Results 41 to 50 of about 1,321,024 (261)

The clinical spectrum of SMA‐PME and in vitro normalization of its cellular ceramide profile

open access: yesAnnals of Clinical and Translational Neurology, Volume 9, Issue 12, Page 1941-1952, December 2022., 2022
Abstract Objective The objectives of this study were to define the clinical and biochemical spectrum of spinal muscular atrophy with progressive myoclonic epilepsy (SMA‐PME) and to determine if aberrant cellular ceramide accumulation could be normalized by enzyme replacement.
Michelle M. Lee   +16 more
wiley   +1 more source

Extreme gravitational lensing in vicinity of Schwarzschild-de Sitter black holes

open access: yes, 2007
We have developed a realistic, fully general relativistic computer code to simulate optical projection in a strong, spherically symmetric gravitational field.
A. Einstein   +12 more
core   +1 more source

GenFloor: Interactive generative space layout system via encoded tree graphs

open access: yesFrontiers of Architectural Research, 2021
Automated floorplanning or space layout planning has been a long-standing NP-hard problem in the field of computer-aided design, with applications in integrated circuits, architecture, urbanism, and operational research.
Mohammad Keshavarzi   +1 more
doaj  

Study the Thermal Effect of Twin Spool on the Dynamic Response and Whirl Orbit Using the Combined Finite Element – Transfer Matrix Method [PDF]

open access: yesEngineering and Technology Journal, 2010
A study of the thermal effect on the critical speed and on the distribution of both the lateral and axial vibrations along the Dual rotor – system are considered .
doaj   +1 more source

Brain magnetic resonance imaging predictors in anti‐N‐methyl‐D‐aspartate receptor encephalitis

open access: yesAnnals of Clinical and Translational Neurology, Volume 9, Issue 12, Page 1974-1984, December 2022., 2022
Abstract Objective Brain magnetic resonance imaging (MRI) findings in anti‐N‐methyl‐D‐aspartate receptor (NMDAR) encephalitis are nonspecific and rarely have obvious associations with clinical characteristics and outcomes. This study aimed to comprehensively describe the MRI features of patients with NMDAR encephalitis, examine their associations with ...
Ying‐Ying Zhao   +8 more
wiley   +1 more source

Adversarial Data Programming: Using GANs to Relax the Bottleneck of Curated Labeled Data

open access: yes, 2018
Paucity of large curated hand-labeled training data for every domain-of-interest forms a major bottleneck in the deployment of machine learning models in computer vision and other fields.
Balasubramanian, Vineeth N, Pal, Arghya
core   +1 more source

A transient inflammatory response contributes to oxaliplatin neurotoxicity in mice

open access: yesAnnals of Clinical and Translational Neurology, Volume 9, Issue 12, Page 1985-1998, December 2022., 2022
Abstract Objectives Peripheral neuropathy is a relevant dose‐limiting adverse event that can affect up to 90% of oncologic patients with colorectal cancer receiving oxaliplatin treatment. The severity of neurotoxicity often leads to dose reduction or even premature cessation of chemotherapy.
Aina Calls   +9 more
wiley   +1 more source

Quantum Programming Made Easy [PDF]

open access: yes, 2019
We present IQu, namely a quantum programming language that extends Reynold's Idealized Algol, the paradigmatic core of Algol-like languages. IQu combines imperative programming with high-order features, mediated by a simple type theory. IQu mildly merges
Paolini, Luca   +2 more
core   +2 more sources

Biosemiotic Entropy of the Genome: Mutations and Epigenetic Imbalances Resulting in Cancer

open access: yesEntropy, 2013
Biosemiotic entropy involves the deterioration of biological sign systems. The genome is a coded sign system that is connected to phenotypic outputs through the interpretive functions of the tRNA/ribosome machinery.
Samuel S. Shepard   +2 more
doaj   +1 more source

{CtChecker}: A Precise, Sound and Efficient Static Analysis for Constant-Time Programming [PDF]

open access: yes
Timing channel attacks are emerging as real-world threats to computer security. In cryptographic systems, an effective countermeasure against timing attacks is the constant-time programming discipline.
Dang, Sixuan, Zhang, Danfeng, Zhou, Quan
core   +1 more source

Home - About - Disclaimer - Privacy