Results 41 to 50 of about 2,190,498 (300)
The article describes the grammar of order of inflectional affixes of participle in the Kalmyk language. Under the model of inflectional affixes we understand an abstract scheme under which a real inflectional chain with respect to the laws of morpho ...
Victoriya Kukanova
doaj +1 more source
The comprehensive evaluation of strategies for decarbonizing large‐scale energy systems requires insights from many different perspectives. In energy systems analysis, optimization models are widely used for this purpose.
Karl‐Kiên Cao +9 more
doaj +1 more source
Two-Dimensional Automatic Mesh Generator for Finite Element Analysis [PDF]
In this study a new automatic mesh generator for 2- dimensional finite element analysis is proposed, and its effectivity is surveyed through a number of test examples. Proposed one is for a micro-computer, and the program is written in BASIC.
Kajitani, Eiji +2 more
core +1 more source
Cell wall target fragment discovery using a low‐cost, minimal fragment library
LoCoFrag100 is a fragment library made up of 100 different compounds. Similarity between the fragments is minimized and 10 different fragments are mixed into a single cocktail, which is soaked to protein crystals. These crystals are analysed by X‐ray crystallography, revealing the binding modes of the bound fragment ligands.
Kaizhou Yan +5 more
wiley +1 more source
Automatic Complexity Analysis [PDF]
We consider the problem of automating the derivation of tight asymptotic complexity bounds for solving Horn clauses. Clearly, the solving time crucially depends on the "sparseness" of the computed relations. Therefore, our asymptotic runtime analysis is accompanied by an asymptotic sparsity calculus together with an asymptotic sparsity analysis.
Flemming Nielson +2 more
openaire +1 more source
Automatic analysis of distance bounding protocols [PDF]
Distance bounding protocols are used by nodes in wireless networks to calculate upper bounds on their distances to other nodes. However, dishonest nodes in the network can turn the calculations both illegitimate and inaccurate when they participate in ...
Bruhadeshwar, Bezawada +2 more
core
Structural insights into an engineered feruloyl esterase with improved MHET degrading properties
A feruloyl esterase was engineered to mimic key features of MHETase, enhancing the degradation of PET oligomers. Structural and computational analysis reveal how a point mutation stabilizes the active site and reshapes the binding cleft, expading substrate scope.
Panagiota Karampa +5 more
wiley +1 more source
Characterizing driving behavior using automatic visual analysis
In this work, we present the problem of rash driving detection algorithm using a single wide angle camera sensor, particularly useful in the Indian context.
Haloi, Mrinal, Jayagopi, Dinesh Babu
core +1 more source
The ubiquitin ligase RNF115 is required for the clearance of damaged lysosomes
Upon lysosomal rupture, an E3 ubiquitin ligase RNF115 translocates from the cytosol to the damaged lysosomal membrane. Moreover, RNF115 depletion impairs the clearance of damaged lysosomes, identifying it as a key regulator of lysosomal quality control.
Sae Nakanaga +3 more
wiley +1 more source
Judgment Method for Maintenance Accessibility Based on Human Visual Range in Virtual Environment
Visibility and accessibility are two key elements in the qualitative analysis of maintainability and cover most work of such qualitative analysis. At present, visibility and accessibility are analyzed by virtual maintenance technology, which greatly ...
Jie Geng +5 more
doaj +1 more source

