Results 51 to 60 of about 40,875 (196)

Fast parallel construction of variable-length Markov chains

open access: yesBMC Bioinformatics, 2021
Background Alignment-free methods are a popular approach for comparing biological sequences, including complete genomes. The methods range from probability distributions of sequence composition to first and higher-order Markov chains, where a k-th order ...
Joel Gustafsson   +3 more
doaj   +1 more source

A New Strategy to Design Reconfigurable Rivest–Shamir–Adleman (RSA) Accelerators

open access: yesInternational Journal of Circuit Theory and Applications, EarlyView.
A reconfigurable FPGA‐based RSA accelerator is proposed using compression‐based modular multipliers combined with pseudomoduli arithmetic. The approach maps modular exponentiation to low‐cost arithmetic domains and applies a correction stage, achieving significant improvements in delay, operating frequency, and delay–area efficiency compared with ...
Augusto C. B. Vassoler   +4 more
wiley   +1 more source

Robust β‐myrcene block copolymer elastomeric vitrimers

open access: yesPolymer International, EarlyView.
Myrcene‐based vitrimeric elastomers were compared: statistical (poly(styrene‐stat‐myrcene‐stat‐AAEMA)] versus ‘hard–soft’ diblock (poly(styrene)‐block‐poly(myrcene‐co‐AAEMA)). The diblock's ability to anchor the glassy poly(styrene) blocks in a self‐assembled microstructure was effective – leading to four times higher tensile stress and ten times ...
Chong Yang Du   +2 more
wiley   +1 more source

Alien Trees and Shrubs with the Complements Saksamaa (Germany) and Saksa (German) in Early Written Language and Folklore

open access: yesYearbook of Balkan and Baltic Studies
The study of alien species has become more and more relevant today. In particular, the influence of alien species on the local nature is studied, but more and more studies have also begun to appear on how alien species affect the local language and ...
Jüri Viikberg   +2 more
doaj   +1 more source

Approximate String Matching with Compressed Indexes

open access: yesAlgorithms, 2009
A compressed full-text self-index for a text T is a data structure requiring reduced space and able to search for patterns P in T. It can also reproduce any substring of T, thus actually replacing T. Despite the recent explosion of interest on compressed
Pedro Morales   +3 more
doaj   +1 more source

Mapping arboretum research: Trends, gaps, and opportunities for biodiversity conservation, society, and climate resilience

open access: yesPLANTS, PEOPLE, PLANET, EarlyView.
Arboreta bridge people and nature while conserving tree biodiversity, supporting climate resilience, and advancing environmental education. This study maps over a century of available and indexed arboretum research, uncovering trends, knowledge gaps, and opportunities for collaboration.
Catarina Patoilo Teixeira   +1 more
wiley   +1 more source

A Comparative Evaluation of Carbonaceous and Alloy Type Anodes for Sodium‐Ion Batteries: Capacity, Scalability, and Sustainability Perspectives

open access: yesSmall, EarlyView.
This review critically compares the electrochemical performance of carbon‐based and alloy‐type anodes for sodium‐ion batteries, with an emphasis on strategies that enhance practical deployment. It highlights how synergistic optimization of microstructure, electrolyte, and presodiation improves hard carbon, while nanostructuring and interfacial ...
Anele Tshaka   +3 more
wiley   +1 more source

Efficient computation of absent words in genomic sequences

open access: yesBMC Bioinformatics, 2008
Background Analysis of sequence composition is a routine task in genome research. Organisms are characterized by their base composition, dinucleotide relative abundance, codon usage, and so on.
Herold Julia   +2 more
doaj   +1 more source

Computing Lempel-Ziv Factorization Online [PDF]

open access: yes, 2012
We present an algorithm which computes the Lempel-Ziv factorization of a word $W$ of length $n$ on an alphabet $\Sigma$ of size $\sigma$ online in the following sense: it reads $W$ starting from the left, and, after reading each $r = O(\log_{\sigma} n ...
Starikovskaya, Tatiana
core   +1 more source

Model‐Based Cybersecurity: Automating Common Vulnerabilities Reporting

open access: yesSystems Engineering, EarlyView.
ABSTRACT The Common Vulnerabilities and Exposures (CVE) Program's mission is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. A cybersecurity practitioner who suspects a software, hardware, or service vulnerability, can initiate a CVE‐ID Requesting process, as defined by MITRE.
Ahmad Jbara, Dov Dori
wiley   +1 more source

Home - About - Disclaimer - Privacy