算OC型逻辑函数二阶布尔差分的表格方法,并作了比较.本文提出的计算OC型逻辑函数布尔偏导数与布尔差分的表格方法具有简捷、方便以及易于计算机编程操作等优点.
LIUGuan-sheng(刘观生)   +2 more
doaj   +1 more source

Partial clones containing all Boolean monotone self-dual partial functions

open access: yes, 2015
The study of partial clones on $\mathbf{2}:=\{0,1\}$ was initiated by R. V. Freivald. In his fundamental paper published in 1966, Freivald showed, among other things, that the set of all monotone partial functions and the set of all self-dual partial functions are both maximal partial clones on $\mathbf{2}$. Several papers dealing with intersections of
Couceiro, Miguel   +2 more
openaire   +3 more sources

T Cell Exhaustion in Cancer Immunotherapy: Heterogeneity, Mechanisms, and Therapeutic Opportunities

open access: yesAdvanced Science, EarlyView.
T cell exhaustion limits immunotherapy efficacy. This article delineates its progression from stem‐like to terminally exhausted states, governed by persistent antigen, transcription factors, epigenetics, and metabolism. It maps the exhaustion landscape in the TME and proposes integrated reversal strategies, providing a translational roadmap to overcome
Yang Yu   +7 more
wiley   +1 more source

An algorithm for calculating the high-order Boolean e-partial derivative of logic function(逻辑函数高阶布尔e偏导数求解算法的实现)

open access: yesZhejiang Daxue xuebao. Lixue ban, 2018
针对已有方法在求解布尔e偏导数时只能解决小规模电路的问题,提出了一种基于逻辑函数不相交运算的大函数高阶布尔e偏导数的求解算法.该方法将逻辑函数转化为不相交乘积项的集合,用逻辑函数的不相交运算替代布尔e导数运算中的逻辑“与”运算;并将不包含待求导变量的乘积项拆分出来,不参与布尔e导数运算,以达到降低算法复杂度、提高算法速度的目的.提出的算法用C语言编程实现,并用MCNC测试电路进行了测试.实验结果显示,本算法能快速实现大函数高阶布尔e偏导数的求解,求解效率与参与不相交运算的乘积项数量有关 ...
LUOWenqiang(罗文强)   +2 more
doaj   +1 more source

Selective Targeting of Immune Checkpoints HLA‐G and CD47 Using Novel Dual Signaling Protein DSP216 Promotes Innate Anticancer Immunity

open access: yesAdvanced Science, EarlyView.
The inhibitory immune checkpoints HLA‐G and CD47 are expressed on certain tumor types and inhibit immune cells in the tumor microenvironment. DSP216 binds specifically to cancer cells expressing both HLA‐G and CD47, and blocks their inhibitory signaling.
Lisa J. Jacob   +12 more
wiley   +1 more source

Comparison of Four Weighting Methods in Fuzzy-based Land Suitability to Predict Wheat Yield

open access: yesمجله آب و خاک, 2017
Introduction: Land suitability evaluation is a process to examine the degree of land fitness for specific utilization and also makes it possible to estimate land productivity potential.
Fatemeh Rahmati, Ardavan Kamali
doaj   +1 more source

Neural Network‐Based Permittivity Engineering of Magnetic Absorbers for Customizable Microwave Absorption

open access: yesAdvanced Science, EarlyView.
A neural network‐enabled permittivity engineering paradigm is introduced, transcending traditional trial‐and‐error design. By decoupling electromagnetic parameters and screening a high‐throughput feature space, an ultrathin (1.0 mm) magnetic absorber is inversely designed, experimentally achieving a superior and customizable 5.1 GHz bandwidth and ...
Chenxi Liu   +9 more
wiley   +1 more source

All‐Optical Control of Bidirectional Polarization Switching in Ferroelectric Heterostructures for Neuromorphic and In‐Memory Computing

open access: yesAdvanced Science, EarlyView.
We propose an optical ferroelectric field‐effect transistor, composed of a MoS2/CIPS heterostructure, demonstrates the feasibility of all‐optical nonvolatile memory, neuromorphic computing, and logic‐in‐memory operations. The device exhibits reversible light‐controlled memory states, retina‐like synaptic plasticity, and wavelength‐selective ...
Jingjie Niu   +7 more
wiley   +1 more source

Some observations of near collision attacks on grain v1

open access: yesCybersecurity
Near collision attacks and fast near collision attacks on stream ciphers are controversial attack methods in the field of cryptography in recent years, and their attack results are based on reduced experimental observations and derivation of birthday ...
Shaoyu Du, Weiping Gu, Bin Zhang
doaj   +1 more source

Negation and presupposition, truth and falsity

open access: yesStudies in Logic, Grammar and Rhetoric, 2018
There are many kinds of negation and denial. Perhaps the most common is the Boolean negation not that applies to propositions-in-extension, i.e. truth-values.
Duží Marie
doaj   +1 more source

Home - About - Disclaimer - Privacy