Gotowa bibliografia na temat „Alpha-information”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Alpha-information”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Alpha-information"
Pardo, M. C., i J. A. Pardo. "Statistical applications of order $\alpha$-$\beta$ weighted information energy". Applications of Mathematics 40, nr 4 (1995): 305–17. http://dx.doi.org/10.21136/am.1995.134296.
Pełny tekst źródła&NA;. "Alpha-interferons: safety information updated". Reactions Weekly &NA;, nr 894 (marzec 2002): 3. http://dx.doi.org/10.2165/00128415-200208940-00005.
Pełny tekst źródłaCho, Ji-Ho, Remo Ziegler, Markus Gross i Kwan H. Lee. "Improving alpha matte with depth information". IEICE Electronics Express 6, nr 22 (2009): 1602–7. http://dx.doi.org/10.1587/elex.6.1602.
Pełny tekst źródłaQian, Edward, Eric H. Sorensen i Ronald Hua. "Information Horizon, Portfolio Turnover, and Optimal Alpha Models". Journal of Portfolio Management 34, nr 1 (31.10.2007): 27–40. http://dx.doi.org/10.3905/jpm.2007.698030.
Pełny tekst źródłaNoguchi, Mitsunori. "Alpha cores of games with nonatomic asymmetric information". Journal of Mathematical Economics 75 (marzec 2018): 1–12. http://dx.doi.org/10.1016/j.jmateco.2017.12.005.
Pełny tekst źródłaYao, Yanqing. "A Generalized Constraint of Privacy: $\alpha$ -Mutual Information Security". IEEE Access 7 (2019): 36122–31. http://dx.doi.org/10.1109/access.2019.2905278.
Pełny tekst źródłaManza, P., C. L. V. Hau i H. C. Leung. "Alpha Power Gates Relevant Information during Working Memory Updating". Journal of Neuroscience 34, nr 17 (23.04.2014): 5998–6002. http://dx.doi.org/10.1523/jneurosci.4641-13.2014.
Pełny tekst źródłaKumar, Satish. "Some more results on R-norm information measure". Tamkang Journal of Mathematics 40, nr 1 (31.03.2009): 41–58. http://dx.doi.org/10.5556/j.tkjm.40.2009.35.
Pełny tekst źródłaPayne, Lisa, Sylvia Guillory i Robert Sekuler. "Attention-modulated Alpha-band Oscillations Protect against Intrusion of Irrelevant Information". Journal of Cognitive Neuroscience 25, nr 9 (wrzesień 2013): 1463–76. http://dx.doi.org/10.1162/jocn_a_00395.
Pełny tekst źródłaIchihara-Takeda, Satoe, Shogo Yazawa, Takashi Murahara, Takanobu Toyoshima, Jun Shinozaki, Masanori Ishiguro, Hideaki Shiraishi i in. "Modulation of Alpha Activity in the Parieto-occipital Area by Distractors during a Visuospatial Working Memory Task: A Magnetoencephalographic Study". Journal of Cognitive Neuroscience 27, nr 3 (marzec 2015): 453–63. http://dx.doi.org/10.1162/jocn_a_00718.
Pełny tekst źródłaRozprawy doktorskie na temat "Alpha-information"
Perlis, Michael Lloyd. "Alpha sleep and information processing, arousal and perception of sleep in fibromyalgia". Diss., The University of Arizona, 1994. http://hdl.handle.net/10150/186882.
Pełny tekst źródłaBruschi, David Edward. "To Alpha Centauri in a box and beyond : motion in Relativistic Quantum Information". Thesis, University of Nottingham, 2012. http://eprints.nottingham.ac.uk/12786/.
Pełny tekst źródłaPalacios, Arnold Raul. "Role of GSK-3 alpha beta in B cell proliferation during germinal center information". Thesis, Boston University, 2013. https://hdl.handle.net/2144/21229.
Pełny tekst źródłaGlycogen Synthase Kinase-3αß is an enzyme that is involved in cell cycle regulation by promoting the degradation of cyclin D1 and cycling D3 in cells. Special emphasis is placed in its regulatory role in B cells, as there it is evidence that suggests that this protein is inhibited during germinal center formation, where B cells undergo proliferation, somatic hypermutation and class switch recombination. By inducing DNA recombination via the Cre/lLxP recombination system and utilizing tamoxifen as a Cre activity inducer, B cells were culture in 40LB cells to form induced germinal center in vitro. Flow cytometry analysis suggests that in the absence of GSK-3 αß B cells proliferate extensively in germinal centers and being the process of class switch recombination. Although the results of this study are in accord with current theory, more experiments and research need to be made to validate the conclusions set forth in this study.
2031-01-01
Cheng, Wei. "What can information guess ? : Towards information leakage quantification in side-channel analysis". Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAT044.
Pełny tekst źródłaCryptographic algorithms are nowadays prevalent in establishing secure connectivity in our digital society. Such computations handle sensitive information like encryption keys, which are usually very exposed during manipulation, resulting in a huge threat to the security of the sensitive information concealed in cryptographic components. In the field of embedded systems security, side-channel analysis is one of the most powerful techniques against cryptographic implementations. The main subject of this thesis is the measurable side-channel security of cryptographic implementations, particularly in the presence of random masking. Overall, this thesis consists of two topics. One is the leakage quantification of the most general form of masking equipped with the linear codes, so-called code-based masking; the other one is exploration of applying more generic information measures in a context of side-channel analysis. Two topics are inherently connected to each other in assessing and enhancing the practical security of cryptographic implementations .Regarding the former, we propose a unified coding-theoretic framework for measuring the information leakage in code-based masking. Specifically, our framework builds formal connections between coding properties and leakage metrics in side-channel analysis. Those formal connections enable us to push forward the quantitative evaluation on how the linear codes can affect the concrete security of all code-based masking schemes. Moreover, relying on our framework, we consolidate code-based masking by providing the optimal linear codes in the sense of maximizing the side-channel resistance of the corresponding masking scheme. Our framework is finally verified by attack-based evaluation, where the attacks utilize maximum-likelihood based distinguishers and are therefore optimal. Regarding the latter, we present a full spectrum of application of alpha-information, a generalization of (Shannon) mutual information, for assessing side-channel security. In this thesis, we propose to utilize a more general information-theoretic measure, namely alpha-information (alpha-information) of order alpha. The new measure also gives the upper bound on success rate and the lower bound on the number of measurements. More importantly, with proper choices of alpha, alpha-information provides very tight bounds, in particular, when alpha approaches to positive infinity, the bounds will be exact. As a matter of fact, maximum-likelihood based distinguishers will converge to the bounds. Therefore, we demonstrate how the two world, information-theoretic measures (bounds) and maximum-likelihood based side-channel attacks, are seamlessly connected in side-channel analysis .In summary, our study in this thesis pushes forward the evaluation and consolidation of side-channel security of cryptographic implementations. From a protection perspective, we provide a best-practice guideline for the application of code-based masking. From an evaluation perspective, the application of alpha-information enables practical evaluators and designers to have a more accurate (or even exact) estimation of concrete side-channel security level of their cryptographic chips
Hedin, Stenmark Olof. "Strategy Mapping : The Intended Effects of an Investment in Information Systems - A Case Study on Alpha AB". Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Företagsekonomi, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-15193.
Pełny tekst źródłaFerm, Johan. "Europa's Lyman-Alpha Shadow on Jupiter". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-285567.
Pełny tekst źródłaEuropa är ett av solsystemets mest intressanta objekt i jakten på utomjordiskt liv, dådet finns ett hav av vatten under månens isiga yta. Vattenånga har tidigare observeratsi Europas atmosfär, vilket kan tyda på vattenplymer som skjuts ut från ytan i kraftigautbrott. Dessa plymer kan möjligtvis ha sitt ursprung i månens inre hav, de kandärför möjliggöra en analys av havsvattnets beståndsdelar i omloppsbana. Europasultravioletta skugga på Jupiter observerades vid två tillfällen 2018 och 2019, av HubbleSpace Telescope. Observationerna gjordes i Lyman-α (1 216 Å), en spektrallinje hos väte.Denna studie undersöker den avbildade skuggan i Lyman-α för att söka efter potentiellavattenplymer vid skuggans rand. Att undersöka skuggan istället för själva månen är en nymetod för att studera Europas atmosfär genom fjärranalys. Metoden forward modellinganvänds för att skapa artificiella bilder, som jämförs med observationerna. Eventuellaavvikelser som hittas runt skuggans rand analyseras sedan och deras statistiska signifikansutvärderas. Två anmärkningsvärda avvikelser kan hittas vid randen (en vid varjeobservationstillfälle), som motsvarar H2O-kolumndensiteter på 3.07 × 1017 cm−2 och4.72 × 1016 cm−2, för 2018-observationen respektive 2019-observationen. Densiteternaär dock inte signifikanta, då de ligger inom tre standardavvikelser från deras förväntadevärden (< 3σ). Istället beräknas en övre gräns för vilken kolumndensitet som kandetekteras i datan, vilket ger 6.71 × 1016 cm−2 (där endast 2019-data används på grundav en svag signal hos 2018-observationen). Den högsta möjliga H2O-kolumndensitetenkan således begränsas. Den nya metoden visar sig vara användbar för det tänkta syftetoch kan eventuellt appliceras på andra ismånar.
Eng, Stefan. "Heuristisk profilbaserad optimering av instruktionscache i en online Just-In-Time kompilator". Thesis, Linköping University, Department of Computer and Information Science, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2452.
Pełny tekst źródłaThis master’s thesis examines the possibility to heuristically optimise instruction cache performance in a Just-In-Time (JIT) compiler.
Programs that do not fit inside the cache all at once may suffer from cache misses as a result of frequently executed code segments competing for the same cache lines. A new heuristic algorithm LHCPA was created to place frequently executed code segments to avoid cache conflicts between them, reducing the overall cache misses and reducing the performance bottlenecks. Set-associative caches are taken into consideration and not only direct mapped caches.
In Ahead-Of-Time compilers (AOT), the problem with frequent cache misses is often avoided by using call graphs derived from profiling and more or less complex algorithms to estimate the performance for different placements approaches. This often results in heavy computation during compilation which is not accepted in a JIT compiler.
A case study is presented on an Alpha processor and an at Ericsson developed JIT Compiler. The results of the case study shows that cache performance can be improved using this technique but also that a lot of other factors influence the result of the cache performance. Such examples are whether the cache is set-associative or not; and especially the size of the cache highly influence the cache performance.
Jazayeri, Jahangir. "Ly-α Dayglow on Uranus : Radiative Transfer Modelling". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-292992.
Pełny tekst źródłaUranus är en av solsystemets minst utforskade planeter. Även om dess Ly-α-strålning har undersökt, råder ännu inte konsensus kring de olika källornas bidrag till den totala Ly-α signalen. Genom att lösa ekvationen för strålningstransport i en parameterstudie ämnar examensarbetet att studera bidraget från solens två källor till Uranus Ly-α- signal. De två källorna är resonant- och Rayleigh strålningsspridning från atomärt och molekulärt väte. Ekvationen för strålningstransport beräknas av ett program som heter Feautrier Method Program, skapat av Randall G. Gladstone. Programmet har justeras till Uranus atmosfär för att kunna beräkna strålningstransport för olika atmosfärersmodeller i en parameterstudie. Parameterna som ändras är temperaturen, partikeldensiteten hos spridare och absorberare i atmosfären. Från resultaten kan parameterstudien svara på beroendet av de olika källorna till Ly-α-signalen från Uranus. Resultaten visar en tydlig ökning av ljusintensitet vid Uranus kanter med maximum runt 400 km utanför planetens radie, sett från planetens mitt. Bidraget till Ly-α-signalen från Rayleigh stålningsspridning beräknades till 160 R och från resonant strålningsspridning till 550 R. En egenskap som hindrar direkt jämförelse med resultaten från detta examensarbete och observerad data är att alla bidragande källor till Uranus Ly-α signal inte simulerats.
Akintola, Abayomi Rasheed. "User Adoption of Big Data Analyticsin the Public Sector". Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-86641.
Pełny tekst źródłaCarlsson, Fredrik, i Joey Öhman. "AlphaZero to Alpha Hero : A pre-study on Additional Tree Sampling within Self-Play Reinforcement Learning". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-259200.
Pełny tekst źródłaI självspelande straffinlärning spelar en agent mot sig själv. Med hjälp av sofistikerade algoritmer och tillbakablickande kan agenten lära sig en bra policy över tid. Denna metod har gjort AlphaZero till världens starkaste spelare i Go, Shogi, och Schack genom att träna ett djupt neuralt nätverk med data samlat enbart från självspel. AlphaZero kombinerar detta djupa neurala nätverk med en Monte Carlo Tree Search-algoritm som kraftigt förstärker nätverkets evaluering av ett bräde. Originalversionen av AlphaZero genererar träningsdata med det slutgiltiga resultatet av ett spel som inlärningsmål. Genom att ändra detta inlärningsmål till resultatet av trädsöket istället, möjliggörs skapandet av träningsdata från bräden som enbart blivit upptäckta genom trädsök. Vi föreslår en utökning, Additional Tree Samling, som utnyttjar denna förändring av inlärningsmål. Detta följs av teoretiska argument för och emot denna utökning av AlphaZero. Vidare utförs en empirisk analys på spelet Fyra i Rad som styrker faktumet att modifieringen av inlärningsmål är rimligt. Det förändrade inlärningsmålet visar inga tecken på att försämra den slutgiltiga spelarens skicklighet eller inlärningsalgoritmens beteende under träning. Vi uppmuntrar, baserat på dessa positiva resultat, ytterligare forskning vad gäller Additional Tree Sampling, för att se huruvida denna metod skulle förändra AlphaZero.
Książki na temat "Alpha-information"
1959-, McBride Randolph Alexander, i Geological Survey (U.S.), red. Louisiana Coastal Geographic Information System Network: Alpha version 0.1, year three final report. [Reston, Va.?]: U.S. Dept. of the Interior, U.S. Geological Survey, 1993.
Znajdź pełny tekst źródłaWolfram, Conrad. Wolfram/Alpha jōhō keisan soshite chi no shinjidai. Tōkyō: Monbu Kagakushō Kagaku Gijutsu Seisaku Kenkyūjo Kagaku Gijutsu Dōkō Kenkyū Sentā, 2010.
Znajdź pełny tekst źródłaZ, Friedman Steven, i Jet Propulsion Laboratory (U.S.), red. All Source Analysis System (ASAS): Migration from VAX to Alpha AXP computer systems. Pasadena, Calif: National Aeronautics and Space Administration, Jet Propulsion Laboratory, California Institute of Technology, 1994.
Znajdź pełny tekst źródłaPolyakova, Anna, Tat'yana Sergeeva i Irina Kitaeva. The continuous formation of the stochastic culture of schoolchildren in the context of the digital transformation of general education. ru: INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1876368.
Pełny tekst źródłaLouisiana Coastal Geographic Information System Network: Alpha version 0.1, year three final report. [Reston, Va.?]: U.S. Dept. of the Interior, U.S. Geological Survey, 1993.
Znajdź pełny tekst źródłaLouisiana Coastal Geographic Information System Network: Alpha version 0.1, year three final report. [Reston, Va.?]: U.S. Dept. of the Interior, U.S. Geological Survey, 1993.
Znajdź pełny tekst źródłaSeas, Andrew. Alpha Two: True near Future Cyberpunk Where Hacker, Helix Carone, Is Fed Snippets of Information Via the Virtual World, the Neural-Net, from an Android That Is Jacked-In Named Alpha Two. . Independently Published, 2019.
Znajdź pełny tekst źródłaWilliamson, Jaden. D⋃ΡΗΑSͲΟΝ: Complete Guide and Information on Duphaston, Uses, Dosage, Side Effeect and Precations. Independently Published, 2019.
Znajdź pełny tekst źródłaJORDAN, Grizzel GRIZZEL. Password Book: Password Book with Alphabetical Sort , Private Information Keeper , Logins and Web Addresses, Login and Private Information Keeper , So You Can Log into , Password and Email Book , What Do You Want to Be, Private Information Keeper , Alpha. Independently Published, 2021.
Znajdź pełny tekst źródłaPfurtscheller, Gert, i Fernando Lopes da Silva. EEG Event-Related Desynchronization and Event-Related Synchronization. Redaktorzy Donald L. Schomer i Fernando H. Lopes da Silva. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780190228484.003.0040.
Pełny tekst źródłaCzęści książek na temat "Alpha-information"
Neller, Todd W. "Information-Based Alpha-Beta Search and the Homicidal Chau.eur". W Hybrid Systems: Computation and Control, 323–36. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45873-5_26.
Pełny tekst źródłaOelert, W. "Structure Information and Reaction Mechanism Studies in the Alpha Transfer". W Clustering Aspects of Nuclear Structure, 245–59. Dordrecht: Springer Netherlands, 1985. http://dx.doi.org/10.1007/978-94-009-5366-6_14.
Pełny tekst źródłaAltman, Eitan, Konstantin Avrachenkov i Andrey Garnaev. "Alpha-Fair Resource Allocation under Incomplete Information and Presence of a Jammer". W Lecture Notes in Computer Science, 219–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10406-0_15.
Pełny tekst źródłaRioul, Olivier. "A Primer on Alpha-Information Theory with Application to Leakage in Secrecy Systems". W Lecture Notes in Computer Science, 459–67. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-80209-7_50.
Pełny tekst źródłaTan, Taizhe, Hailing Liu, Yinwei Zhan i Yuzhen Jin. "Multi-modality Medical Image Registration Based on Improved I-alpha Information (SNI) with Gradient". W Artificial Intelligence and Computational Intelligence, 59–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33478-8_8.
Pełny tekst źródłaGronwald, Klaus-Dieter. "Post-Merger Situation: Alpha Beer". W Integrated Business Information Systems, 161–67. Berlin, Heidelberg: Springer Berlin Heidelberg, 2017. http://dx.doi.org/10.1007/978-3-662-53291-1_15.
Pełny tekst źródłaCalvès, Christophe, i Maribel Fernández. "Nominal Matching and Alpha-Equivalence". W Logic, Language, Information and Computation, 111–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-69937-8_11.
Pełny tekst źródłaCavender-Bares, Jeannine, Anna K. Schweiger, Jesús N. Pinto-Ledezma i Jose Eduardo Meireles. "Applying Remote Sensing to Biodiversity Science". W Remote Sensing of Plant Biodiversity, 13–42. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-33157-3_2.
Pełny tekst źródłaUohashi, Keiko. "Harmonic Maps Relative to $$\alpha $$ α -Connections". W Geometric Theory of Information, 81–96. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05317-2_4.
Pełny tekst źródłaFigueroa-García, Juan-Carlos, Roman Neruda i Carlos Franco. "On Truncating Fuzzy Numbers with $$\alpha $$-Levels". W Fuzzy Information Processing 2023, 258–67. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-46778-3_24.
Pełny tekst źródłaStreszczenia konferencji na temat "Alpha-information"
Esposito, Amedeo Roberto, Diyuan Wu i Michael Gastpar. "On conditional Sibson's $\alpha$ -Mutual Information". W 2021 IEEE International Symposium on Information Theory (ISIT). IEEE, 2021. http://dx.doi.org/10.1109/isit45174.2021.9517944.
Pełny tekst źródłaLiu, Changchun, Jinbao Yang, Shunbo Hu, Jason J. Gu i Mengsun Yu. "Normalized I-Alpha-Information for Medical Image Registration". W 2007 Canadian Conference on Electrical and Computer Engineering. IEEE, 2007. http://dx.doi.org/10.1109/ccece.2007.296.
Pełny tekst źródłaKamimura, R., i S. Nakanishi. "Improving generalization performance by controlling /spl alpha/-information". W Proceedings of 1994 IEEE International Conference on Neural Networks (ICNN'94). IEEE, 1994. http://dx.doi.org/10.1109/icnn.1994.374232.
Pełny tekst źródłaMtsuyama, Y., T. Nimoto, N. Katsumata, Y. Suzuki i S. Furukawa. "/spl alpha/-EM algorithm and /spl alpha/-ICA learning based upon extended logarithmic information measures". W Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000. Neural Computing: New Challenges and Perspectives for the New Millennium. IEEE, 2000. http://dx.doi.org/10.1109/ijcnn.2000.861329.
Pełny tekst źródłaDing, Ni, Mohammad Amin Zarrabian i Parastoo Sadeghi. "$\alpha$-Information-theoretic Privacy Watchdog and Optimal Privatization Scheme". W 2021 IEEE International Symposium on Information Theory (ISIT). IEEE, 2021. http://dx.doi.org/10.1109/isit45174.2021.9518220.
Pełny tekst źródłaUchida, M., i J. Kurose. "An Information-Theoretic Characterization of Weighted alpha-Proportional Fairness". W 2009 Proceedings IEEE INFOCOM. IEEE, 2009. http://dx.doi.org/10.1109/infcom.2009.5062017.
Pełny tekst źródłaLiu, Yi, