Results 101 to 110 of about 482,791 (290)
Imposing and testing curvature conditions on a Box-Cox function [PDF]
We present a new method for imposing and testing concavity of a cost function using asymptotic least squares, which can easily be implemented even for cost functions which are nonlinear in parameters.
Falk, Martin +2 more
core
Circuit configurations which can/cannot show super-radiant phase transitions
Several superconducting circuit configurations are examined on the existence of super-radiant phase transitions (SRPTs) in thermal equilibrium. For some configurations consisting of artificial atoms, whose circuit diagrams are however not specified, and ...
Bamba, Motoaki, Imoto, Nobuyuki
core +1 more source
An Innovative Design of Substitution Box Using Trigonometric Transformation
As the number of hacking events and cyber threats keeps going up, it is getting harder and harder to communicate securely and keep personal information safe on the Internet. Cryptography is a very important way to deal with these problems because it can secure data by changing it from one form to another.
Ishaq, Kashif, Qarni, Awais Ahmed
openaire +2 more sources
KDM7A and KDM1A inhibition suppresses tumour promoting pathways in prostate cancer
Treatment resistance is a major challenge for patients with advanced prostate cancer. This study examined an alternative approach to target the major prostate cancer‐promoting pathway by targeting epigenetic factors, whose levels are higher in tumours.
Jennie N Jeyapalan +16 more
wiley +1 more source
We analyze cisplatin–DNA adducts (CDAs) and double‐strand breaks (DSBs) in a cell‐cycle‐dependent manner. We find that CDAs form similarly across all cell cycle phases. DSBs arise only in S‐phase. CDAs might not directly impair DSB repair, but S‐phase DSB lesions evolve in the presence of CDAs and disrupt repair in G2, also causing radiosensitization ...
Ye Qiu +10 more
wiley +1 more source
S-Boxهای پویای وابسته به کلید سبک وزن مبتنی بر ابرخم بیضوی برای دستگاه¬های اینترنت اشیا
Security is one of the main issues in Internet of Things (IoT). Encryption plays a curtail role in making these systems secure. Substitution Box (S-Box) has an effective impact in block encryption methods. Due to the restricted resource capacities of IoT
پروانه اصغری +1 more
doaj
Dynamical properties of almost repetitive Delone sets
We consider the collection of uniformly discrete point sets in Euclidean space equipped with the vague topology. For a point set in this collection, we characterise minimality of an associated dynamical system by almost repetitivity of the point set.
Frettlöh, Dirk, Richard, Christoph
core +1 more source
Hijacking emergency granulopoiesis: Neutrophil ontogeny and reprogramming in cancer
Neutrophils are highly plastic innate immune cells; their functions in cancer extend beyond the tumour microenvironment. This Review summarises current understanding of neutrophil maturation and heterogeneity and highlights tumour‐induced granulopoiesis as a systemic programme that expands immature, immunosuppressive neutrophils via tumour‐derived ...
Gabriela Marinescu, Yi Feng
wiley +1 more source
Block Cipher's Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knight's Tour Chain. [PDF]
Khan MF +5 more
europepmc +1 more source
The Propagation of Financial Extremes [PDF]
What drives extreme economic events? Motivated by recent theory, and events in US subprime markets, we begin to open the black box of extremes. Specifically, we extend standard economic analysis of extreme risk, allowing for dynamics and endogeneity.
Chollete, Lorán
core

