Results 51 to 60 of about 285,724 (323)
Combining ability analysis for yield and its component traits in Blackgram (Vigna mungo (L.) Hepper) [PDF]
A diallele analaysis of 8 x 8 was studied in black gram (Vigna mungo) with a view to understand the combining ability, nature of gene action andpotential for the exploitation of heterosis using nine quantitative characters viz., days to first flower ...
Y.Anbu Selvam and R.Elangaimannan
doaj
Remote Assessment of Ataxia Severity in SCA3 Across Multiple Centers and Time Points
ABSTRACT Objective Spinocerebellar ataxia type 3 (SCA3) is a genetically defined ataxia. The Scale for Assessment and Rating of Ataxia (SARA) is a clinician‐reported outcome that measures ataxia severity at a single time point. In its standard application, SARA fails to capture short‐term fluctuations, limiting its sensitivity in trials.
Marcus Grobe‐Einsler +20 more
wiley +1 more source
Genetics and crop improvement aspects of medicinal plants in Ashwagandha should be taken consideration to meet the accelerating pharmaceutical demands.
Adithya P Balakrishnan1*, N. B. Patel1, M. P. Patel2, P. C. Patel1 and S. D. Solanki1
doaj +1 more source
Saddle-Node Bifurcation to Jammed State for Quasi-One-Dimensional Counter Chemotactic Flow [PDF]
The transition of a counter chemotactic particle flow from a free-flow state to a jammed state in a quasi-one-dimensional path is investigated. One of the characteristic features of such a flow is that the constituent particles spontaneously form a ...
Awazu, Akinori +2 more
core +3 more sources
A Q‐Learning Algorithm to Solve the Two‐Player Zero‐Sum Game Problem for Nonlinear Systems
A Q‐learning algorithm to solve the two‐player zero‐sum game problem for nonlinear systems. ABSTRACT This paper deals with the two‐player zero‐sum game problem, which is a bounded L2$$ {L}_2 $$‐gain robust control problem. Finding an analytical solution to the complex Hamilton‐Jacobi‐Issacs (HJI) equation is a challenging task.
Afreen Islam +2 more
wiley +1 more source
Secure and Efficient RNS Approach for Elliptic Curve Cryptography [PDF]
Scalar multiplication, the main operation in elliptic curve cryptographic protocols, is vulnerable to side-channel (SCA) and fault injection (FA) attacks.
Batina, Lejla +3 more
core
Scattering Rule in Soliton Cellular Automaton associated with Crystal Base of $U_q(D_4^{(3)})$
In terms of the crystal base of a quantum affine algebra $U_q(\mathfrak{g})$, we study a soliton cellular automaton (SCA) associated with the exceptional affine Lie algebra $\mathfrak{g}=D_4^{(3)}$.
Baxter R. J. +6 more
core +1 more source
Multiple Twinning in Nacre and Aragonite
Electron backscatter diffraction map of a cluster of geologic aragonite, exhibiting single, double, and triple twins. The whole cluster is approximately 2 cm wide. Colors indicate crystal orientations, so that pixels where the a‐, b‐, and c‐axis is perpendicular to the image plane are green, red, and blue, respectively.
Connor A. Schmidt +7 more
wiley +1 more source
Nitrogen oxides and particulate matter are the two main pollutants emitted by diesel locomotive exhaust. It is an effective measure to control urban air pollution to monitor the exhaust emission of diesel locomotives by using the vehicle exhaust gas ...
Lv Yingming, Yuan Wenping
doaj +1 more source

