Results 121 to 130 of about 2,748,163 (380)

Revolutionizing Wireless Communication with Single Layer Capacitor-Based Antenna Technology [PDF]

open access: yesarXiv
Single Layer Capacitor-Based Antenna Technology introduces a novel approach to address limitations of traditional antenna designs. It leverages the simplicity and efficiency of single-layer capacitors to achieve: Compactness: Enables smaller, discreet devices without compromising performance.
arxiv  

Properties and applications of transversal operators [PDF]

open access: yesarXiv, 2014
This paper presents some properties and applications of "transversal operators". Two transversal operators are presented: a "translation" operator T and a "dilation" operator D. Such operators are used in common analysis systems including Fourier series analysis, Fourier analysis, Gabor analysis, multiresolution analysis (MRA), and wavelet analysis ...
arxiv  

PROGRAM EVALUATION RESEARCH: AN EXPERIMENTAL COST‐EFFECTIVENESS ANALYSIS OF AN ARMED ROBBERY INTERVENTION PROGRAM [PDF]

open access: green, 1979
John F. Schnelle   +5 more
openalex   +1 more source

A non‐fluorescent immunohistochemistry method for measuring autophagy flux using MAP1LC3/LC3 and SQSTM1 as core markers

open access: yesFEBS Open Bio, EarlyView.
We introduce an immunohistochemistry method to measure autophagy flux, highlighting the active degradation and recycling of cellular waste. This cost‐effective approach uses tissue samples to track key markers like LC3 and SQSTM1, revealing how cells maintain health or respond to diseases such as cancer. It bridges the gap between research and clinical
Shahla Shojaei   +6 more
wiley   +1 more source

Universal public finance of tuberculosis treatment in India: an extended cost-effectiveness analysis.

open access: yesHealth Economics, 2015
Universal public finance (UPF)-government financing of an intervention irrespective of who is receiving it-for a health intervention entails consequences in multiple domains.
S. Verguet, R. Laxminarayan, D. Jamison
semanticscholar   +1 more source

Cost-effectiveness analysis of initial HIV treatment under Italian guidelines

open access: yesClinicoEconomics and Outcomes Research, 2011
Giorgio L Colombo1,2, Vincenzo Colangeli3, Antonio Di Biagio4, Sergio Di Matteo2, Claudio Viscoli4, Pierluigi Viale31School of Pharmacy, University of Pavia, Pavia, Italy; 2SAVE - Studi Analisi Valutazioni Economiche, Milan, Italy; 3Clinica Malattie ...
Viale P   +5 more
doaj  

Landscape and challenges in economic evaluations of artificial intelligence in healthcare: a systematic review of methodology

open access: yesBMC Digital Health
Background The potential for artificial intelligence (AI) to transform healthcare cannot be ignored, and the development of AI technologies has increased significantly over the past decade.
Nanna Kastrup   +2 more
doaj   +1 more source

Visualisation of financial time series by linear principal component analysis and nonlinear principal component analysis [PDF]

open access: yesarXiv, 2014
In this dissertation, the main goal is visualisation of financial time series. We expect that visualisation of financial time series will be a useful auxiliary for technical analysis. Firstly, we review the technical analysis methods and test our trading rules, which are built by the essential concepts of technical analysis.
arxiv  

Enhancing transporter activity in heterologous expression systems with SAHA: a 2500‐times more potent and odorless alternative to butyrate

open access: yesFEBS Open Bio, EarlyView.
Heterologous expression of membrane transporters in cultured cells is essential for functional characterization, but is sometimes limited by low activity. Our study compares the HDAC inhibitors butyrate, VPA and SAHA to enhance transport activity. We propose to replace butyrate by SAHA: it is equally effective, devoid of repulsive odor, costs less, and
Svenja Flögel   +4 more
wiley   +1 more source

Type-based Dependency Analysis for JavaScript [PDF]

open access: yesarXiv, 2013
Dependency analysis is a program analysis that determines potential data flow between program points. While it is not a security analysis per se, it is a viable basis for investigating data integrity, for ensuring confidentiality, and for guaranteeing sanitization. A noninterference property can be stated and proved for the dependency analysis. We have
arxiv  

Home - About - Disclaimer - Privacy