Results 111 to 120 of about 1,233,843 (271)
Fingerprint database clustering and localization using k‐medoids and k‐nearest neighbour (k‐NN) algorithms respectively typically use distance‐based fingerprint similarity metrics, with their performances dependent on the type of distance metric used ...
Abdulmalik Shehu Yaro +3 more
doaj +1 more source
Very low bit-rate video coding using patterns to represent moving regions in macroblocks exhibits good potential for improved coding efficiency. Recently an Arbitrary Shaped Pattern Selection (ASPS) algorithm and its Extended version(EASPS) were ...
Dooley, Laurence S. +2 more
core
Beyond its role in immune evasion, this study identified that CD47 drives tumor‐intrinsic signaling in non‐small cell lung cancer (NSCLC). Transcriptomic profiling and functional studies revealed that CD47 regulates cell adhesion, migration, and metastasis through an ERK–EMT signaling axis.
Asa P.Y. Lau +8 more
wiley +1 more source
Multivariate Constrained Elastic Matching With Application in Real-Time Energy Disaggregation
Non-Intrusive Load Monitoring (NILM) aims to estimate the power consumption of electrical appliances from the aggregated power consumption. While recent machine learning approaches have demonstrated very high disaggregation accuracies, ensuring real-time
Pascal A. Schirmer +2 more
doaj +1 more source
KDM7A and KDM1A inhibition suppresses tumour promoting pathways in prostate cancer
Treatment resistance is a major challenge for patients with advanced prostate cancer. This study examined an alternative approach to target the major prostate cancer‐promoting pathway by targeting epigenetic factors, whose levels are higher in tumours.
Jennie N Jeyapalan +16 more
wiley +1 more source
Efficient Layout Pattern Matching Based on Augmented Vertex Hashing
Pattern matching is a key technique in the physical verification of integrated circuit designs and is widely used in lithographic hotspot detection. Existing pattern-matching algorithms face challenges in effectiveness and robustness, especially when ...
Zhirui Niu +3 more
doaj +1 more source
NKCC1: A key regulator of glioblastoma progression
Glioblastoma (GBM) progression is driven by disrupted chloride cotransporter homeostasis. NKCC1 is highly expressed in stem‐like, astrocytic, and progenitor cells, correlating with earlier recurrence, while overall survival remains unaffected. NKCC1 serves as a prognostic marker and potential therapeutic target, linking chloride transporter imbalance ...
Anja Thomsen +5 more
wiley +1 more source
RNA profiling of circulating extracellular vesicles (EVs) from blood samples of men undergoing prostate biopsy identifies transcripts associated with clinically significant prostate cancer. Integrative analysis with public tumor datasets links EV‐derived gene signatures to tumor stage and progression‐free survival, highlighting CASP3, XRCC2, and RIT1 ...
Stefan Werner +14 more
wiley +1 more source
Research on intrusion detection based on network events and deep protocol analysis
The problems for restricting NIDS were investigated.Based on network events and deep protocol analysis,a new model MIDM analyzing and integrating network intrusion was proposed.After extending ABNF to describe network events,a new NIDS was built based on
ZHU Ying-ying, WU Jin-feng, MING Zhong
doaj
The Ijen Crater Nature Tourism Park (Ijen Crater TWA) is one of the tourist destinations with the enchanting blue fire that is quite famous in East Java and even internationally.
Loetvy Wahyuningtiyas +2 more
doaj +1 more source

