Suggested Topics within your search.
Suggested Topics within your search.
-
27641
Factorization for jet production in heavy-ion collisions
Published 2025-10-01“…Within this framework, we derive a novel factorization formula for inclusive jet production, expressed as a series expansion with an increasing number of radiating subjet functions that encode forward scattering with the Quark-Gluon Plasma, convolved with perturbative matching coefficients. …”
Get full text
Article -
27642
Stenting of precerebral arteries in acute period of ischemic stroke
Published 2017-12-01“…The study aimed to raise an efficacy of motor functions after stenting of precerebral arteries in acute period of ischemic stroke in patients of elderly and senile age. …”
Get full text
Article -
27643
Dirichlet type extensions of Euler sums
Published 2023-09-01“…In this paper, we study the alternating Euler $T$-sums and $\tilde{S}$-sums, which are infinite series involving (alternating) odd harmonic numbers, and have similar forms and close relations to the Dirichlet beta functions. By using the method of residue computations, we establish the explicit formulas for the (alternating) linear and quadratic Euler $T$-sums and $\tilde{S}$-sums, from which, the parity theorems of Hoffman’s double and triple $t$-values and Kaneko–Tsumura’s double and triple $T$-values are further obtained. …”
Get full text
Article -
27644
SOCIO-POLITICAL ASPECTS OF THE MEDIATIZATION OF POLITICS IN RUSSIA
Published 2023-01-01“…The essence and features of the functioning of mediatized politics in the communications system of modern Russia are determined by a number of factors, which primarily include the formation of civil society, the formation of democratic foundations, and adherence to the letter of the Constitution. …”
Get full text
Article -
27645
The Language of Authenticity in Hungarian–Hungarian Encounters
Published 2023-12-01“…The study of authenticity in sociolinguistics has questioned the notion of the authentic speaker or previous interpretations of place, and it rather focuses on how the social functioning of authenticity is “mediated by and expressed through language” (Lacoste et al. 2014: 4) in different socio-cultural contexts. …”
Get full text
Article -
27646
Polyhedral Model of Carbon Nanotubes Analytically Describing their Geometry
Published 2017-02-01“…For carbon nanotubes, there is constructed a geometric model of polyhedral type, which allows the expressing their key structural parameters analytically, as functions of C–C bonds length and nanotube indices. …”
Get full text
Article -
27647
Markov model of representation of sensual images for the formation of the model of the outside world
Published 2018-11-01“…The aim of the study is a probabilistic description of the functioning of the cognitive system, taking into account its internal logic and interaction with the external environment.Such concepts of cognitive theory as sensory imaginative representations, models, systems are the most common, so the attempt to formalize them is by obtaining the most common results. …”
Get full text
Article -
27648
Complexity of immunobiology of tumor necrosis factor and novel anti-TNF therapy
Published 2023-06-01“…On the one hand, the "pathogenic" cytokine is produced in a soluble form and can exert systemic effects via broadly expressed TNFR1. On the other hand, protective functions are mediated by the membrane-bound TNF via TNFR2. …”
Get full text
Article -
27649
The Role of Cyclooxygenase-2 in Cell Proliferation and Cell Death in Human Malignancies
Published 2010-01-01“…This family contains three members: ubiquitously expressed COX-1, which is involved in homeostasis; the inducible COX-2 isoform, which is upregulated during both inflammation and cancer; and COX-3, expressed in brain and spinal cord, whose functions remain to be elucidated. …”
Get full text
Article -
27650
Exact Solutions of Heat and Mass Transfer with MHD Flow in a Porous Medium under Time Dependent Shear Stress and Temperature
Published 2015-01-01“…Closed-form solutions in general form are obtained by using the Laplace transform technique. They are expressed in terms of exponential and complementary error functions. …”
Get full text
Article -
27651
Dynamic Characteristics of Deeply Buried Spherical Biogas Digesters in Viscoelastic Soils
Published 2018-01-01“…By introducing potential functions, the closed-form expressions for the displacement and the stress of the viscoelastic soil surrounding the deeply buried spherical methane tank are obtained. …”
Get full text
Article -
27652
