Articles with "empirical validation" as a keyword



Photo from archive.org

Empirical Validation of Overlapping Virus lncRNAs and Coding Transcripts by Northern Blot.

Sign Up to like & get
recommendations!
Published in 2021 at "Methods in molecular biology"

DOI: 10.1007/978-1-0716-1581-2_17

Abstract: Viruses, like their metazoan hosts, have evolved to utilize intricate transcriptional mechanisms to generate a vast array of both coding and noncoding RNA transcripts. The resolution of specific noncoding RNA transcripts produced by viruses, particularly… read more here.

Keywords: overlapping virus; validation; virus lncrnas; lncrnas coding ... See more keywords
Photo by kellysikkema from unsplash

Empirical validation of directed functional connectivity

Sign Up to like & get
recommendations!
Published in 2017 at "NeuroImage"

DOI: 10.1016/j.neuroimage.2016.11.037

Abstract: Abstract Mapping directions of influence in the human brain connectome represents the next phase in understanding its functional architecture. However, a host of methodological uncertainties have impeded the application of directed connectivity methods, which have… read more here.

Keywords: connectivity; directed functional; empirical validation; ground truth ... See more keywords
Photo from wikipedia

Empirical Validation of an Auxetic Structured Foot With the Powered Transfemoral Prosthesis

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Robotics and Automation Letters"

DOI: 10.1109/lra.2022.3194673

Abstract: The toe joint has been studied since it plays a critical role in human ambulation, such as stability, energy storage and propulsion. Despite its critical role, only a few studies have used and tested toe-jointed… read more here.

Keywords: kinematics; toe joint; prosthesis; foot ... See more keywords
Photo by jontyson from unsplash

Empirical Validation of Automated Vulnerability Curation and Characterization

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Software Engineering"

DOI: 10.1109/tse.2023.3250479

Abstract: Prior research has shown that public vulnerability systems such as US National Vulnerability Database (NVD) rely on a manual, time-consuming, and error-prone process which has led to inconsistencies and delays in releasing final vulnerability results.… read more here.

Keywords: vulnerability; time; validation automated; automated vulnerability ... See more keywords