Results 51 to 60 of about 118,288 (291)
Process‐Informed Analysis of As‐Built Metal Additive Surface Features
This article introduces a novel method for feature‐based surface texture characterisation directly incorporating manufacturing variables into the feature extraction workflow. This marks a major step towards identifying process‐specific surface properties and their influence on part function and hence a holistic understanding of process–structure ...
Theresa Buchenau +5 more
wiley +1 more source
Detecting Blackholes and Volcanoes in Directed Networks [PDF]
In this paper, we formulate a novel problem for finding blackhole and volcano patterns in a large directed graph. Specifically, a blackhole pattern is a group which is made of a set of nodes in a way such that there are only inlinks to this group from ...
Li, Zhongmou, Liu, Yanchi, Xiong, Hui
core
PREdicting LNP In Vivo Efficacy (PRELIVE) framework enables the prediction of lipid nanoparticle (LNPs) organ‐specific delivery through dual modeling approaches. Composition‐based models using formulation parameters and protein corona‐based models using biological fingerprints both achieve high predictive accuracy across multiple organs.
Belal I. Hanafy +3 more
wiley +1 more source
Branch-and-Prune Search Strategies for Numerical Constraint Solving [PDF]
When solving numerical constraints such as nonlinear equations and inequalities, solvers often exploit pruning techniques, which remove redundant value combinations from the domains of variables, at pruning steps.
Faltings, Boi +3 more
core +3 more sources
Pruning Strategies for Backdoor Defense in LLMs
Backdoor attacks are a significant threat to the performance and integrity of pre-trained language models. Although such models are routinely fine-tuned for downstream NLP tasks, recent work shows they remain vulnerable to backdoor attacks that survive vanilla fine-tuning. These attacks are difficult to defend because end users typically lack knowledge
Santosh Chapagain +2 more
openaire +2 more sources
Efficient and effective pruning strategies for health data de-identification [PDF]
Privacy must be protected when sensitive biomedical data is shared, e.g. for research purposes. Data de-identification is an important safeguard, where datasets are transformed to meet two conflicting objectives: minimizing re-identification risks while maximizing data quality.
Prasser, Fabian +2 more
openaire +3 more sources
Cerebral organoids are transforming brain research, yet the field remains fragmented. This comprehensive systematic review maps 738 studies published between 2014 and 2024 to uncover trends, gaps, and opportunities across neuroscience. Introducing OrganoidMap—an interactive, open‐access platform to explore and compare models—this work enables ...
Anna Wolfram +10 more
wiley +1 more source
Efficient Embedded Speech Recognition for Very Large Vocabulary Mandarin Car-Navigation Systems [PDF]
Automatic speech recognition (ASR) for a very large vocabulary of isolated words is a difficult task on a resource-limited embedded device. This paper presents a novel fast decoding algorithm for a Mandarin speech recognition system which can ...
Qian, Yanmin +2 more
core +1 more source
Advanced pruning strategies to speed up mining closed molecular fragments [PDF]
In years, several algorithms for mining frequent subgraphs in graph databases have been proposed, with a major application area being the discovery of frequent substructures of biomolecules. Unfortunately, most of these algorithms still struggle with fairly long execution times if larger substructures or molecular fragments are desired. We describe two
Borgelt, Christian +2 more
openaire +2 more sources
This study explored dye molecule adsorption from water, focusing on activated carbon in polymer membranes for purifying low‐quality water. Polyvinylidene fluoride (PVDF) membranes showed enhanced removal efficiency of methylene blue (MB) from 89.29% to 98.33% with biomass‐activated carbon (BAC).
Khairul Anwar Mohamad Said +5 more
wiley +1 more source