IDH1 Mutation Impacts DNA Repair Through ALKBH2 Rendering Glioblastoma Cells Sensitive to Artesunate
Published 2025-06-01“…The mutation found in different cancers is functionally active, causing, instead of α-KG, the formation of 2-hydroxyglutarate (2-HG), which inhibits α-KG-dependent enzymes. …”
Get full text
Article -
27653
SYNESTHESIA IN THE NOVEL BY M. PAVIĆ: “LANDSCAPE PAINTED WITH TEA”
Published 2019-12-01“…The specific nature of certain components of the mechanism and the patterns of functioning inherent in synesthesia, and above all, meaning-making, should be accepted in a generalized aspect. …”
Get full text
Article -
27654
The Circular Kitchen
Published 2024-09-01“…Circular economy life cycle assessment (CE-LCA)(expressed in shadow costs), material flow analysis (MFA), and CE-LCC (expressed in total costs (TC)) were used to compare CIK and circular façade design variants. …”
Get full text
Article -
27655
Research on technology of data encryption and search based on access broker
Published 2018-07-01“…Broker executed searchable encryption (BESE) scheme was proposed for the confidentiality issues of cloud application data.The scheme did not need to modify the cloud application or user habits,thus had strong applicability.Firstly,systematic and quantitative analysis on BESE scheme was conducted in terms of query expressiveness,performance and security.Then,the main challenges of BESE scheme including securely sharing index and encrypted data between brokers were pointed out,and corresponding schemes were proposed to address the above challenges.The experimental results show that the BESE scheme can effectively protect the user data in the cloud,achieve a variety of search functions,and has high efficiency and security.…”
Get full text
Article -
27656
Cognitive network spectrum access for emergency communications
Published 2012-11-01“…A wireless cognitive network opportunistic spectrum accessing scheme which provided delay guarantee for emergency communications was proposed.Primary user (PU) and secondary users (SU) shared the spectrum resources according to the discrete time two-level exhausted and limited (k=1) polling mechanism.Then,piggyback acknowledgement was used to realize the parallel scheduling between data transportation and users access,and then reducing the time consumption cause by the user switching.Finally,the mathematics functions was set up and achieved the closed form expressions for the mean waiting time theoretical analysis and simulation experiment.It is proved that the proposed scheme is both interference restraining and high throughput with the delay guaranteed.…”
Get full text
Article -
27657
Line Defects in One-Dimensional Hexagonal Quasicrystals
Published 2025-04-01“…Using the eight-dimensional framework of the integral formalism of one-dimensional quasicrystals, the analytical expressions for the displacement fields and stress functions of line defects, which are dislocations and line forces, in one-dimensional hexagonal quasicrystals of Laue class 10 are derived. …”
Get full text
Article -
27658
Cognitive network spectrum access for emergency communications
Published 2012-11-01“…A wireless cognitive network opportunistic spectrum accessing scheme which provided delay guarantee for emergency communications was proposed.Primary user (PU) and secondary users (SU) shared the spectrum resources according to the discrete time two-level exhausted and limited (k=1) polling mechanism.Then,piggyback acknowledgement was used to realize the parallel scheduling between data transportation and users access,and then reducing the time consumption cause by the user switching.Finally,the mathematics functions was set up and achieved the closed form expressions for the mean waiting time theoretical analysis and simulation experiment.It is proved that the proposed scheme is both interference restraining and high throughput with the delay guaranteed.…”
Get full text
Article -
27659
L’alternance codique comme stratégie de politesse et d’argumentation dans les conversations de Franchise de nuit d’Alger chaine 3
Published 2020-07-01“…The present study aims at describing and analyzing the functioning and the effect of this phenomenon through the interactional behavior of the interlocutors, which manifests itself both at the level of expressing politeness and argumenting. …”
Get full text
Article -
27660
Option Pricing by Willow Tree Method for Generalized Hyperbolic Lévy Processes
Published 2023-01-01“…Moreover, the new approach can be extended to other Lévy processes if their characteristic functions are expressed by explicit forms.…”
Get full text
Article