Showing 1,141 - 1,160 results of 1,410 for search '"Computational complexity theory', query time: 0.14s Refine Results
  1. 1141

    Targeting necroptosis in MCF-7 breast cancer cells: In Silico insights into 8,12-dimethoxysanguinarine from Eomecon Chionantha through molecular docking, dynamics, DFT, and MEP stu... by Maram B Alhawarri, Mohammad G Al-Thiabat, Amit Dubey, Aisha Tufail, Katreen Banisalman, Ghazi A Al Jabal, Eman Alkasasbeh, Esra'a Ibrahim Al-Trad, Bilal Harieth Alrimawi

    Published 2025-01-01
    “…This study presents the first computational exploration of SG-A interactions with key necroptotic proteins-RIPK1, RIPK3, and MLKL-through molecular docking, molecular dynamics (MD), density functional theory (DFT), and molecular electrostatic potential (MEP) analyses. …”
    Get full text
    Article
  2. 1142
  3. 1143

    Identification of natural compounds as potential inhibitors of Interleukin-23: virtual screening, ADMET, drug-likeness, and dynamic simulation by Davood Gheidari, Morteza Mehrdad, Mahan Etedali

    Published 2025-04-01
    “…Density functional theory (DFT) analysis using the Becke, three-parameter, Lee-Yang-Parr (B3LYP)/6-31++G(d,p) basis set indicated a promising reactivity profile for the ligands. …”
    Get full text
    Article
  4. 1144

    Academician V.S. Mikhalevich and His Department by Vasyl Biletskiy, Viktor Kuzmenko, Greta Chikrii

    Published 2025-03-01
    “…In 1960, the Department of Automated Production Control Systems was organized at the Computing Center, headed by V.S. Mikhalevich. Soon the department was renamed the Department of Economic Cybernetics, the main areas of work of which were the theory and practical problems of optimal planning, operations research, design of complex objects and systems, automation of processes in production and transport. …”
    Get full text
    Article
  5. 1145
  6. 1146

    Dirac traces and the Tutte polynomial by Joshua Lin

    Published 2025-05-01
    “…The time complexity of computing Dirac traces is analysed by this connection, and improvements to algorithms for computing Dirac traces are proposed.…”
    Get full text
    Article
  7. 1147
  8. 1148

    Heutagogical approach to music learning in vocational schools by Y. Sukmayadi, F. Sella, H. I. Midyanti

    Published 2022-06-01
    “…In addition, the use of information and communication technology in teaching and performing music is growing rapidly, thus, the music teachers must master computer technology to address the complexities of today’s music industry, and support the music learning process in theory and practice. …”
    Get full text
    Article
  9. 1149
  10. 1150

    The Synthesis, Characterization, and Biological Evaluation of a Fluorenyl-Methoxycarbonyl-Containing Thioxo-Triazole-Bearing Dipeptide: Antioxidant, Antimicrobial, and BSA/DNA Bind... by Lala Stepanyan, Tatevik Sargsyan, Valentina Mittova, Zurab R. Tsetskhladze, Nino Motsonelidze, Ekaterine Gorgoshidze, Niccolò Nova, Monika Israyelyan, Hayarpi Simonyan, Franco Bisceglie, Lusine Sahakyan, Karapet Ghazaryan, Giovanni N. Roviello

    Published 2025-06-01
    “…A computational evaluation at the ωB97XD/aug-cc-pVDZ level of theory was carried out, confirming the experimental results and revealing a powerful potential of the peptide as an antioxidant, through FMOs, MEP analysis, and antioxidant mechanism assessments. …”
    Get full text
    Article
  11. 1151
  12. 1152
  13. 1153

    The decoupling of moduli about the standard embedding by Beatrice Chisamanga, Jock McOrist, Sebastien Picard, Eirik Eik Svanes

    Published 2025-01-01
    “…Abstract We study the cohomology of an elliptic differential complex arising from the infinitesimal moduli of heterotic string theory in the supergravity approximation. …”
    Get full text
    Article
  14. 1154

    Analytical Investigation of Dynamic Response in Cracked Structure Subjected to Moving Load by Shuirong Gui, Hongwei Zeng, Zhisheng Gui, Mingjun Tan, Zhongzhao Guo, Kai Zhong, Yongming Xiong, Wangwang Fang

    Published 2025-06-01
    “…However, the existing methodologies encounter two critical limitations: computational inefficiency and a trade-off between model fidelity and practicality. …”
    Get full text
    Article
  15. 1155

    Flavonoids as Promising Akt1 Inhibitors in Cancer Medicine: Insights From Molecular Docking, Dynamics, DFT Calculations, and In Vitro Validation by Shokoofeh Jamshidi, Ali Eghbalian, Setareh Shojaei, Amir Taherkhani, Mehran Feizi‐Dehnayebi

    Published 2025-08-01
    “…Methods Cross‐validation and Density Functional Theory analysis were conducted utilizing the SwissDock server and the Gaussian 09 W software suite for the top‐ranked compounds. …”
    Get full text
    Article
  16. 1156

    Self-similarity analysis of network threat time series by XUAN Lei, LU Xi-cheng, YU Rui-hou, ZHAO Xue-ming

    Published 2008-01-01
    “…The research outcome establishes the theory base to utilize the complex non-linearity system theory such as fractal and chaos to process the information security risk as-sessment and network threat prediction.…”
    Get full text
    Article
  17. 1157

    Self-similarity analysis of network threat time series by XUAN Lei, LU Xi-cheng, YU Rui-hou, ZHAO Xue-ming

    Published 2008-01-01
    “…The research outcome establishes the theory base to utilize the complex non-linearity system theory such as fractal and chaos to process the information security risk as-sessment and network threat prediction.…”
    Get full text
    Article
  18. 1158

    On Methods in the Verification and Elaboration of Development Programs for Agricultural Territories by Jorge Vega Vice, Valery Mikhailov

    Published 2018-10-01
    “…Nowadays, the methods of program-targeted management for the development of various socio-economic systems of complex structure, such as agricultural areas, have become universal. …”
    Get full text
    Article
  19. 1159

    Block Encryption and Decryption of a Sentence Using Decomposition of the Turan Graph by C. Beaula, P. Venugopal, B. Praba

    Published 2023-01-01
    “…It mainly depends on mathematical concepts like number theory and algebra. Recently, graph theory concepts are employed in cryptography to make it stronger. …”
    Get full text
    Article
  20. 1160