Results 1 to 10 of about 22,597 (261)

Double and triple summation expressions obtained using perturbation theory [PDF]

open access: yesInternational Journal of Mathematics and Mathematical Sciences, 2000
Using standard perturbation theory, simple new double and triple summation expressions are obtained.
Harry A. Mavromatis
doaj   +2 more sources

SIMD: Synergistic integration mutualistic platform based on single-cell and proteotranscriptomics for drug repositioning [PDF]

open access: yesnpj Breast Cancer
This study aimed to introduce a synergistic integration platform based on single-cell and proteotranscriptomics for drug repositioning (SIMD) to repurpose breast cancer drug candidates by considering the bidirectional nature of molecular dynamics in ...
Soo Youn Lee   +3 more
doaj   +2 more sources

LOW-TEMPERATURE EQUATION OF STATE OF SOLID METHANE [PDF]

open access: yesHolodilʹnaâ Tehnika i Tehnologiâ, 2016
The theoretical equation of state for solid methane, developed within the framework of perturbation theory, with the crystal consisting of spherical molecules as zero-order approximation, and octupole – octupole interaction of methane molecules as a ...
L. N. Yakub, O. S. Bodiul
doaj   +3 more sources

On the triple-Pomeron vertex in perturbative QCD [PDF]

open access: yesThe European Physical Journal C, 2003
24 pages, 4 ...
Bartels, J., Ryskin, M. G., Vacca, G. P.
openaire   +2 more sources

Characterization of Neurospora crassa GH16, GH17, and GH72 gene families of cell wall crosslinking enzymes

open access: yesThe Cell Surface, 2022
GH16 chitin transferases, GH17 β-1,3-glucan transferases, and GH72 β-1,3-glucan/lichenin transferases are important fungal cell wall crosslinking enzymes.
Pavan Patel, Stephen J. Free
doaj   +1 more source

Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination

open access: yes网络与信息安全学报
With the development of cloud computing and internet of things technology, verifiable computing has been widely used as a new computing technology. While verifiable computing brings convenience to users, there are also security challenges: data privacy ...
Tianpeng ZHANG, Zhiyu REN, Xuehui DU, Haichao WANG
doaj   +5 more sources

Triple Junction Solutions for a Singularly Perturbed Neumann Problem [PDF]

open access: yesSIAM Journal on Mathematical Analysis, 2011
We consider the singularly perturbed Neumann problem $\varepsilon^2 \Delta u -u +u^p = 0$, $u>0$ in $\Omega$, ${\partial u \over \partial \nu}=0$ on $\partial \Omega$, where $p>1$ and $\Omega$ is a smooth and bounded domain in $\mathbb{R}^2$. We construct a class of solutions which consist of large number of spikes concentrated on three line segments ...
Ao, Weiwei, Musso, Monica, Wei, Juncheng
openaire   +4 more sources

Chaotic Behavior of the Zakharov-Kuznetsov Equation with Dual-Power Law and Triple-Power Law Nonlinearity

open access: yesAppliedMath, 2022
The main idea of this paper is to study the chaotic behavior of Zakharov–Kuznetsov equation with perturbation. By taking the traveling wave transformation, we transform the perturbed Zakharov–Kuznetsov equation with dual-power law and triple-power law ...
Yaxi Li, Yue Kai
doaj   +1 more source

3-Bromopyruvate-mediated MCT1-dependent metabolic perturbation sensitizes triple negative breast cancer cells to ionizing radiation

open access: yesCancer & Metabolism, 2021
Background Triple negative breast cancer (TNBC) poses a serious clinical challenge as it is an aggressive form of the disease that lacks estrogen receptor, progesterone receptor, and ERBB2 (formerly HER2) gene amplification, which limits the treatment ...
Irini Skaripa-Koukelli   +9 more
doaj   +1 more source

Monochromatic Schur Triples in Randomly Perturbed Dense Sets of Integers [PDF]

open access: yesSIAM Journal on Discrete Mathematics, 2019
6 ...
Elad Aigner-Horev, Yury Person
openaire   +2 more sources

Home - About - Disclaimer - Privacy