Suggested Topics within your search.
Suggested Topics within your search.
-
2421
A compound-target pairs dataset: differences between drugs, clinical candidates and other bioactive compounds
Published 2024-10-01“…Abstract Providing a better understanding of what makes a compound a successful drug candidate is crucial for reducing the high attrition rates in drug discovery. …”
Get full text
Article -
2422
Desktop Software for Patch-Clamp Raw Binary Data Conversion and Preprocessing
Published 2011-01-01“…The real-time data loading technique and optimized memory management programming makes PCDReader a fast and efficient tool. The compiled software along with the source code of the clsPulseData class module is freely available to academic and nonprofit users.…”
Get full text
Article -
2423
What do we mean when we talk about constituency service? A scoping literature review of four decades of research
Published 2024-12-01“…These questions are answered using a dataset that codes each study along several dimensions tapping into conceptualization, research design, explanatory factors, and effects. …”
Get full text
Article -
2424
Investigation of a combined gas-steam system with flue gas recirculation
Published 2016-06-01“…Parametric equations are solved in a purpose-built mathematical model of the system using the Ebsilon Professional code. Recirculated flue gases from the heat recovery boiler outlet, after being cooled and dried, are fed together with primary air into the mixer and then into the gas turbine compressor. …”
Get full text
Article -
2425
V- Model untuk Pengembangan Sistem Informasi Manajemen Ruang Rapat
Published 2020-02-01“…Convenient access for meeting room information will make searching activities for the meeting room availability in an organization easier. …”
Get full text
Article -
2426
A Woman’s Perspective on Circassian folk culture: Results of an Interview
Published 2024-10-01“…Based on the data obtained using the in-depth interview method through a semi-structured interview form, analyses were conducted on the perception of women in the Circassian culture. The categories and codes that emerged from the analyses were treated separately and an attempt was made to make sense of them. …”
Get full text
Article -
2427
Le Falstaff de Manfredo Maggioni et Michael Balfe : façonner un opéra italien pour le public anglais
Published 2011-12-01“…Not only is it sung in Italian but it also respects the structural codes, vocal and scenic practices which make it recognizable as an opera buffa on the aesthetic stage of the time, and above all on the English stage. …”
Get full text
Article -
2428
THE REASON AND FIELD OF APPLICATION REGARDING ART. 118 PARA. (3) OF EMERGENCY ORDINANCE NO. 195/2002
Published 2018-05-01“…Therefore, if the police body does not make the entries in the driving record as soon as it is notified on the existence and content of a complaint of violation, we can find ourselves under the scope of the provisions of art. 335 para. (2) of the Criminal Code, namely driving a vehicle without driving license. …”
Get full text
Article -
2429
Study of gas pipelines cracks using transmission and Compton scattering
Published 2021-07-01“…In this study, the MCNP-X code is used to perform the simulations, in order to develop a counting geometry. …”
Get full text
Article -
2430
Efficient slice anomaly detection network for 3D brain MRI Volume.
Published 2025-06-01“…Current anomaly detection methods excel with benchmark industrial data but struggle with natural images and medical data due to varying definitions of 'normal' and 'abnormal.' This makes accurate identification of deviations in these fields particularly challenging. …”
Get full text
Article -
2431
Exploring the Cybercrime Prevention Campaign on Twitter: Evidence from the Indonesian Government
Published 2023-06-01“… Cybercrime in Indonesia has recently become a significant problem in line with the increase in internet users, which is a serious issue among online community networks. Therefore, this makes government authorities strive to take preventive measures to prevent the spread of cybercrime. …”
Get full text
Article -
2432
Thoughts on the selection of the appropriate simulation models in building performance assessment
Published 2022-12-01“…Simulation can be employed for multiple purposes, including but not limited to building design support, building systems configuration, and code compliance demonstration. It has been suggested that the level of detail and resolution of simulation models must match their deployment purpose. …”
Get full text
Article -
2433
Transfer learning of neural operators for partial differential equations based on sparse network λ-FNO.
Published 2025-01-01“…Our model and data generation code can get through https://github.com/Xumouren12/TL-FNO.…”
Get full text
Article -
2434
Topometry Optimization of Energy Absorbing Structure through Targeting Force-Displacement Method considering Tailor Rolled Blank Process
Published 2022-01-01“…Firstly, a uniform thickness constraint is introduced to make the designed structure have constant thickness distribution along desired direction; topometry optimization is carried out to use TFD method. …”
Get full text
Article -
2435
How to relieve teething syndrome in babies
Published 2021-07-01“…The pediatrician must make sure that the child does not have ARVI, acute intestinal infection and a number of other pathological conditions, up to such serious ones as pneumonia, pyelonephritis and acute meningitis. …”
Get full text
Article -
2436
Power of the Legend: the Tale of Sloven and Rus in Russian Chronicles of the 17th Century
Published 2022-03-01“…The fact that the attempt remake the tale in a scholarly way and to integrate it into the chronographic text was unique and unsuccessful makes us think that ancient scribes and readers of their works, like M.V. …”
Get full text
Article -
2437
Iris Recognition System Based on Wavelet Transform
Published 2009-07-01“…Most iris recognition systems make use of a band pass decomposition of the iris image to create a biometric template. …”
Get full text
Article -
2438
Integrity of Best-Answer Assignments in Large Enrollment Classes; the role of Compulsory Attribution
Published 2024-12-01“…The method secures compulsory attribution of digital solutions using meta-data, access controls, and extensible code available in many common applications, including Microsoft Office. …”
Get full text
Article -
2439
Integrity of Best-Answer Assignments in Large Enrollment Classes; the role of Compulsory Attribution
Published 2024-12-01“…The method secures compulsory attribution of digital solutions using meta-data, access controls, and extensible code available in many common applications, including Microsoft Office. …”
Get full text
Article -
2440
Shape optimization using a level set based mesh evolution method: an overview and tutorial
Published 2023-10-01“…In the second part of this article, we propose a simple albeit efficient python-based implementation of this framework. The code is described with a fair amount of details, and it is expected that the reader can easily elaborate upon the presented examples to tackle his own problems.…”
Get full text
Article