Results 131 to 140 of about 153,790 (328)
ABSTRACT Working memory (WM) decline in aging may be related to increases in “neural noise”, potentially reflected in the EEG aperiodic exponent. We reanalyzed previously published data to investigate age‐related differences in the aperiodic exponent during verbal WM and its relationship with neural inefficiency. EEG was recorded from 24 younger (18–35
Sabrina Sghirripa +2 more
wiley +1 more source
A hitchhiker's guide to single‐cell epigenomics: Methods and applications for cancer research
Abstract Genetic mutations are well known to influence tumorigenesis, tumor progression, treatment response and relapse, but the role of epigenetic variation in cancer progression is still largely unexplored. The lack of epigenetic understanding in cancer evolution is in part due to the limited availability of methods to examine such a heterogeneous ...
Marta Moreno‐Gonzalez +2 more
wiley +1 more source
Methodologies for Sample Multiplexing and Computational Deconvolution in Single‐Cell Sequencing
Sample multiplexing offers a critical solution for boosting throughput and minimizing batch effects in single‐cell sequencing. This review navigates the latest experimental methodologies and computational deconvolution algorithms, bridging the gap between wet‐lab design and analytical success.
Yufei Gao, Weiwei Yin, Wei Hu, Wei Chen
wiley +1 more source
Parallel Algorithm for Approximate State Graph Exploration With Restricted Memory Footprint
ABSTRACT We investigate the performance of algorithms that explore large state graphs of finite state machines without input by following paths. To improve on anchor‐based and candidate‐based explorations and to avoid the performance overhead of full anchor lists and the tuning sensitivity of timeout‐based methods, we propose and analyze exploration ...
Jörg Keller, Sebastian Litzinger
wiley +1 more source
ABSTRACT Despite the universal acknowledgment of financial profit expectations as an investment driver, environmental concern has been suggested as a factor influencing investors' decisions to purchase cryptocurrency. In this sense, this study investigates the impact of environmental information on investment allocation decisions to purchase different ...
Moritz Wendl +2 more
wiley +1 more source
Secure Hashing Algorithm And Advance Encryption Algorithm In Cloud Computing
Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common
openaire +1 more source
Explainable AI With Imbalanced Learning Strategies for Blockchain Transaction Fraud Detection
Research methodology pipeline for blockchain fraud detection. ABSTRACT Blockchain networks now support billions of dollars in daily transactions, making reliable and transparent fraud detection essential for maintaining user trust and financial stability.
Ahmed Abbas Jasim Al‐Hchaimi +2 more
wiley +1 more source
This study develops a deep adversarial reinforcement learning framework for dynamic technology transfer risk assessment. The research outcome DAGAN‐MORL has a misjudgment rate 6.3%, a delay of 1.8 h, and a profit error of 7.9%, leading at the industrial level, providing intelligent support for university‐enterprise collaborative innovation. ABSTRACT As
Guojun Wang
wiley +1 more source
Alternating‐contrast single‐shot spiral MR‐ARFI with model‐based displacement map reconstruction
Abstract Purpose To improve single‐shot spiral MR‐Acoustic Radiation Force Imaging (MR‐ARFI)'s robustness to dynamic phase errors and evaluate it in non‐human primates (NHPs) with a low‐f‐number transducer. Methods A single‐shot spiral MR‐ARFI pulse sequence with 2 mm in‐plane resolution and alternating displacement phase contrast was implemented to ...
Saikat Sengupta +4 more
wiley +1 more source
A Hybrid Transformer–CNN Framework for Semantic Behavioral Modeling in Office Malware Detection
ABSTRACT Office documents have emerged as a prevalent attack vector, with adversaries increasingly embedding executable payloads and malicious macros to evade signature‐based detection mechanisms. To address these challenges, this study presents a hybrid Transformer–CNN semantic behavioral modeling framework for Office malware detection.
Sheikh M. Zeeshan Javed +4 more
wiley +1 more source

