-
2921
AnVILWorkflow: A runnable workflow package for Cloud-implemented bioinformatics analysis pipelines [version 1; peer review: 2 approved]
Published 2024-10-01“…However, utilizing the full capabilities of AnVIL can be challenging for researchers without extensive bioinformatics expertise, especially for executing complex workflows. We present the AnVILWorkflow R package, which enables the convenient execution of bioinformatics workflows hosted on AnVIL directly from an R environment. …”
Get full text
Article -
2922
Immediate Implant Therapy with Full-Digital Workflow to Replace a Central Incisor
Published 2025-02-01“…<b>Results:</b> This digital approach allowed accurate planning and allowed the efficient execution of a technique-sensitive procedure such as immediate implant placement, thus providing an esthetic and functional solution while minimizing treatment time. …”
Get full text
Article -
2923
-
2924
RBEDH: A Decentralized Role-Based Event Driven Hybrid Framework for Smart Contracts
Published 2025-01-01“…Functionality test was conducted using Ganache, Ropsten, and Ethereum Mainnet. …”
Get full text
Article -
2925
Learning selection-based augmented reality interactions across different training modalities: uncovering sex-specific neural strategies
Published 2025-04-01“…We analyzed brain activation and functional connectivity using functional near-infrared spectroscopy during the evaluation phase. …”
Get full text
Article -
2926
A Four-Component Domino Reaction: An Eco-Compatible and Highly Efficient Construction of 1,8-Naphthyridine Derivatives, Their In Silico Molecular Docking, Drug Likeness, ADME, and...
Published 2021-01-01“…The simplicity of execution, readily available substrates, high yields, excellent functional group tolerance, scalability, and good scores of environmental parameters make this synthetic strategy more sustainable and worthy of further attention. …”
Get full text
Article -
2927
TAXATION SYSTEM AT INTRA PRODUCTION LEVEL
Published 2006-08-01“…This system promotes to efficient functioning of intra-production economical relations.The paper provides possible variants of formation of taxation payments and assignments for an enterprise and its structural sub-divisions.…”
Get full text
Article -
2928
Paul Tillich, s Position on Visual Arts and Architecture
Published 2016-06-01“…The thinker solves the dual functional-symbolical nature of architecture by sanctioning the contradiction between symbolical tradition and symbolical spontaneity in architecture. …”
Get full text
Article -
2929
Efficient Multiple Imputation for Diverse Data in Python and R: MIDASpy and rMIDAS
Published 2023-10-01“…We provide a detailed guide to these functionalities and demonstrate their usage on a large real dataset. …”
Get full text
Article -
2930
Data access control policy of encrypted deduplication system
Published 2020-05-01“…To solve the problem that convergent encryption was commonly used in existing encrypted deduplication systems in cloud storage and data owner couldn’t effectively enforce access control on their outsourced data,an encrypted deduplication system was proposed to support access control functions such as identity authentication,authorization deduplication and the update of access control policy.The outsourced data was only deduplicated with the authorized users,and the unauthorized users couldn’t obtain any data information.CP-ABE and the partition of the ElGamal private key were used to update the access control policy of data.Self-control objects was used to encapsulate user’s data and its access policy,providing authentication for data visitors and ensuring the access control policies enforced effectively.Security analysis and simulation results demonstrate that the proposed system enables data access control and executes efficiently.…”
Get full text
Article -
2931
THE POPULATION'S ECONOMIC EDUCATION IN THE ROMANIAN ACTUALITY
Published 2014-11-01“…This paper aims at to present the essence and the role of economic education related to the natural movement of a functioning market economy in the Romanian actuality. …”
Get full text
Article -
2932
BUSINESS PROCESS MANAGEMENT (BPM) IN STRATEGIC MANAGEMENT
Published 2015-06-01“…Within operational intelligence we offer metrics of the four main functional goals.…”
Get full text
Article -
2933
Designing of Loss Optimum Regulator for Control of D.C. Electric Drive with Varying Inertia Moment in CoDeSys Programming System
Published 2009-06-01“…The given software is the most suitable for simulation and development of control system algorithms and execution of semi-full-scale tests without involvement of an actual object. …”
Get full text
Article -
2934
Specific Features of Management in Setting-Up and Developing Nich Organizations
Published 2021-02-01“…The article studies general and particular characteristics of two Russian companies functioning in the segment of organic food. The author analyzed companies ‘VkusVill’ and ‘EcoNiva’, one of them is a trade company and the other is an agro-industrial company, which lately is moving towards retail. …”
Get full text
Article -
2935
Research on path planning of mobile robot in complex environment
Published 2025-04-01“…The proposed algorithm improves search efficiency and accuracy by segmenting the path planning process into distinct stages, applying different heuristic functions at each stage, and integrating an artificial potential field to guide traversal, reducing unnecessary node exploration. …”
Get full text
Article -
2936
JEREMIAH 51:15-19 (MT):
Published 2018-12-01“…It paradoxically functions as a link between these oracles and those against Judah. …”
Get full text
Article -
2937
Costs for accounting outsourcing as accounting object
Published 2017-08-01“…The types of outsourcing are described in accordance with the functions transferred, that should be taken into account when reflecting the transactions accompanying the implementation of the contract for outsourcing. …”
Get full text
Article -
2938
Data access control policy of encrypted deduplication system
Published 2020-05-01“…To solve the problem that convergent encryption was commonly used in existing encrypted deduplication systems in cloud storage and data owner couldn’t effectively enforce access control on their outsourced data,an encrypted deduplication system was proposed to support access control functions such as identity authentication,authorization deduplication and the update of access control policy.The outsourced data was only deduplicated with the authorized users,and the unauthorized users couldn’t obtain any data information.CP-ABE and the partition of the ElGamal private key were used to update the access control policy of data.Self-control objects was used to encapsulate user’s data and its access policy,providing authentication for data visitors and ensuring the access control policies enforced effectively.Security analysis and simulation results demonstrate that the proposed system enables data access control and executes efficiently.…”
Get full text
Article -
2939
Fractional-Order Epidemic Model for Measles Infection
Published 2024-01-01“…Furthermore, we construct appropriate Lyapunov functions to establish the global asymptotic stability of the disease-free and endemic equilibrium points. …”
Get full text
Article -
2940
Modification of BJT using Artificial Neural Network and implemented it on FPGA
Published 2015-03-01“…The use of this type of networks led to improve the pre specified functions, by widening its bandwidth, improving its sensitivity to the minimum and maximum values of input signals, and reduce the effect of the rise of the temperature on its performance. …”
Get full text
Article