-
1701
Regulation of modular Cyclin and CDK feedback loops by an E2F transcriptionoscillator in the mammalian cell cycle
Published 2011-03-01“…This model is not sensitive to small changes in the parameters used and it reproduces the observed behavior of the transcription factor E2F and different Cyclins in continuous or regulated cycling conditions. …”
Get full text
Article -
1702
Insights into the dependence of post-stroke motor recovery on the initial corticospinal tract connectivity from a computational model
Published 2025-01-01“…In this study, we construct a computational model that reproduces the dependence of post-stroke motor recovery on the initial CST connectivity. …”
Get full text
Article -
1703
Exploring the active and network centralities in Metropolitan Athens: The organic vs. the planned form
Published 2022-04-01“…In this article, we aim to address this gap by the exploring the different centrality aspects of Metropolitan Athens and more specifically by (a) providing a reproducible methodology for identifying active and network centralities, as defined by land-use pattern and space syntax respectively, (b) exploring the geospatial signature of the planned and organic form of Metropolitan Athens as framed by its institutional spatial framework as well as its active and network centrality, respectively, (c) investigating the role of network centrality, in shaping the existing active centrality pattern. …”
Get full text
Article -
1704
Sustainable Development and World Politics
Published 2014-04-01“…The article shows that the dominating state-centric approach reproduces the political model of unsustainable development, which is characterized by archaic prerequisites of political realism, spontaneous formation of system, and growing threats to global security.…”
Get full text
Article -
1705
Developmental defects in ectodermal appendages caused by missense mutation in edaradd gene in the nfr mangrove killifish kryptolebias marmoratus
Published 2025-01-01“…Abstract The mangrove killifish, Kryptolebias marmoratus, can reproduce with self-fertilisation, offering a unique and useful genetic tool for generation of genetic mutants and quick identification of mutated genes. …”
Get full text
Article -
1706
Facile SERS screening of melamine in bovine milk with 2D printed AgNPs/glass fabric filter paper as the flexible substrate
Published 2024-09-01“…Remarkably, the proposed technology was also highly reproducible, showing spot-to-spot and block-to-block variations below 3.3% and 4.9% at 674 cm−1 in Raman intensity, respectively. …”
Get full text
Article -
1707
Reconocimiento y rizoma: Mutatis Mutandis en la escena filosófica
Published 2019-06-01“…La filosofía, para ser filosofía, no se reproduce o no debe reproducirse como una copia de sí misma en otros lugares o momentos; la filosofía, si quiere serlo, es rizomatosa en su generación y producción; salta de un lugar a otro, en cada momento, y allí crece, autónomamente respecto de su origen. …”
Get full text
Article -
1708
Municipios “libres de eucaliptos”: análisis de los actores políticos locales en Galicia
Published 2020-02-01“…Nuestro análisis revela que el ordinario contraste ideológico derecha-izquierda se reproduce en la estructura de valores ligados al eucalipto. …”
Get full text
Article -
1709
Computationally secure steganography based on speech synthesis
Published 2022-06-01“…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
Get full text
Article -
1710
ENERGY ABSORPTION ANALYSIS OF FILAMENT-WOUND CFRP/AL HYBRID THIN-WALLED CIRCULAR TUBE UNDER AXIALLY CRUSHING
Published 2020-01-01“…The simulation results with good agreement with the test were obtained by ABAQUS/Explicit,and the crushing failure behavior of the hybrid tube under quasistatic load was reproduced. Based on the simulation results,it was found that the initial crushing load,average crushing load,specific energy absorption and load efficiency of the mixing tube were increased by 97. 6%,93. 3%,57. 8% and 5. 9%,respectively. compared with the aluminum tube. …”
Get full text
Article -
1711
Deep Recurrent Model for Server Load and Performance Prediction in Data Center
Published 2017-01-01“…Our method provides a new way to reproduce user request sequence to solve this problem by using RNN-LSTM. …”
Get full text
Article -
1712
Pascal Grouiez, Les stratégies des communautés et la régulation sectorielle et territoriale des configurations productives : le cas de l’agroalimentaire russe
Published 2010-12-01“…These agreements allow each actor to maximize his interests according to his power and to reproduce the community to which he belongs to. To defend their individual and collective interests the actors create some legal structures on the land market which prevent the standard capitalism development in the Russian agriculture. …”
Get full text
Article -
1713
Challenges, dilemmas and success criteria of recycling coal mining landscapes
Published 2024-12-01“…The post-mining transformation involves many dilemmas, often arouses land use conflicts and can reproduce environmental injustices. In the background of conflicts are diverging preferences for post-mining land uses from the perspective of various stakeholders. …”
Get full text
Article -
1714
Los movimientos sociales desde la perspectiva feminista: pistas metodológicas para un análisis no androcéntrico de la acción social
Published 2021-01-01“…Obviar estos aspectos produce y reproduce, en la mayoría de los casos, violencia política hacia las mujeres; no obstante, en otros casos abona a invisibilizar el acoso y la violencia sexual experimentados por las mujeres activistas.…”
Get full text
Article -
1715
HPLC Fingerprint Analysis of Rana chensinensis Eggs from Different Habitats and Their Antitussive Effect
Published 2022-01-01“…The validated HPLC method was precise, reproducible, and stable. The HPLC fingerprints of 10 batches of RE samples displayed 31 well-resolved common peaks in the chromatogram. …”
Get full text
Article -
1716
Identidad y fantasma: situando las nuevas prácticas de libertad del movimiento indígena en La Pampa
Published 2007-01-01“…En este artículo sostengo que el actual reconocimiento de los Rankülche reproduce, en el nuevo marco de una identidad provincial pluralista, patrones de (in)visibilización análogos a los que en el pa- sado determinaron el desvanecimiento de esta identidad y, por ende, grupo indígena. …”
Get full text
Article -
1717
Graph convolutional network as a fast statistical emulator for numerical ice sheet modeling
Published 2025-01-01“…When applied to transient simulations of the Pine Island Glacier (PIG), Antarctica, the GCN successfully reproduces ice thickness and velocity with a correlation coefficient of approximately 0.997, outperforming non-graph models, including fully convolutional network (FCN) and multi-layer perceptron (MLP). …”
Get full text
Article -
1718
Can We Trust the Literature on Risk Factors and Triggers for Low Back Pain? A Systematic Review of a Sample of Contemporary Literature
Published 2019-01-01“…Only one study properly reported RFs for the onset of the “disease” of LBP, and four studies were deemed suitable to investigate triggers for a new episode of LBP. No study reproduced the results of other included studies. Conclusion. …”
Get full text
Article -
1719
THE INFLUENCE OF PRACTICE REGIME ON TACTILE PERCEPTUAL DISCRIMINATIVE ABILITY IN VOLEYBALL, BASKETBALL, AND HANDBALL PLAYERS
Published 2012-06-01“…The result of the current study suggest that it would release applications to enhance the learning process and performance technical, if it attained reproduce findings by means of causal studies.…”
Get full text
Article -
1720
L’arbre à Tunis : hypothèses pour une histoire de l’espace public
Published 2012-07-01“…On the other hand, Tunisians fleeing the country and a difficult life in search of better incomes have appropriated adjacent spaces to the capital and have reproduced, as far as possible, their rural way of life.…”
Get full text
Article