Sciweavers

4987 search results - page 167 / 998
» Fuzzifying P Systems
Sort
View
108
Voted
PIMRC
2008
IEEE
15 years 10 months ago
A hybrid P2P/Infrastructure platform for personal and social Internet services
—While pure web-based services and P2P technologies are popular for personal and social networking, they both have inherent limitations. A hybrid P2P/Infrastrucutre approach coul...
Dimitris N. Kalofonos, Zoe Antoniou
CPHYSICS
2007
84views more  CPHYSICS 2007»
15 years 3 months ago
Simulating botulinum neurotoxin with constant pH molecular dynamics in Generalized Born implicit solvent
A new method was proposed by Mongan et al for constant pH molecular dynamics simulation and was implemented in AMBER 8 package. Protonation states are modeled with different char...
Yongzhi Chen, Xin Chen, Yuefan Deng
BMCBI
2008
102views more  BMCBI 2008»
15 years 3 months ago
Stability of the core domain of p53: insights from computer simulations
: The tumour suppressor protein p53 protein has a core domain that binds DNA and is the site for most oncogenic mutations. This domain is quite unstable compared to its homologs p...
Arumugam Madhumalar, Derek John Smith, Chandra Ver...
128
Voted
TSMC
2008
94views more  TSMC 2008»
15 years 3 months ago
Queuing Network Modeling of a Real-Time Psychophysiological Index of Mental Workload - P300 in Event-Related Potential (ERP)
Modeling and predicting of mental workload are among the most important issues in studying human performance in complex systems. Ample research has shown that the amplitude of the ...
Changxu Wu, Yili Liu, C. M. Quinn-Walsh
153
Voted
IJNSEC
2011
145views more  IJNSEC 2011»
14 years 10 months ago
Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points
In this paper, cyclic elliptic curves of the form y2 + xy = x3 + ax2 + b, a, b ∈ GF(2m ) with order M is considered in the design of a Symmetric Key Image Encryption Scheme with...
S. V. Sathyanarayana, M. Aswatha Kumar, K. N. Hari...