Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (417)
  • Open Access

    ABSTRACT

    in silico Method for the Identification of Mycobacterial sp. Potential Drug Targets

    Ashutosh Singh1, Shruti Mishra2, Dhwani Raghav1, Asheesh shanker1, Vinay Sharma1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.6, No.2, pp. 119-124, 2008, DOI:10.3970/icces.2008.006.119

    Abstract Drug resistance has increased the pace of war against the ever-growing challenge of mycobacterial infections particularly with the growing menace of tuberculosis (TB).Previous studies reported several essential and virulent genes of mycobacterium like virS gene and mymA operon[1] through experimental approaches. However, Post genomic approach applied for the identification of targets for tuberculosis which includes the comparison of Mycobacterium tuberculosis CDC1551 proteome against database of essential genes and proteome of Homo sapiens. A total of approx 4000 proteins were studied and compared and 19 proteins were found to possess potentiality to call as Targets. More >

  • Open Access

    ABSTRACT

    Iris Biometrics Recognition Application in Security Management

    S.S. Chowhan1, G.N. Shinde2

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.6, No.1, pp. 1-12, 2008, DOI:10.3970/icces.2008.006.001

    Abstract Authentication plays a very critical role in security-related applications like e-commerce. There are a number of methods and techniques for accomplishing this key process. Biometrics is gaining increasing attention in these days. Security systems, having realized the value of biometrics, use biometrics for two basic purposes: to verify or identify users. The use of fingerprints, facial characteristics and other biometrics for identification is becoming more common. This paper overview best of Biometric application for security management. The acquisition of biometric data introduces human research and privacy concerns that must be addressed by the organizations. This paper focus Iris is the… More >

  • Open Access

    ABSTRACT

    Identification Problems in Metal Forming

    Iwona Pokorska1, Andrzej Sluzalec2

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.4, No.3, pp. 171-178, 2007, DOI:10.3970/icces.2007.004.171

    Abstract This work has been focused on a unified approach for parameter identification in metal forming processes of poroplastic materials. In order to solve the associated inverse problem a chosen functional is minimized by the use of gradient based methods and a sensitivity analysis. Several numerical and experimental results were presented. These are: the direct problem of simple compression, re-identification of flow stress and identification of loading functions. More >

  • Open Access

    ABSTRACT

    Inverse Identification of Damage Properties of Graphite Material Based on Experimental and Simulation Analysis

    Lu Wang, Guangyan Liu, Yanan Yi, Shaopeng Ma*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.21, No.2, pp. 31-31, 2019, DOI:10.32604/icces.2019.04974

    Abstract Nuclear graphite is a key material in high temperature gas-cooled reactors. The evaluation of its damage evolution is of great importance for safety assessment of nuclear graphite structures. However, the damage properties of nuclear graphite are difficult to characterize by the traditional testing approaches, i.e., uniaxial tension and compression tests due to the inconvenience of conducting uniaxial tension/compression tests. In this paper, an inverse method was developed to identify the damage parameters of a nuclear graphite material IG11. The method is based on the non-contact digital image correlation and finite element model updating techniques, and damage-induced nonlinear stress-strain curves for… More >

  • Open Access

    ARTICLE

    Evaluation of Antioxidants, Total Phenolics and Antimicrobial Activities of Ethyl Acetate Extracts From Fungi Grown on Rice Straw

    Bahaa T. Shawky1, Mohammed Nagah1, Mosad A. Ghareeb2, Gamal M. El-Sherbiny3, Saad A. M. Moghannem3, Mohamed S. Abdel-Aziz1,*

    Journal of Renewable Materials, Vol.7, No.7, pp. 667-682, 2019, DOI:10.32604/jrm.2019.04524

    Abstract Rice straw (RS) collected from Egyptian agricultural environment (Al-Masied village-Alsharqia Governorate-Egypt) was used as substrate for three fungal isolates namely: 4b, 1Asp, Pleurotus ostreatus NRRL 3501 and mixed culture of (4b, 1Asp). Isolates number 4b and 1Asp were identified using the molecular technique (18S rRNA). Isolate 4b and 1Asp, were identified as Trichoderma saturnisporum MN1-EGY and Aspergillus niger MN2-EGY, respectively. Trichoderma saturnisporum MN1-EGY extract exhibited the highest antimicrobial activity compared to the other fungal extracts. Total phenolic, antimicrobial and antioxidant activities were also determined from the ethyl acetate extract of rice straw inoculated by these fungi. The antioxidant scavenging concentration(SC50)… More >

