Search

Results: 220
Application of Metaheuristic Approaches for the Variable Selection Problem
Variable selection is an old topic from regression models. Besides many conventional approaches, some metaheuristic approaches from the realm of optimization such as GA (Genetic Algorithm) or simulated annealing have been...
Climate change and modern slavery in public procurement
This is a summary of the report from the project entitled: Intersecting sustainabilities: Protecting both people and planet in public sector supply chains, based on research conducted by Michael Rogerson (University of Sussex)...
Climate change and modern slavery in public procurement
This is a summary of the report from the project entitled: Intersecting sustainabilities: Protecting both people and planet in public sector supply chains, based on research conducted by Michael Rogerson (University of Sussex)...
Medical Biotechnology- Point of Care devices and Artificial Intelligence
Natalya Callaghan
Jan 01, 0001
Point of care devices are a biotechnology product that produce individual diagnostic tests within minutes to better assess individual patient needs. These risk assessments for numerous conditions can use the help of algorithms...
Mapping neuronal inputs to Kiss1 neurons in the arcuate nucleus of the mouse.
The normal function of the mammalian reproductive axis is strongly influenced by physiological, metabolic and environmental factors. Kisspeptin neuropeptides, encoded by the Kiss1 gene, are potent regulators of the mammalian...
Kv4.2 channel activity controls intrinsic firing dynamics of arcuate kisspeptin neurons.
KEY POINTS: Neurons in the hypothalamus of the brain which secrete the peptide kisspeptin are important regulators of reproduction, and normal reproductive development. Electrical activity, in the form of action potentials, or...
The use of third-party packed red blood cells during ex situ normothermic machine perfusion of organs for transplantation
Ex situ normothermic machine perfusion (NMP) is being used increasingly in the assessment of higher risk deceased donor organs and to facilitate prolonged organ storage. Third-party packed red blood cells (pRBCs) are often used...
Improving public health evaluation
BACKGROUND: In 2011, the House of Lords published a report on Behaviour Change, in which they report that "a lot more could, and should, be done to improve the evaluation of interventions." This study aimed to undertake a needs...
Applications of Janus Dendrimersomes in Nucleic Acid Delivery
Kyle Schantz
Jan 01, 0001
The discovery of new drugs often accompanies the need for improved drug delivery vehicles that tackle common problems associated with drug solubility, stability, and biodistribution. Janus dendrimers (JDs), characterized by...
Published by: Ursinus College
Response to "Past, Present, and Future of Dynamic Kidney and Liver Preservation and Resuscitation"
We are writing in response to the article written by Jochmans et al [1]. The article is a comprehensive review on the status of preservation and resuscitation techniques in kidney and liver transplantation. It highlights the...
"To Deal"
Kyle Peterson
Jan 01, 0001
My objective in beginning this series was to, quite simply, deal with personal issues. I wanted to begin to dissect and make sense of my experiences through critical understanding of the different internal and external social...
Published by: Ursinus College
A breaking internal wave in the surface ocean boundary layer
High-temporal resolution measurements in the Labrador Sea surface layer are presented using an upwardly-profiling autonomous microstructure instrument, which captures an internal wave in the act of breaking at the base of the...
A breaking internal wave in the surface ocean boundary layer
High-temporal resolution measurements in the Labrador Sea surface layer are presented using an upwardly-profiling autonomous microstructure instrument, which captures an internal wave in the act of breaking at the base of the...
Improving Auto-Detection of Phishing Websites using Fresh-Phish Framework
Denizens of the Internet are under a barrage of phishing attacks of increasing frequency and sophistication. Emails accompanied by authentic looking websites are ensnaring users who, unwittingly, hand over their credentials...

|<

<

1

2

3

4

5

>

>|