Results 31 to 40 of about 3,861,121 (287)

A Categorical Model for the Virtual Braid Group [PDF]

open access: yes, 2011
This paper gives a new interpretation of the virtual braid group in terms of a strict monoidal category SC that is freely generated by one object and three morphisms, two of the morphisms corresponding to basic pure virtual braids and one morphism ...
Kauffman, Louis H., Lambropoulou, Sofia
core   +2 more sources

Virtual Actuators with Virtual Sensors [PDF]

open access: yesProceedings of the Institution of Mechanical Engineers, Part I: Journal of Systems and Control Engineering, 2005
The virtual actuator approach to bond graph based control is extended to use virtual sensor inputs; this allows relative degree conditions on the controller to be relaxed. Furthermore, the effect of the transfer system can be eliminated from the closed-loop system. Illustrative examples are given.
openaire   +1 more source

Realising intelligent virtual design [PDF]

open access: yes, 2006
This paper presents a vision and focus for the CAD Centre research: the Intelligent Design Assistant (IDA). The vision is based upon the assumption that the human and computer can operate symbiotically, with the computer providing support for the human ...
Duffy, A.H.B., Whitfield, R.I., Wu, Z.
core  

Preferences of Pediatric Patients and Their Caregivers for Chemotherapy‐Induced Nausea and Vomiting Control Endpoints: A Mixed Methods Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Although not always achieved, complete chemotherapy‐induced nausea and vomiting (CINV) control is the conventional goal of CINV prophylaxis. In this two‐center, mixed‐methods study, we sought to understand the preferences of adolescent patients and family caregivers for CINV control endpoints.
Haley Newman   +8 more
wiley   +1 more source

Post-quake call for action: developing core competencies matrix for Syrian health workers in emergency time

open access: yesConflict and Health
Background The recent earthquake in Syria has caused widespread devastation, leading to extensive damage and loss of life. Considering the diverse range of disasters and conflicts that have affected Syrian society, health workers must possess essential ...
Hani Saeed   +8 more
doaj   +1 more source

A bioinformatics workflow for detecting signatures of selection in genomic data

open access: yesFrontiers in Genetics, 2014
The detection of signatures of selection is now possible on a genome-wide scale in many plant and animal species, and can be performed in a population-specific manner due to the wealth of per-population genome-wide genotype data that is available.
Murray eCadzow   +11 more
doaj   +1 more source

The performance management of education services staff in Scottish local authorities: an evaluation [PDF]

open access: yes, 2003
Investigates the extent to which Scottish local authorities measured the performance of education services ...
Livingston, Kay   +2 more
core  

Virtual Photon Structure Functions [PDF]

open access: yes, 2002
We discuss the perturbatively calculable virtual photon structure functions. First we present the framework for analyzing the structure functions of the virtual photon and derive a first moment of $g_1^\gamma$ of the virtual photon.
Bass   +10 more
core   +2 more sources

Blinatumomab Utilization in Pediatric B‐Cell Acute Lymphoblastic Leukemia: Experience From the Mountain West

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Blinatumomab is a bispecific T‐cell engager approved for the treatment of pediatric B‐cell acute lymphoblastic leukemia (B‐ALL). Outpatient home infusion reduces hospitalization burden and optimizes resource utilization, but is logistically challenging.
Angela Parra del Riego   +10 more
wiley   +1 more source

Autonomous password generation and setting system with cosmic coding and transfer (COSMOCAT) and cosmic time calibrator (CTC)

open access: yesScientific Reports
As wireless sensor networks (WSNs) with Internet of Things (IoT) devices become increasingly widespread and more complex, the threat of cyber-attacks is also increasing.
Hiroyuki K. M. Tanaka   +9 more
doaj   +1 more source

Home - About - Disclaimer - Privacy