Search alternatives:
using function » using fusion (Expand Search)
algorithm cost » algorithm goa (Expand Search), algorithm aoa (Expand Search), algorithm its (Expand Search)
algorithm a » algorithm fa (Expand Search), algorithms a (Expand Search), algorithm _ (Expand Search)
a function » _ functional (Expand Search)
using function » using fusion (Expand Search)
algorithm cost » algorithm goa (Expand Search), algorithm aoa (Expand Search), algorithm its (Expand Search)
algorithm a » algorithm fa (Expand Search), algorithms a (Expand Search), algorithm _ (Expand Search)
a function » _ functional (Expand Search)
-
341
H.264/AVC to HEVC Video Transcoder Based on Dynamic Thresholding and Content Modeling
Published 2014“…Then, two types of mode mapping algorithms are proposed. In the first solution, a single H.264/AVC coding parameter is used to determine the outgoing HEVC partitions using dynamic thresholding. …”
Get full text
article -
342
Scalable Multimedia Streaming in Wireless Networks with Device-to-Device Cooperation
Published 2016“…This is particularly applicable to use cases such as delivering real-time multimedia content to fans watching a soccer game in a stadium or to participants attending a major conference in a large auditorium. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
343
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…We use a semantic-aware inverted index to allow semantic-aware search, result selection, and result ranking functionality. …”
Get full text
Get full text
Get full text
Get full text
article -
344
Common weaving approach in mainstream languages for software security hardening
Published 2013“…GIMPLE weaving accompanied by a common aspect-oriented language (1) allows security experts providing security solutions using this common language, (2) lets developers focus on the main functionality of programs by relieving them from the burden of security issues, (3) unifies the matching and the weaving processes for mainstream languages, and (4) facilitates introducing new security features in AOP languages. …”
Get full text
Get full text
Get full text
article -
345
-
346
Integrated whole transcriptome and small RNA analysis revealed multiple regulatory networks in colorectal cancer
Published 2021“…Computational analyses using Ingenuity Pathway Analysis (IPA) identified multiple activated signaling networks in CRC, including ERBB2, RABL6, FOXM1, and NFKB networks, while functional annotation highlighted activation of cell proliferation and migration as the hallmark of CRC. …”
-
347
DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins
Published 2025“…Unlike standard machine learning approaches such as PCA, LDA, SVM, RF, GBM etc, DeepRaman functions independently, requiring no human interaction, and can be used to much smaller datasets than traditional CNNs. …”
Get full text
Get full text
Get full text
article -
348
IoT-Based Sustainable Parking Lot
Published 2023“…The access control system employs a combination of vehicle detection and plate recognition algorithms to identify and authenticate vehicles entering and exiting the parking lot. …”
Get full text
article -
349
Single-Cell Transcriptome Analysis Revealed Heterogeneity and Identified Novel Therapeutic Targets for Breast Cancer Subtypes
Published 2023“…In the current study, we employed computational algorithms to decipher the cellular composition of estrogen receptor-positive (ER<sup>+</sup>), HER2<sup>+</sup>, ER<sup>+</sup>HER2<sup>+</sup>, and triple-negative BC (TNBC) subtypes from a total of 49,899 single cells’ publicly available transcriptomic data derived from 26 BC patients. …”
-
350
Deploying model obfuscation: towards the privacy of decision-making models on shared platforms
Published 2024“…Privacy and security of data and models are fundamental necessities that must be satisfied for this protocol's proper functioning. To this end, we propose a conceptual and algorithmic framework of a model obfuscation scheme. …”
Get full text
Get full text
-
351
Gene-specific machine learning model to predict the pathogenicity of BRCA2 variants
Published 2022“…<h3>Background</h3><p dir="ltr">Existing BRCA2-specific variant pathogenicity prediction algorithms focus on the prediction of the functional impact of a subtype of variants alone. …”
-
352
Cohen syndrome and early-onset epileptic encephalopathy in male triplets: two disease-causing mutations in VPS13B and NAPB
Published 2023“…Interestingly, the functions of the two proteins; VPS13B, a transmembrane protein involved in intracellular protein transport, and SNAP-beta involved in neurotransmitters release at the neuronal synaptic complexes, have been associated with Golgi-mediated vesicular trafficking. …”