Skip to main content
Probing the active site of rhodanase with disulfide reagents Uses of gel electrophoresis to monitor detergent enzymes: application to safety assessments C-terminal sequence analysis of polypeptides containing C-terminal proline Exploiting... more
    • by 
    •   3  
      Quantum PhysicsProtein ChemistryBiochemistry and cell biology
    • by 
    •   4  
      GeneticsSex DifferenceWaist to Hip RatioAge Factors
    • by 
    • Physics
Posttranslational modification of lysine to hydroxylysine (Hyl) occurs in collagen and collagen-like domains of a few other proteins (2). Recently, we reported the unexpected presence of Hyl at solvent-accessible sites in some... more
    • by 
    •   3  
      Analytical ChemistryAnalytical BiochemistryBiochemistry and cell biology
    • by 
    •   2  
      Computer ScienceMarkov Processes
With the outbreak of social networking platforms such as Facebook, Twitter, Instagram, etc., there has been a trend in big data community researches to engage themselves in social network studies, as these networks have proven to be the... more
    • by 
    •   2  
      Computer ScienceComputational Science and Engineering
Graphs and Networks have been the most researched topics with applications ranging from theoretical to practical fields, such as social media, genetics, and education. In many competitive environments, the most productive activities may... more
    • by 
    •   3  
      Computer ScienceNetwork scienceBetweenness Centrality
— Power-down mechanisms are well known and are widely used to save energy; these mechanisms are encountered on an everyday basis. We consider a device which has states OFF, ON, and a fixed number of intermediate states. The state of the... more
    • by  and +1
    •   2  
      AlgorithmsMachine Learning
With data mining techniques one can easily disclose other's sensitive information or knowledge. So, preserving privacy for sensitive knowledge has become an important aspect. Privacy preserving data mining (PPDM) is a novel research... more
    • by 
    • Database Systems
The page rank (PR) algorithm was first used by Google to rank web pages. Because today's complex social networks need a fast and scalable algorithm for their searching needs, a great many new PR algorithms utilize improved versions of the... more
    • by 
    • by 
—In the era of Big Data , reduced models capable of reducing big data graph to estimate Personalized PageRank are limited. Personalized PageRank is a page rank calculation where random jumps are only allowed to a subset of start nodes.... more
    • by 
In recent years, frameworks that employ Generative Adversarial Networks (GANs) have achieved immense results for various applications in many fields especially those related to image generation both due to their ability to create highly... more
    • by 
    •   14  
      Computer ScienceSoftware EngineeringArtificial IntelligenceInformation Technology
In the past few years, Generative Adversarial Networks (GANs) have received immense attention by researchers in a variety of application domains. This new field of deep learning has been growing rapidly and has provided a way to learn... more
    • by 
    •   5  
      Computer ScienceArtificial IntelligenceImage Analysis (Mathematics)Image Synthesis
In the past decade, dietary assessment has been one of the most popular topics of research in the food industry, which has resulted in developing several automatic or semi-automatic dietary assessment systems using visible spectrum images... more
    • by 
    •   2  
      Computer ScienceAdvanced Computer Networks
The unknowing presence of pits in olives is an undesirable and even dangerous experience that affects overall quality of products contain olives or serving dishes in salad bars, airline meals, and cocktail lounges. Therefore, detection... more
    • by 
The unknowing presence of pits in olives is an undesirable and even dangerous experience that affects overall quality of products contain olives or serving dishes in salad bars, airline meals, and cocktail lounges. Therefore, detection... more
    • by 
In this paper, a fused global saliency-based multiscale multiresolution multistructure local binary pattern (salM 3 LBP) feature and local codebookless model (CLM) feature is proposed for high-resolution image scene classification. First,... more
    • by 
Awareness detection technologies have been gaining traction in a variety of enterprises; most often used for driver fatigue detection, recent research has shifted towards using computer vision technologies to analyze user attention in... more
    • by 
    • Computer Science
A signed graph G is a graph where each edge is assigned a + (positive edge) or a (negative edge). The signed degree of a vertex v in a signed graph, denoted by sdeg(v), is the number of positive edges incident to v subtracted by the... more
    • by