Zobrazeno 1 - 10
of 3 332
pro vyhledávání: '"Wang Shang"'
Autor:
Niu Yuanyuan, Yang Xiaobo, Wang Shang, Yang Yutong, Zhou Hongrui, Li Chenyu, Xue Bin, Zhang Xi, Zhao Chen, Shen Zhiqiang, Wang Jingfeng, Ling Yun, Yu Pingfeng, Qiu Zhigang
Publikováno v:
Frontiers in Microbiology, Vol 13 (2022)
Bacteriophages (phages) are capable of infecting specific bacteria, and therefore can be used as a biological control agent to control bacteria-induced animal, plant, and human diseases. In this study, two homolog phages (named PPAY and PPAT) that in
Externí odkaz:
https://doaj.org/article/1b83bda7dbea43aa8affd9fbba63dba5
Autor:
Wang, Shang, Zhu, Tianqing, Liu, Bo, Ding, Ming, Guo, Xu, Ye, Dayong, Zhou, Wanlei, Yu, Philip S.
With the rapid development of artificial intelligence, large language models (LLMs) have made remarkable advancements in natural language processing. These models are trained on vast datasets to exhibit powerful language understanding and generation
Externí odkaz:
http://arxiv.org/abs/2406.07973
Autor:
Qi, Zhen, Li, Wanlei, Cheng, Jun, Guo, Zhongxin, Li, Chenglong, Wang, Shang, Tan, Zuoquan, Gao, Zhiting, Wang, Yongchao, Lian, Zichen, Chen, Shanshan, He, Yonglin, Wang, Zhiyong, Wang, Yapei, Zhang, Jinsong, Wang, Yayu, Cai, Peng
Molecular adsorption is pivotal in device fabrication and material synthesis for quantum technology. However, elucidating the behavior of physisorption poses technical challenges. Here graphene with ultrahigh sensitivity was utilized to detect ozone
Externí odkaz:
http://arxiv.org/abs/2405.06041
This paper introduces the problem of learning to place logic blocks in Field-Programmable Gate Arrays (FPGAs) and a learning-based method. In contrast to previous search-based placement algorithms, we instead employ Reinforcement Learning (RL) with t
Externí odkaz:
http://arxiv.org/abs/2404.13061
Publikováno v:
Journal of Intelligent Systems, Vol 29, Iss 1, Pp 1587-1597 (2019)
Multiple surveillance cameras provide huge video resources that need further mining to collect traffic stream data such as license plate recognition (LPR). However, these surveillance cameras have limited spatial resolution, which may not always suff
Externí odkaz:
https://doaj.org/article/bbfc1a73bb0f4d2f8dea754c65298338
Recently, deep learning technology has been successfully applied in the field of image compression, leading to superior rate-distortion performance. It is crucial to design an effective and efficient entropy model to estimate the probability distribu
Externí odkaz:
http://arxiv.org/abs/2403.14471
Publikováno v:
Frontiers in Physiology, Vol 10 (2020)
Adaptations to low temperature play a critical role in restricting the geographical distribution of insects. Decreasing day lengths and temperatures trigger seasonal cold adaptations in insects. These adaptions include changes in expression at the mi
Externí odkaz:
https://doaj.org/article/14d713abc4ad4eeda741030e97c1bf47
Publikováno v:
Jixie qiangdu, Vol 40, Pp 1205-1208 (2018)
The automated ball indentation method( ABI) which is a new way to evaluate the mechanical properties of the materials has been studied in recent years. In order to explore the applicability of the ABI method to evaluate the fracture toughness of
Externí odkaz:
https://doaj.org/article/8e87ad8a5ccf4babb38acda5d5c0d109
Autor:
Sun, Yu, Liu, Teng, Wang, Shang, Meng, Jun, Zhang, Yongwen, Yang, Saini, Chen, Xiaosong, Chen, Deliang, Kurths, Jürgen, Havlin, Shlomo, Schellnhuber, Hans Joachim, Fan, Jingfang
Earth system tipping elements have been predominantly investigated for their potential to trigger \textit{negative} ecological, climatic, and societal shifts. Yet, an overlooked but seminal avenue exists in the form of \textit{positive} tipping pheno
Externí odkaz:
http://arxiv.org/abs/2312.03963
Autor:
Ma, Hua, Wang, Shang, Gao, Yansong, Zhang, Zhi, Qiu, Huming, Xue, Minhui, Abuadbba, Alsharif, Fu, Anmin, Nepal, Surya, Abbott, Derek
All current backdoor attacks on deep learning (DL) models fall under the category of a vertical class backdoor (VCB) -- class-dependent. In VCB attacks, any sample from a class activates the implanted backdoor when the secret trigger is present. Exis
Externí odkaz:
http://arxiv.org/abs/2310.00542