-
121
Lipophilicity Assessment of Ruthenium(II)-Arene Complexes by the Means of Reversed-Phase Thin-Layer Chromatography and DFT Calculations
Published 2014-01-01“…In addition, ab initio density functional theory (DFT) computational approach was employed to calculate logKOW values from the differences in Gibbs’ free solvation energies of the solute transfer from n-octanol to water. …”
Get full text
Article -
122
-
123
Fast simulation of the influence of a refractive free-form microstructure on a wave field based on scalar diffraction theory
Published 2025-01-01“…The main advantage of this method is its reduced complexity, which leads to a remarkable reduction in computation time by more than two orders of magnitude compared to finite-difference time-domain (FDTD) methods. …”
Get full text
Article -
124
Description of Weak Halogen Bonding Using Various Levels of Symmetry-Adapted Perturbation Theory Combined with Effective Core Potentials
Published 2017-01-01“…This comparison reveals that high-order SAPT2+(3) method and the much less computationally demanding SAPT(DFT) method perform very well in describing Eint of the complexes. …”
Get full text
Article -
125
-
126
Prediction of Pt, Ir, Ru, and Rh complexes light absorption in the therapeutic window for phototherapy using machine learning
Published 2025-01-01“…Traditional prediction methods for these light absorption properties, including Time-Dependent Density Functional Theory (TDDFT), are often computationally intensive and time-consuming. …”
Get full text
Article -
127
-
128
An Improved Distributed Multi-User Cooperative Spectrum Sensing Method Based on DCS
Published 2013-11-01“…However, it increases computational complexity in the process of signal reconstruction. …”
Get full text
Article -
129
-
130
Finite-Time Cluster Synchronization of Fractional-Order Complex-Valued Neural Networks Based on Memristor with Optimized Control Parameters
Published 2025-01-01“…The finite-time cluster synchronization (FTCS) of fractional-order complex-valued (FOCV) neural network has attracted wide attention. …”
Get full text
Article -
131
Structured Dynamics in the Algorithmic Agent
Published 2025-01-01“…Our findings bridge perspectives from algorithmic information theory (Kolmogorov complexity, compressive modeling), symmetry (group theory), and dynamics (conservation laws, reduced manifolds), offering insights into the neural correlates of agenthood and structured experience in natural systems, as well as the design of artificial intelligence and computational models of the brain.…”
Get full text
Article -
132
-
133
-
134
Entropic imprints on bioinformatics
Published 2024-12-01“…The entropic framework is a crucial method in statistical inference that helps scientists create models to describe and predict biological systems, particularly complex networks like gene interactions. Its effectiveness comes from its simple concepts and solid mathematical foundation, making it applicable in various situations. …”
Get full text
Article -
135
-
136
-
137
-
138
Topological phases driven by orbital entanglement in Transition Metal Oxide Perovskite interfaces
Published 2024-09-01Get full text
Article -
139
Integrable formulation of the OPE coefficients in the UV limit of the sine-Gordon model
Published 2025-01-01“…This allows one to get an integrable description to some specific ratios of vacuum expectation values in the complex Liouville CFT.…”
Get full text
Article -
140
Permission clustering-based attribute value optimization
Published 2021-08-01“…In new large-scale computing environment, the attributes of entities were massive and they had complex sources and uneven quality, which were great obstacles to the application of ABAC (attribute-based access control).The attributes were also hard to be corrected manually, making it difficult to be applied in access control system straightly.To solve the optimization problem of nominal attributes, a novel algorithm of attribute value optimization based on permission clustering was designed, in which entities were presented by the privilege set related to them.So that the entities were tagged by density-based clustering method with distances of their privilege set presentations.Then the attribute values were reduced and corrected based on rough set theory.Finally, the algorithm was verified on UCI data sets, which proved that after applying it, ABAC policy mining was improved in the evaluation criteria, such as the true positive rate and F1-score.…”
Get full text
Article