Search results for "complexi"

showing 10 items of 1116 documents

ChemInform Abstract: The Reduction of α,β-Unsaturated Nitriles and α- Halonitriles with Sodium Hydrogen Telluride.

2010

Abstract Sodium hydrogen telluride reacts chemoselectively with α,β-unsaturated nitriles and α-halonitriles linked to aromatic and aliphatic substituents to give the corresponding saturated nitriles with good yields.

Reduction (complexity)chemistry.chemical_compoundchemistrySodiumchemistry.chemical_elementGeneral MedicineHydrogen tellurideMedicinal chemistryChemInform
researchProduct

Applications and numerical convergence of the partial inverse method

2006

In 1983, J.E. Spingarn introduced what he called the Partial Inverse Method in the framework of Mathematical Programming. Since his initial articles, numerous applications have been given in various fields including Lagrangian multipliers methods, location theory, convex feasibility problems, analysis of data, economic equilibrium problems. In a first part of this paper we give a survey of these applications. Then by means of optimization problems relevant to location theory such as single and multifacility minimisum or minimax location problems, we examine the main advantages of the algorithm and we point out its drawbacks mainly concerning the rate of convergence. We study how different p…

Reduction (complexity)symbols.namesakeMathematical optimizationOptimization problemRate of convergenceComputer scienceLagrange multiplierConvergence (routing)symbolsOrder of accuracyMinimaxNumerical stability
researchProduct

A Constrained Optimal Model Predictive Control for Mono Inverter Dual Parallel PMSM Drives

2018

The actual trends in the design of AC drives are directed to the reduction of the total weight, volume and cost. Usually, this implies the necessity to adopt new motor topologies and converter architectures. An important role is played by the mono-inverter dual parallel motor (MIDP), which gives the possibility to reduce the total weight and costs of power converters. This paper proposes a novel model predictive control algorithm in order to improve the transient performances of a MIDP used for an overhead carrier. The effectiveness of the proposal control is verified through some numerical simulations.

Renewable Energy Sustainability and the EnvironmentComputer scienceAC drive020209 energy020208 electrical & electronic engineeringConstrained optimizationEnergy Engineering and Power Technology02 engineering and technologyPermanent Magnet Synchronous MachineConvertersPower (physics)Reduction (complexity)Model predictive controlControl theory0202 electrical engineering electronic engineering information engineeringOverhead (computing)InverterTransient (oscillation)Electrical and Electronic EngineeringConstrained optimizationDual motorModel Predictive Control2018 7th International Conference on Renewable Energy Research and Applications (ICRERA)
researchProduct

Flanking regions determine the structure of the poly-glutamine homo- repeat in huntingtin through mechanisms common among glutamine-rich human protei…

2020

International audience; The causative agent of Huntington's disease, the poly-Q homo-repeat in the N-terminal region of huntingtin (httex1), is flanked by a 17-residue-long fragment (N17) and a proline-rich region (PRR), which promote and inhibit the aggregation propensity of the protein, respectively, by poorly understood mechanisms. Based on experimental data obtained from site-specifically labeled NMR samples, we derived an ensemble model of httex1 that identified both flanking regions as opposing poly-Q secondary structure promoters. While N17 triggers helicity through a promiscuous hydrogen bond network involving the side chains of the first glutamines in the poly-Q tract, the PRR prom…

Repetitive Sequences Amino AcidHuntingtinAmino Acid Motifs[SDV.BBM.BP] Life Sciences [q-bio]/Biochemistry Molecular Biology/Biophysics03 medical and health sciencesHuntington's diseaseStructural BiologyHuman proteome projectmedicineHumans[SDV.BBM.BC]Life Sciences [q-bio]/Biochemistry Molecular Biology/Biochemistry [q-bio.BM]Molecular BiologyHuman proteinsProtein secondary structure[SDV.BBM.BC] Life Sciences [q-bio]/Biochemistry Molecular Biology/Biochemistry [q-bio.BM]030304 developmental biology[INFO.INFO-BI] Computer Science [cs]/Bioinformatics [q-bio.QM]Huntingtin Protein0303 health sciencesChemistry030302 biochemistry & molecular biologyPromotermedicine.diseaseCell biologyIntrinsically Disordered ProteinsGlutamine[SDV.BBM.BP]Life Sciences [q-bio]/Biochemistry Molecular Biology/BiophysicsPolyglutamic Acid[INFO.INFO-BI]Computer Science [cs]/Bioinformatics [q-bio.QM]Low Complexity Region
researchProduct

Rapid and Standardized Quantitation of Hemolytic Activity of the Fourth Component of Human Complement

1990

Based on a method that uses the fourth component of complement (C4)-deficient guinea pig serum to quantify the hemolytic activity of C4, we developed an assay that allows the processing of a large number of individual samples with high reproducibility. In contrast to the conventional procedure using titration curves of each sample to be determined, we can show that a single appropriate dilution of the sample allows accurate quantitation of hemolytic activity. The reliability of the procedure is demonstrated using either C4A- or C4B- deficient and normal individual samples.

ReproducibilityErythrocytesPolymorphism GeneticChromatographyTitration curveChemistryImmunologyC4AComplement C4HematologyIn Vitro TechniquesHemolysisComplement (complexity)KineticsHumansComplement Pathway ClassicalComplement and Inflammation
researchProduct

Panel — Assessing Critical Social Theory Research in Information Systems

1997

The Critical Social Theory (CST) program of information systems research is now just over a decade old. Although the number of researchers associated with the CST program are few, they have had a disproportionately larger impact on the field than other research communities. The main reason for this disproportionate impact can be found in the intense and incisive radical critiques of the foundational assumptions of our field that CST researchers have conducted. These radical critiques have helped to open up the theoretical debate on IS research and point out new directions for future inquiry. But as we turn the century, new challenges are emerging. New information technologies (IT) are rapid…

Research programSocial networkbusiness.industryCritical theoryTheory of Motivated Information ManagementInformation systemEngineering ethicsRationalitySocial complexitySociologyJustice (ethics)business
researchProduct

Structural and Dynamical Complexities of Risk and Catastrophe Systems: an Approach by System Dynamics Modelling

2009

Risk and catastrophe are complex systems. Within the scope of this paper, we focus our attention on structural and dynamic complexities of catastrophes and on the possibility of modelling and simulating its double complexity with a formal and methodological framework: the General Systems Theory and System Dynamics modelling. Then we briefly propose a model of urban catastrophe related to a flood. After we propose some ways of research allowing exceeding the limits related to the modelling.

Risk analysisGeneral Systems TheoryScope (project management)Management scienceComputer science[SHS.GEO] Humanities and Social Sciences/Geography05 social sciencesComplex system[SHS.GEO]Humanities and Social Sciences/GeographyComplexity02 engineering and technologyDynamic modelling[ SHS.GEO ] Humanities and Social Sciences/GeographySystem dynamicsSystems theoryRisk analysis. Catastrophe050501 criminology0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingDynamic modelling0505 law
researchProduct

Rotation-Invariant Texture Retrieval via Signature Alignment Based on Steerable Sub-Gaussian Modeling

2008

This paper addresses the construction of a novel efficient rotation-invariant texture retrieval method that is based on the alignment in angle of signatures obtained via a steerable sub-Gaussian model. In our proposed scheme, we first construct a steerable multivariate sub-Gaussian model, where the fractional lower-order moments of a given image are associated with those of its rotated versions. The feature extraction step consists of estimating the so-called covariations between the orientation subbands of the corresponding steerable pyramid at the same or at adjacent decomposition levels and building an appropriate signature that can be rotated directly without the need of rotating the im…

RotationComputational complexity theoryGaussianFeature extractionNormal DistributionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONPattern Recognition Automatedsymbols.namesakeImage textureArtificial IntelligenceImage Interpretation Computer-AssistedComputer SimulationGaussian processImage retrievalMathematicsModels Statisticalbusiness.industryPattern recognitionImage EnhancementComputer Graphics and Computer-Aided DesignSimilitudeSubtraction TechniquesymbolsRotational invarianceArtificial intelligencebusinessAlgorithmsSoftwareIEEE Transactions on Image Processing
researchProduct

Formation of an interlocked double-chain from an organic-inorganic [2]rotaxane.

2019

Here we show that a structure containing a polymeric interlocking daisy chain is obtained from the reaction of an inorganic–organic [2]rotaxane [HB{CrIII7NiII(μ-F)8(O2CtBu)16}], where B is an organic thread terminated with a bi-pyridyl unit, with an oxo-centered metal carboxylate triangle [FeIII2CoII(μ3-O)(O2CtBu)6(HO2CtBu)3].

Rotaxane010405 organic chemistryChemistryMetals and AlloysGeneral Chemistry010402 general chemistry01 natural sciencesCatalysis0104 chemical sciencesSurfaces Coatings and FilmsElectronic Optical and Magnetic MaterialsDouble chainMetalchemistry.chemical_compoundTheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITYvisual_artPolymer chemistryOrganic inorganicMaterials ChemistryCeramics and Compositesvisual_art.visual_art_mediumCarboxylateDaisy chainChemical communications (Cambridge, England)
researchProduct

Algorithmic Complexity Vulnerability Analysis of a Stateful Firewall

2016

Algorithmic complexity vulnerabilities are an opportunity for an ad-versary to conduct a sophisticated kind of attack i.e. on network infrastructure services. Such attacks take advantage of worst case time or space complexity of algorithms implemented on devices in their software. In this paper we address potential risks introduced by such algorithmic behavior in computer networks in particular on a stateful firewall. First we introduce the idea and theoretical background for the attack. We then describe in full detail a successfully con-ducted attack which takes advantage of the worst case computational complexi-ty of O(n2) of a hash table data structure used to store active sessions. The …

RouterComputer sciencenetwork vulnerabilitiesDenial-of-service attack02 engineering and technologyNetwork topologyComputer securitycomputer.software_genreFirewall (construction)Stateful firewall0202 electrical engineering electronic engineering information engineeringDenial of Servicecomplexity attackcomputational complexitybusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsHash tablese-curitycomputer networksDoSbusinessSegmentation faultcomputerRebootComputer network
researchProduct