Search
Search Results
-
A Source-code Aware Method for Software Mutation Testing Using Artificial Bee Colony Algorithm
The effectiveness of software test data relates to the number of found faults by the test data. Software mutation test is used to evaluate the...
-
Advanced Coding and Coded Modulation Techniques
This chapter is devoted to advanced channel coding and coded modulation techniques. After linear and BCH codes fundamentals, we provide the trellis... -
Estimating the Relationship Between Block Size and Block Propagation Time in Bitcoin by Simulation
Bitcoin is known to have poor transaction processing performance. A performance improvement is expected by increasing block size, but how much... -
Investor Sentiment and Efficiency of the Cryptocurrency Market: The Case of the Crypto Fear & Greed Index
This paper aims to simulate cryptocurrency investment strategies using the Crypto Fear & Greed Index and verify whether they outperform passive... -
A diffeomorphic aging model for adult human brain from cross-sectional data
Normative aging trends of the brain can serve as an important reference in the assessment of neurological structural disorders. Such models are...
-
Generating Functions for Local Symplectic Groupoids and Non-perturbative Semiclassical Quantization
This paper contains three results about generating functions for Lie-theoretic integration of Poisson brackets and their relation to quantization. In...
-
Asymmetric entanglement-assisted quantum codes: bound and constructions
The theory of quantum error-correcting codes has been extended to asymmetric quantum channels-qubit-flip and phase-shift errors may have equal or...
-
Introduction
These notes are based on a simple remark, which appeared more and more evident during my recent attempts to use coherent states in the computation of... -
A novel mouse model for familial hypocalciuric hypercalcemia (FHH1) reveals PTH-dependent and independent CaSR defects
The Calcium-sensing receptor (CaSR) senses extracellular calcium, regulates parathyroid hormone (PTH) secretion, and has additional functions in...
-
MomentaMorph: Unsupervised Spatial-Temporal Registration with Momenta, Shooting, and Correction
Tagged magnetic resonance imaging (tMRI) has been employed for decades to measure the motion of tissue undergoing deformation. However,... -
Rotational Symmetries and Spherical Measure in Homogeneous Groups
We present different types of rotational symmetries for distances in homogeneous groups, showing that the area formula for the associated spherical...
-
Accumulation Dynamics of a Photosensitizer Liposomal Borated Chlorine e6 in Various Morphological Types of Experimental Tumors
AbstractPhotodynamic therapy (PDT) is an effective method for treatment of superficial malignant tumors. Determination of the time interval between...
-
Who are the receivers and transmitters of volatility spillovers: oil, clean energy, and green and non-green cryptocurrency markets
In the context of clean energy and green cryptocurrency development, the relationship between energy and cryptocurrency markets deserves further...
-
Wall-Crossing Formulas of Donaldson–Thomas Invariants
In this chapter, we explain wall-crossing formulas of DT invariants and their applications. The applications include DT/PT correspondence,... -
Metabolic control of CD47 expression through LAT2-mediated amino acid uptake promotes tumor immune evasion
Chemotherapy elicits tumor immune evasion with poorly characterized mechanisms. Here, we demonstrate that chemotherapy markedly enhances the...
-
Effective dynamics of quantum fluctuations in field theory: with applications to cosmology
We develop a novel framework for describing quantum fluctuations in field theory, with a focus on cosmological applications. Our method uniquely...
-
10.07uW Multi-Mode Baseband Transceiver for Encrypted Capsule Endoscopy
This paper proposes an ultra-low-power multi-mode baseband transceiver for capsule endoscopy. We set a new specification for capsule endoscopy to...
-
Decoding RS and BCH Codes (Part 2)
Decoding continues in this chapter by first presenting an equation known as the “key equation” that allows to treat errors and erasures in a unified... -
The Operator Formalism and The Dual Resonance Model
This chapter is on the Operator Formalism for Dual Resonance Models (DRM). This is an important bridge between DRM and string theory. The starting...