Showing 41 - 60 results of 5,569 for search '(((spina OR shinae) OR ((spike OR spie) OR find)) OR ((rings OR ((pina OR aina) OR pinga)) OR pin))', query time: 0.25s Refine Results
  1. 41

    Lattice Encoding of Cyclic Codes from Skew-polynomial Rings by Ducoat, Jérôme, Oggier, Frédérique

    Published 2015
    “…We propose a construction of lattices from cyclic codes from skew-polynomial rings. This construction may be seen as a variation of Construction A of lattices from linear codes, obtained from quotients of orders in cyclic division algebras. …”
    Get full text
    Get full text
    Conference Paper
  2. 42

    Reconstituting ring-rafts in bud-mimicking topography of model membranes by Ryu, Yong-Sang, Lee, In-Ho, Suh, Jeng-Hun, Park, Seung Chul, Oh, Soojung, Jordan, Luke R., Wittenberg, Nathan J., Oh, Sang-Hyun, Jeon, Noo Li, Lee, Byoungho, Parikh, Atul N., Lee, Sin-Doo

    Published 2018
    “…In all cases, in addition to the generation or relief of the curvature stress, the buds recruit specific lipids and proteins from the donor membrane through restricted diffusion for the development of a ring-type raft domain of closed topology. Here, by reconstituting the bud topography in a model membrane, we demonstrate the preferential localization of cholesterol- and sphingomyelin-enriched microdomains in the collar band of the bud-neck interfaced with the donor membrane. …”
    Get full text
    Get full text
    Journal Article
  3. 43

    Crustal deformation at the Sumatran subduction zone revealed by coral rings by Ward, Steven N., Natawidjaja, Danny H., Suwargadi, Bambang W., Sieh, Kerry

    Published 2012
    “…Analyses of coral rings grown in the interval 1970–1997 reveal a geographically distinct pattern of interseismic uplift off Sumatra's western coast. …”
    Get full text
    Get full text
    Journal Article
  4. 44

    Bio-inspired categorization using event-driven feature extraction and spike-based learning by Zhao, Bo, Chen, Shoushun, Tang, Huajin

    Published 2014
    “…Bio-inspired, cortex-like, spikebased features are obtained through event-driven convolution and neural competition. The extracted spike feature patterns are then classified by a network of leaky integrate-and-fire (LIF) spiking neurons, in which the weights are trained using tempotron learning rule. …”
    Get full text
    Get full text
    Conference Paper
  5. 45

    Morphological learning in spiking neurons: a new hardware efficient maching learning method by Jahagirdar, Kavya

    Published 2014
    “…The latest developments in the research of spiking neural network models have shown that unlike the classic neural network models, these models communicate via precisely timed neuron spikes, thus making them a closer representation of the biological neurons. …”
    Get full text
    Final Year Project (FYP)
  6. 46
  7. 47

    Fish Motion Trajectories Detection Algorithm Based on Spiking Neural Network (S/O: 12893) by Yusoff, Nooraini, Yusof, Yuhanis, Siraj, Fadzilah, Ahmad, Farzana Kabir

    Published 2017
    “…This study proposes sequence learning for the fish motion trajectory by using the Spike-Time dependent Plasticity (STDP) in the Spiking Neural Networks (SNNs). …”
    Get full text
    Monograph
  8. 48
  9. 49

    Direction finding for UWB RFID system in dense cluttered environments by Luo, Yanjia

    Published 2014
    “…Source direction finding with an antenna array is a major topic in radar-related applications. …”
    Get full text
    Thesis
  10. 50
  11. 51
  12. 52

    The computational complexity of finding stationary points in non-convex optimization by Hollender, A, Zampetakis, M

    Published 2024
    “…<p>Finding approximate stationary points, i.e., points where the gradient is approximately zero, of non-convex but smooth objective functions f over unrestricted d-dimensional domains is one of the most fundamental problems in classical non-convex optimization. …”
    Journal article
  13. 53

    Strike a pose: tracking people by finding stylized poses by Ramanan, D, Forsyth, DA, Zisserman, A

    Published 2005
    “…We develop an algorithm for finding and kinematically tracking multiple people in long sequences. …”
    Conference item
  14. 54

    Synaptic element for neuromorphic computing using a magnetic domain wall device with synthetic pinning sites by Jin, Tianli, Gan, Weiliang, Tan, Funan, Sernicola, Nicolo Roberto, Lew, Wen Siang, Piramanayagam, S. N.

    Published 2020
    “…The control of the domain wall motion with the synthetic pinning sites is demonstrated to be a reliable technique for neuromorphic applications.…”
    Get full text
    Journal Article
  15. 55

    The natively disordered loop of Bcl-2 undergoes phosphorylation-dependent conformational change and interacts with Pin1 by Bharatham, Nagakumar, Chia, Joel, Mu, Yuguang, Baek, Kwanghee, Yoon, Ho Sup, Kang, CongBao

    Published 2013
    “…Finally, we show that the phosphorylated peptides of the Bcl-2 loop can bind Pin1, further substantiating the phosphorylation-mediated conformation change of Bcl-2.…”
    Get full text
    Get full text
    Journal Article
  16. 56
  17. 57

    Optimization of solubility of corannulene polymers via ring opening metathesis polymerization by Gunasegaran, Kevitrra

    Published 2019
    “…However, previous study carried out ring-opening metathesis polymerization (ROMP) on corannulene monomer using ruthenium-based Grubbs’ second-generation catalyst (G2) resulted in an insoluble corannulene homopolymer formation. …”
    Get full text
    Final Year Project (FYP)
  18. 58

    Polaron dynamics in two-dimensional photon-echo spectroscopy of molecular rings by Sun, Kewei, Huynh, Thanh Duc, Gelin, Maxim, Zhao, Yang

    Published 2013
    “…As an illustration, we have simulated a series of optical 2D spectra for two models of molecular rings.…”
    Get full text
    Get full text
    Journal Article
  19. 59

    Group signatures from lattices : simpler, tighter, shorter, ring-based by Ling, San, Nguyen, Khoa, Wang, Huaxiong

    Published 2015
    “…Moreover, our scheme can be transformed into the ring setting, resulting in a scheme based on ideal lattices, in which the public key and signature both have bit-size e õ(n ∙ logN), for security parameter n, and for group of N users. …”
    Get full text
    Get full text
    Journal Article
  20. 60