  • Open Access

    ABSTRACT

    Identification of Dimensions and Position of Tumor Region on the Basis of Skin Surface Temperature Using the Gradient Method Coupled with the Multiple Reciprocity BEM

    Ewa Majchrzak2 1, Marek Paruch2

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.1, No.1, pp. 7-14, 2007, DOI:10.3970/icces.2007.001.007

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Optimization of Well Position and Sampling Frequency for Groundwater Monitoring and Inverse Identification of Contamination Source Conditions Using Bayes’ Theorem

    Shuangsheng Zhang1,5, Hanhu Liu1, Jing Qiang2,*, Hongze Gao3,*, Diego Galar4, Jing Lin4

    CMES-Computer Modeling in Engineering & Sciences, Vol.119, No.2, pp. 373-394, 2019, DOI:10.32604/cmes.2019.03825

    Abstract Coupling Bayes’ Theorem with a two-dimensional (2D) groundwater solute advection-diffusion transport equation allows an inverse model to be established to identify a set of contamination source parameters including source intensity (M ), release location ( X0 , Y0) and release time (T0), based on monitoring well data. To address the issues of insufficient monitoring wells or weak correlation between monitoring data and model parameters, a monitoring well design optimization approach was developed based on the Bayesian formula and information entropy. To demonstrate how the model works, an exemplar problem with an instantaneous release of a contaminant in a confined groundwater… More >

  • Open Access

    ARTICLE

    Ship Trajectory Prediction Based on BP Neural Network

    Hai Zhou1,2,*, Yaojie Chen1,2, Sumin Zhang3

    Journal on Artificial Intelligence, Vol.1, No.1, pp. 29-36, 2019, DOI:10.32604/jai.2019.05939

    Abstract In recent years, with the prosperity of world trade, the water transport industry has developed rapidly, the number of ships has surged, and ship safety accidents in busy waters and complex waterways have become more frequent. Predicting the movement of the ship and analyzing the trajectory of the ship are of great significance for improving the safety level of the ship. Aiming at the multi-dimensional characteristics of ship navigation behavior and the accuracy and real-time requirements of ship traffic service system for ship trajectory prediction, a ship navigation trajectory prediction method combining ship automatic identification system information and Back Propagation… More >

  • Open Access

    ARTICLE

    Impact Damage Identification for Composite Material Based on Transmissibility Function and OS-ELM Algorithm

    Yajie Sun1,2,*, Yanqing Yuan2, Qi Wang2, Sai Ji1,2, Lihua Wang3, Shaoen Wu4, Jie Chen2, Qin Zhang2

    Journal of Quantum Computing, Vol.1, No.1, pp. 1-8, 2019, DOI:10.32604/jqc.2019.05788

    Abstract A method is proposed based on the transmissibility function and the Online Sequence Extreme Learning Machine (OS-ELM) algorithm, which is applied to the impact damage of composite materials. First of all, the transmissibility functions of the undamaged signals and the damage signals at different points are calculated. Secondly, the difference between them is taken as the damage index. Finally, principal component analysis (PCA) is used to reduce the noise feature. And then, input to the online sequence limit learning neural network classification to identify damage and confirm the damage location. Taking the amplitude of the transmissibility function instead of the… More >

  • Open Access

    REVIEW

    System Identification of Heritage Structures Through AVT and OMA: A Review

    Vinay Shimpi1, Madappa V. R. Sivasubramanian1,*, S. B. Singh2

    Structural Durability & Health Monitoring, Vol.13, No.1, pp. 1-40, 2019, DOI:10.32604/sdhm.2019.05951

    Abstract In this review article, the past investigations carried out on heritage structures using Ambient Vibration Test (AVT) and Operational Modal Analysis (OMA) for system identification (determination of dynamic properties like frequency, mode shape and damping ratios) and associated applications are summarized. A total of 68 major research studies on heritage structures around the world that are available in literature are surveyed for this purpose. At first, field investigations carried out on heritage structures prior to conducting AVT are explained in detail. Next, specifications of accelerometers, location of accelerometers and optimization of accelerometer networks have been elaborated with respect to the… More >

Displaying 361-370 on page 37 of 417. Per Page