Results 81 to 90 of about 228,900 (283)

Tracing the Morphogenesis and Formal Diffusion of Vernacular Mosques: A Typo-Morphological Study of Djebel Amour, Algeria

open access: yesBuildings
The Djebel Amour region, located in the Western Saharan Atlas of Algeria, hosts a vernacular mosque heritage that remains largely unexplored. This study presents the first comprehensive typo-morphological analysis of fourteen mosques dating from the 11th
Sana Mekki   +5 more
doaj   +1 more source

Recovering Architectural Variability of a Family of Product Variants

open access: yes, 2014
A Software Product Line (SPL) aims at applying a pre-planned systematic reuse of large-grained software artifacts to increase the software productivity and reduce the development cost.
Sahraoui, Houari   +2 more
core   +2 more sources

Real-Time, Three-Dimensional Object Detection and Modeling in Construction [PDF]

open access: yes, 2005
This paper describes a research effort directed to produce methods to model three-dimensional scenes of construction field objects in real-time that adds valuable data to construction information management systems, as well as equipment navigation ...
Bosché, Frédéric   +4 more
core   +1 more source

Conserved structural motifs in PAS, LOV, and CRY proteins regulate circadian rhythms and are therapeutic targets

open access: yesFEBS Letters, EarlyView.
Cryptochrome and PAS/LOV proteins play intricate roles in circadian clocks where they act as both sensors and mediators of protein–protein interactions. Their ubiquitous presence in signaling networks has positioned them as targets for small‐molecule therapeutics. This review provides a structural introduction to these protein families.
Eric D. Brinckman   +2 more
wiley   +1 more source

Quantitative Estimation of Missing Value Interpolation Methods for Suomi-NPP VIIRS/DNB Nighttime Light Monthly Composite Images

open access: yesIEEE Access, 2020
Composited nighttime light (NTL) data are widely used to evaluate the intensity of human activities and estimate urban dynamics. However, due to the effects of stray light, Visible Infrared Imaging Radiometer Suite (VIIRS) monthly composited data are ...
Junfu Fan   +5 more
doaj   +1 more source

The building information modeling for the retrofitting of existing buildings. A case study in the University of Cagliari. [PDF]

open access: yes, 2018
Italy's very consistent buildings stock has become the major field for real estate investments and for the related projects and actions. The urge of working on built environment is however facing some crucial issues.
Chiara Tagliabue, Lavinia   +6 more
core   +1 more source

Rationale Management Challenges in Requirements Engineering [PDF]

open access: yes, 2010
Rationale and rationale management have been playing an increasingly prominent role in software system development mainly due to the knowledge demand during system evaluation, maintenance, and evolution, especially for large and complex systems.
Avgeriou, Paris,   +2 more
core   +3 more sources

In situ molecular organization and heterogeneity of the Legionella Dot/Icm T4SS

open access: yesFEBS Letters, EarlyView.
We present a nearly complete in situ model of the Legionella Dot/Icm type IV secretion system, revealing its central secretion channel and identifying new components. Using cryo‐electron tomography with AI‐based modeling, our work highlights the structure, variability, and mechanism of this complex nanomachine, advancing understanding of bacterial ...
Przemysław Dutka   +11 more
wiley   +1 more source

AIGC-Driven HBIM modeling of dougong components for the Conservation of Qing dynasty architectural heritage

open access: yesJournal of Asian Architecture and Building Engineering
This paper addresses the prominent issues of large workload in the 3D digital modeling of ancient Chinese wooden architectural components and the difficulty in achieving the dynamic inheritance of craftsmanship. It proposes a digital translation path for
Jun Cai   +6 more
doaj   +1 more source

A Model-Based Approach to Security Analysis for Cyber-Physical Systems

open access: yes, 2018
Evaluating the security of cyber-physical systems throughout their life cycle is necessary to assure that they can be deployed and operated in safety-critical applications, such as infrastructure, military, and transportation.
Bakirtzis, Georgios   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy