-
2081
Molecular Cloning and Characterization of Babesia orientalis Rhoptry Neck 2 BoRON2 Protein
Published 2017-01-01“…The organelles proteins localized in apical membrane especially rhoptries neck and microneme protein form a complex called moving junction important during invasion process of parasites belonging to apicomplexan group, including Babesia species. …”
Get full text
Article -
2082
Functional Analysis of Pheophorbide a Oxygenase Gene and Its Promoter from Mango (Mangifera indica) Fruit
Published 2025-12-01“…Pheophorbide a oxygenase (PAO) is a key enzyme in the process of chlorophyll degradation. It can metabolize a produced in the process of chlorophyll degradation into red chlorophyll metabolite. …”
Get full text
Article -
2083
Digital technologies for signal radio vision and radio monitoring
Published 2024-08-01“…The results of fundamental research on electrodynamic effects of vector-wave deformation of nonstationary fields of sub-nanosecond configuration are presented as a means of identifying and authenticating signal radio images. …”
Get full text
Article -
2084
Filtering and Overlapping Data for Accuracy Enhancement of Doppler-Based Location Method
Published 2025-02-01“…The application of low-pass filtering at the DFS vector level improves localization accuracy. In the study, three types of filters for different cutoff frequencies are considered. …”
Get full text
Article -
2085
Off-line Recognition of Unconstrained Handwritten Numerals Using Fuzzy Hough Transform
Published 2009-09-01“…The system is an off-line system since the data processed was written before the time of recognition. …”
Get full text
Article -
2086
-
2087
Forced distance learning at a Russian technical university: A comparative analysis of key challenges assessment
Published 2023-09-01“…The implementation of the proposed recommendations for building a vector of readiness for remote work will reduce the negative socio-psychological impact of stressors and improve the quality of the educational process.…”
Get full text
Article -
2088
MODERN DIAGNOSTICS METHODS OF NON-SPECIFIC PROTECTION OF PERIODONTAL TISSUES IN RESIDENTS OF THE INDUSTRIAL REGION
Published 2020-06-01“…Statistica 13.0 licensed number JPZ804I382130ARCN10-J was used to process the results. The results of the study and their discussion. …”
Get full text
Article -
2089
Decentralized Point-of-Care Manufacturing of CD19 Chimeric Antigen Receptor T Cells in Mexico
Published 2025-04-01“…Clinical-grade CAR-T cell manufacturing was performed in a closed system using a second-generation CD19 vector with 41BB costimulatory domain. Quality control was assessed at different points in the production process with prespecified release criteria including product's aspect, sterility, cell viability, impurity, and quantity. …”
Get full text
Article -
2090
On the exterior magnetic field and silent sources in magnetoencephalography
Published 2004-01-01Get full text
Article -
2091
Inverse scattering transform algorithm for the Manakov system
Published 2023-12-01“…A numerical algorithm is described for solving the inverse spectral scattering problem associated with the Manakov model of the vector nonlinear Schrödinger equation. This model of wave processes simultaneously considers dispersion, nonlinearity and polarization effects. …”
Get full text
Article -
2092
Comparison of Language Models in Skills Extraction From Vacancies and Resumes
Published 2024-03-01“…The introduction of language models into human resource management processes can improve the quality and speed of processing large volumes of data, which will lead to a more accurate and faster selection of qualified specialists.…”
Get full text
Article -
2093
MAPPING OF AREAS OF MODEL SPECIES OF ANIMAL POPULATION OF THE REPUBLIC OF DAGESTAN
Published 2019-01-01“…Processing of the materials and creation of maps were carried out using such software platforms as ArcGIS, MapInfo and Adobe Illustrator CC. …”
Get full text
Article -
2094
Code vulnerability detection method based on graph neural network
Published 2021-06-01“…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
Get full text
Article -
2095
EMADDC: high-volume, high-quality, and timely wind and temperature observations from aircraft surveillance data (Mode-S EHS)
Published 2025-07-01“…To produce high-quality observations, the data are processed in three steps: pre-processing, processing, and post-processing. …”
Get full text
Article -
2096
Effect of Hyperparameter Tuning on Performance on Classification model
Published 2025-06-01“…This research aims to analyze the effect of hyperparameter tuning on the performance of Logistic Regression, K-Nearest Neighbours, Support Vector Machine, Decision Tree, Random Forest, Random Forest Classifier, Naive Bayes algorithms. …”
Get full text
Article -
2097
<italic>OA-WinSeg:</italic> Occlusion-Aware Window Segmentation With Conditional Adversarial Training Guided by Structural Prior Information
Published 2025-01-01“…Window segmentation and vectorization remains a significant challenge, particularly in the absence of clean facade images. …”
Get full text
Article -
2098
Development of a multi-epitope chimeric vaccine in silico against Babesia bovis, Theileria annulata, and Anaplasma marginale using computational biology tools and reverse vaccinolo...
Published 2025-01-01“…In this paper, we have used the process of reverse vaccinology to conduct a study in which we have developed a multi-epitope subunit chimeric vaccine against three protozoan parasites. …”
Get full text
Article -
2099
Developing an Integrative Data Intelligence Model for Construction Cost Estimation
Published 2022-01-01“…Construction cost estimation is one of the essential processes in construction management. Project cost is a complex engineering problem due to various factors affecting the construction industry. …”
Get full text
Article -
2100
Automating the search for legal information in Arabic: A novel approach to document retrieval
Published 2024-10-01“…The Topic-to-Vector (Top2Vec) topic modeling algorithm for generating document embeddings based on semantic context is used to cluster Arabic legal texts into relevant topics. …”
Get full text
Article