Results 51 to 60 of about 6,810,448 (328)

Highs and Lows: A Behavioral and Technical Analysis [PDF]

open access: yesSSRN Electronic Journal, 2007
We find that turnover rises on n-day highs and lows and is an increasing function of n. We offer several explanations from the technical and behavioural finance literature for why traders might use these signals. Turnover is persistent following these events, and new lows provide abnormal returns for up to 6 trading days.
Bruce Mizrach, Susan Weerts
openaire   +4 more sources

KAPTUR: technical analysis report [PDF]

open access: yes, 2012
Led by the Visual Arts Data Service (VADS) and funded by the JISC Managing Research Data programme (2011-13) KAPTUR will discover, create and pilot a sectoral model of best practice in the management of research data in the visual arts in collaboration ...
Garrett, Leigh   +2 more
core  

Mechanisms and kinetic assays of aminoacyl‐tRNA synthetases

open access: yesFEBS Letters, EarlyView.
Accurate protein synthesis is crucial for life. The key players are aminoacyl‐tRNA synthetases (AARSs), which read the genetic code by pairing cognate amino acids and tRNAs. AARSs establish high amino acid selectivity by employing physicochemical limits in molecular recognition.
Igor Zivkovic   +2 more
wiley   +1 more source

Information system for analysis and forecasting of futures markets [PDF]

open access: yes, 2018
We considered different approaches to the analysis and forecasting techniquesof futures markets.We also studied methods of working with the use of technical analysis.
Alekseyev, A.   +5 more
core   +1 more source

ANALYSIS, MANAGEMENT AND TRADE-OFF WITH RISKS OF TECHNICAL FACILITIES [PDF]

open access: yes, 2020
Submitted work “Analysis, management and trade-off with risk of technical facilities“ deals with the all type of risks associated with the technical facilities, particularly with the complex ones, with aim to ensure their safety. It demonstrates the ways
Procházka J., Procházková D.
core  

From omics to AI—mapping the pathogenic pathways in type 2 diabetes

open access: yesFEBS Letters, EarlyView.
Integrating multi‐omics data with AI‐based modelling (unsupervised and supervised machine learning) identify optimal patient clusters, informing AI‐driven accurate risk stratification. Digital twins simulate individual trajectories in real time, guiding precision medicine by matching patients to targeted therapies.
Siobhán O'Sullivan   +2 more
wiley   +1 more source

Technical analysis and the strategy-based portfolio versus random one [PDF]

open access: yesIranian Journal of Finance, 2019
Market participants use different tools basically technical or fundamental analysis to have a higher return in constructing a well-maintained portfolio.
Mohammad Bagher Karimi   +3 more
doaj   +1 more source

Technical Analysis and Liquidity Provision [PDF]

open access: yesReview of Financial Studies, 2002
The apparent conflict between the level of resources dedicated to technical analysis by practitioners and academic theories of market efficiency is a long-standing puzzle. We explore a previously unexamined feature of technical analysis -- namely its relation to liquidity provision.
Kenneth A. Kavajecz   +1 more
openaire   +3 more sources

Ergothioneine supplementation improves pup phenotype and survival in a murine model of spinal muscular atrophy

open access: yesFEBS Letters, EarlyView.
Spinal muscular atrophy (SMA) is a genetic disease affecting motor neurons. Individuals with SMA experience mitochondrial dysfunction and oxidative stress. The aim of the study was to investigate the effect of an antioxidant and neuroprotective substance, ergothioneine (ERGO), on an SMNΔ7 mouse model of SMA.
Francesca Cadile   +8 more
wiley   +1 more source

How to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems [PDF]

open access: yes, 2015
Recently security researchers have started to look into automated generation of attack trees from socio-technical system models. The obvious next step in this trend of automated risk analysis is automating the selection of security controls to treat the ...
Gadyatskaya, Olga
core   +4 more sources

Home - About - Disclaimer - Privacy