Results 51 to 60 of about 118,288 (291)

Process‐Informed Analysis of As‐Built Metal Additive Surface Features

open access: yesAdvanced Engineering Materials, EarlyView.
This article introduces a novel method for feature‐based surface texture characterisation directly incorporating manufacturing variables into the feature extraction workflow. This marks a major step towards identifying process‐specific surface properties and their influence on part function and hence a holistic understanding of process–structure ...
Theresa Buchenau   +5 more
wiley   +1 more source

Detecting Blackholes and Volcanoes in Directed Networks [PDF]

open access: yes, 2010
In this paper, we formulate a novel problem for finding blackhole and volcano patterns in a large directed graph. Specifically, a blackhole pattern is a group which is made of a set of nodes in a way such that there are only inlinks to this group from ...
Li, Zhongmou, Liu, Yanchi, Xiong, Hui
core  

PRELIVE: A Framework for Predicting Lipid Nanoparticles In Vivo Efficacy and Reducing Reliance on Animal Testing

open access: yesAdvanced Functional Materials, EarlyView.
PREdicting LNP In Vivo Efficacy (PRELIVE) framework enables the prediction of lipid nanoparticle (LNPs) organ‐specific delivery through dual modeling approaches. Composition‐based models using formulation parameters and protein corona‐based models using biological fingerprints both achieve high predictive accuracy across multiple organs.
Belal I. Hanafy   +3 more
wiley   +1 more source

Branch-and-Prune Search Strategies for Numerical Constraint Solving [PDF]

open access: yes, 2006
When solving numerical constraints such as nonlinear equations and inequalities, solvers often exploit pruning techniques, which remove redundant value combinations from the domains of variables, at pruning steps.
Faltings, Boi   +3 more
core   +3 more sources

Pruning Strategies for Backdoor Defense in LLMs

open access: yesProceedings of the 34th ACM International Conference on Information and Knowledge Management
Backdoor attacks are a significant threat to the performance and integrity of pre-trained language models. Although such models are routinely fine-tuned for downstream NLP tasks, recent work shows they remain vulnerable to backdoor attacks that survive vanilla fine-tuning. These attacks are difficult to defend because end users typically lack knowledge
Santosh Chapagain   +2 more
openaire   +2 more sources

Efficient and effective pruning strategies for health data de-identification [PDF]

open access: yesBMC Medical Informatics and Decision Making, 2016
Privacy must be protected when sensitive biomedical data is shared, e.g. for research purposes. Data de-identification is an important safeguard, where datasets are transformed to meet two conflicting objectives: minimizing re-identification risks while maximizing data quality.
Prasser, Fabian   +2 more
openaire   +3 more sources

Mapping the Cerebral Organoid Landscape: A Systematic Review of Preclinical 3D Models in Neuroscience

open access: yesAdvanced Healthcare Materials, EarlyView.
Cerebral organoids are transforming brain research, yet the field remains fragmented. This comprehensive systematic review maps 738 studies published between 2014 and 2024 to uncover trends, gaps, and opportunities across neuroscience. Introducing OrganoidMap—an interactive, open‐access platform to explore and compare models—this work enables ...
Anna Wolfram   +10 more
wiley   +1 more source

Efficient Embedded Speech Recognition for Very Large Vocabulary Mandarin Car-Navigation Systems [PDF]

open access: yes, 2009
Automatic speech recognition (ASR) for a very large vocabulary of isolated words is a difficult task on a resource-limited embedded device. This paper presents a novel fast decoding algorithm for a Mandarin speech recognition system which can ...
Qian, Yanmin   +2 more
core   +1 more source

Advanced pruning strategies to speed up mining closed molecular fragments [PDF]

open access: yes2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583), 2005
In years, several algorithms for mining frequent subgraphs in graph databases have been proposed, with a major application area being the discovery of frequent substructures of biomolecules. Unfortunately, most of these algorithms still struggle with fairly long execution times if larger substructures or molecular fragments are desired. We describe two
Borgelt, Christian   +2 more
openaire   +2 more sources

Relationship of Dye Adsorption Onto Biomass Activated Carbon Mixed Matrix Ultrafiltration: A Mass Transfer Model Study

open access: yesAdvanced Materials Interfaces, EarlyView.
This study explored dye molecule adsorption from water, focusing on activated carbon in polymer membranes for purifying low‐quality water. Polyvinylidene fluoride (PVDF) membranes showed enhanced removal efficiency of methylene blue (MB) from 89.29% to 98.33% with biomass‐activated carbon (BAC).
Khairul Anwar Mohamad Said   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy