Results 41 to 50 of about 457,600 (272)

Proposed shunt rounding technique for large-scale security constrained loss minimization [PDF]

open access: yes, 2010
The official published version can be obtained from the link below - Copyright @ 2010 IEEE.Optimal reactive power flow applications often model large numbers of discrete shunt devices as continuous variables, which are rounded to their nearest discrete ...
Hurlock, P   +4 more
core   +1 more source

Network divergence analysis identifies adaptive gene modules and two orthogonal vulnerability axes in pancreatic cancer

open access: yesMolecular Oncology, EarlyView.
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson   +9 more
wiley   +1 more source

Tensor Arithmetic, Geometric and Mathematic Principles of Fluid Mechanics in Implementation of Direct Computational Experiments

open access: yesEPJ Web of Conferences, 2016
The architecture of a digital computing system determines the technical foundation of a unified mathematical language for exact arithmetic-logical description of phenomena and laws of continuum mechanics for applications in fluid mechanics and ...
Bogdanov Alexander, Khramushin Vasily
doaj   +1 more source

penalty methods and some applications of mathematical programming [PDF]

open access: yes, 1975
The problem of minimization of the convex function F : Rn → R on the convex solid compact set Ω ⊂ Rn is under consideration.
openaire   +1 more source

Writing Reusable Digital Geometry Algorithms in a Generic Image Processing Framework

open access: yes, 2012
Digital Geometry software should reflect the generality of the underlying mathe- matics: mapping the latter to the former requires genericity. By designing generic solutions, one can effectively reuse digital geometry data structures and algorithms.
J. Cousty   +5 more
core   +1 more source

Overview of molecular signatures of senescence and associated resources: pros and cons

open access: yesFEBS Open Bio, EarlyView.
Cells can enter a stress response state termed cellular senescence that is involved in various diseases and aging. Detecting these cells is challenging due to the lack of universal biomarkers. This review presents the current state of senescence identification, from biomarkers to molecular signatures, compares tools and approaches, and highlights ...
Orestis A. Ntintas   +6 more
wiley   +1 more source

Decision Support Tools for Electricity Retailers, Wind Power and CHP Plants Using Probabilistic Forecasts

open access: yesInternational Journal of Sustainable Energy Planning and Management, 2015
This paper reviews a number of applications of optimization under uncertainty in energy markets resulting from the research project ENSYMORA. A general mathematical formulation applicable to problems of optimization under uncertainty in energy markets is
Marco Zugno   +2 more
doaj   +1 more source

Maritime Supply Chain Optimization by Using Fuzzy Goal Programming

open access: yesAlgorithms, 2021
Fuzzy goal programming has important applications in many areas of supply chain, logistics, transportation and shipping business. Business management has complications, and there exist many interactions between the factors of its components.
Bekir Sahin   +3 more
doaj   +1 more source

Chameleon sequences reveal structural effects in proteins representing micelle‐like distribution of hydrophobicity

open access: yesFEBS Open Bio, EarlyView.
Amino acids sequence of two different proteins with the same sequence (chameleon sequence—black boxes) represent in 3D structure of the proteins different secondary structures: HHHH—helical and BBB—Beta‐structural. The chains folded in water environment adopt different III‐order structures in which the chameleon fragments appear to adopt similar status
Irena Roterman   +4 more
wiley   +1 more source

Network problems & algorythms [PDF]

open access: yes, 1994
Special structure linear programming problems have received considerable attention during the last two decades and among them network problems are of particular importance and have found numerous applications in manage- ment science and technology.
Djannaty, F, Dowman, KD
core  

Home - About - Disclaimer - Privacy