64 results found

Li Ranfei, Wang Sirui, Yang Qiying

CRISPR-Cas9 screening enables systematic identification of gene dependencies across diverse cancer cell lines. However, distinguishing lineage-specific vulnerabilities from broadly essential genes rem...

Research Square 2026-04-21 rs-9463556
CRISPR-Cas9 DepMap cancer dependency bioinformatics lineage-specific targets nucleotide metabolism

Natalia Selini Hadjidimitriou, Giulia Renzi, Paulo Cantillano

This paper advances a human-centered understanding of urban acceptance of autonomous vehicles (AVs) within ambient-intelligence mobility systems. Using survey data from 5,070 respondents across ten Eu...

Research Square 2026-04-21 rs-9060852
Ambient Intelligence Autonomous Vehicles Technology Acceptance Mobility Behavior Smart Urban Systems Context‑Aware Mobility

Kexuan Zhu, Qian Zhao, Huadi Wang, Yang Zhao

EEG signals face challenges such as a scarcity of training data, significant individual variability, and difficulties in designing neural network architectures, which severely limit the performance an...

User Modeling and User-Adapted Interaction 2026-04-21 rs-9400088
EEG emotion recognition generative adversarial network data augmentation neural architecture search

RamaKrishna Pasupuleti

Battery management systems rely on equivalent-circuit models (ECMs) that become progressively wrong as the cell ages. Classical adaptive remedies — periodic parameter re-identification, extended Kalma...

Research Square 2026-04-21 rs-9454069
Lithium-ion battery Battery management Residual learning Adaptive control Model mismatch Aging compensation NASA Randomized Battery Usage dataset Cross-cell generalization

M Anitha, Sakthivel S

COVID-19 has accelerated the challenges of cardiovascular complications among patients, leading to the increased urgency of safe, trustworthy, and smart healthcare information management systems. Elec...

Scientific Reports 2026-04-21 rs-8941934
COVID-19 Cardiovascular Disease ECG Image Analysis Mobile-Cloud Computing Hybrid Cryptography Blockchain Security Bayesian Risk Assessment Privacy-Preserving Healthcare

Namwang Stephen Karlo, Mary Odenyo, Abalo Agness Oryem

The research investigates how data-driven recruitment methods can enhance South Sudan's unstable public sector through its study of the State Ministry of Labour in Eastern Equatoria, which faces ongoi...

Research Square 2026-04-21 rs-9461119
Data Decision-Making Recruitment transparency fairness inclusivity & diversity delay salary & pension Public Service

Junyi Yao, Zihao Zheng, Jiayu Long

Pairwise ranking systems based on Maximum Likelihood Estimation (MLE), such as the Bradley-Terry model, are widely used to aggregate preferences from pairwise comparisons. However, their robustness un...

Research Square 2026-04-21 rs-9459163
Pairwise ranking Bradley–Terry model adversarial manipula- tion social choice ranking robustness

Venkat Alamuri

Dynamic data distributions, system failures, and low-latency, cost-effective processing are becoming more of a challenge to modern real-time data pipelines. Current streaming architectures are based o...

Research Square 2026-04-21 rs-9455617
Self-healing data pipelines Reinforcement learning Stream processing Cost-aware optimization Real-time validation Adaptive systems Anomaly detection

Satish Prajapati

The production of charmonium resonances in proton-proton collisions provides a unique labora tory for understanding quantum chromodynamics (QCD) at the interface of perturbative and non perturbative r...

Research Square 2026-04-21 rs-9455261
J/ψ ψ(2S) charmonium CMS LHC open data QCD quarkonium

Amit Rai

Database Activity Monitoring (DAM) systems are critical for detecting anomalous and malicious database inter- actions. However, traditional DAM architectures rely on direct inspection of SQL queries, ...

Research Square 2026-04-21 rs-9469357
Database Activity Monitoring Privacy- Preserving Systems Query Fingerprinting Information Theory SQL Security Data Confidentiality
Back to Top
Home
Browse
Submit
About
0.053907s