-
1141
Targeting necroptosis in MCF-7 breast cancer cells: In Silico insights into 8,12-dimethoxysanguinarine from Eomecon Chionantha through molecular docking, dynamics, DFT, and MEP stu...
Published 2025-01-01“…This study presents the first computational exploration of SG-A interactions with key necroptotic proteins-RIPK1, RIPK3, and MLKL-through molecular docking, molecular dynamics (MD), density functional theory (DFT), and molecular electrostatic potential (MEP) analyses. …”
Get full text
Article -
1142
Neural activity responsiveness by maturation of inhibition underlying critical period plasticity
Published 2025-01-01Get full text
Article -
1143
Identification of natural compounds as potential inhibitors of Interleukin-23: virtual screening, ADMET, drug-likeness, and dynamic simulation
Published 2025-04-01“…Density functional theory (DFT) analysis using the Becke, three-parameter, Lee-Yang-Parr (B3LYP)/6-31++G(d,p) basis set indicated a promising reactivity profile for the ligands. …”
Get full text
Article -
1144
Academician V.S. Mikhalevich and His Department
Published 2025-03-01“…In 1960, the Department of Automated Production Control Systems was organized at the Computing Center, headed by V.S. Mikhalevich. Soon the department was renamed the Department of Economic Cybernetics, the main areas of work of which were the theory and practical problems of optimal planning, operations research, design of complex objects and systems, automation of processes in production and transport. …”
Get full text
Article -
1145
Analytical Model of Crack Opening in Reinforced Concrete Structures Based on DCE
Published 2025-06-01Get full text
Article -
1146
Dirac traces and the Tutte polynomial
Published 2025-05-01“…The time complexity of computing Dirac traces is analysed by this connection, and improvements to algorithms for computing Dirac traces are proposed.…”
Get full text
Article -
1147
Stochastic Variance Reduced Primal–Dual Hybrid Gradient Methods for Saddle-Point Problems
Published 2025-05-01Get full text
Article -
1148
Heutagogical approach to music learning in vocational schools
Published 2022-06-01“…In addition, the use of information and communication technology in teaching and performing music is growing rapidly, thus, the music teachers must master computer technology to address the complexities of today’s music industry, and support the music learning process in theory and practice. …”
Get full text
Article -
1149
-
1150
The Synthesis, Characterization, and Biological Evaluation of a Fluorenyl-Methoxycarbonyl-Containing Thioxo-Triazole-Bearing Dipeptide: Antioxidant, Antimicrobial, and BSA/DNA Bind...
Published 2025-06-01“…A computational evaluation at the ωB97XD/aug-cc-pVDZ level of theory was carried out, confirming the experimental results and revealing a powerful potential of the peptide as an antioxidant, through FMOs, MEP analysis, and antioxidant mechanism assessments. …”
Get full text
Article -
1151
Sameness entices, but novelty enchants in fanfiction online
Published 2025-07-01Get full text
Article -
1152
-
1153
The decoupling of moduli about the standard embedding
Published 2025-01-01“…Abstract We study the cohomology of an elliptic differential complex arising from the infinitesimal moduli of heterotic string theory in the supergravity approximation. …”
Get full text
Article -
1154
Analytical Investigation of Dynamic Response in Cracked Structure Subjected to Moving Load
Published 2025-06-01“…However, the existing methodologies encounter two critical limitations: computational inefficiency and a trade-off between model fidelity and practicality. …”
Get full text
Article -
1155
Flavonoids as Promising Akt1 Inhibitors in Cancer Medicine: Insights From Molecular Docking, Dynamics, DFT Calculations, and In Vitro Validation
Published 2025-08-01“…Methods Cross‐validation and Density Functional Theory analysis were conducted utilizing the SwissDock server and the Gaussian 09 W software suite for the top‐ranked compounds. …”
Get full text
Article -
1156
Self-similarity analysis of network threat time series
Published 2008-01-01“…The research outcome establishes the theory base to utilize the complex non-linearity system theory such as fractal and chaos to process the information security risk as-sessment and network threat prediction.…”
Get full text
Article -
1157
Self-similarity analysis of network threat time series
Published 2008-01-01“…The research outcome establishes the theory base to utilize the complex non-linearity system theory such as fractal and chaos to process the information security risk as-sessment and network threat prediction.…”
Get full text
Article -
1158
On Methods in the Verification and Elaboration of Development Programs for Agricultural Territories
Published 2018-10-01“…Nowadays, the methods of program-targeted management for the development of various socio-economic systems of complex structure, such as agricultural areas, have become universal. …”
Get full text
Article -
1159
Block Encryption and Decryption of a Sentence Using Decomposition of the Turan Graph
Published 2023-01-01“…It mainly depends on mathematical concepts like number theory and algebra. Recently, graph theory concepts are employed in cryptography to make it stronger. …”
Get full text
Article -
1160
Multimodal Lotus Effect Algorithm for Engineering Optimization Problems
Published 2025-04-01Get full text
Article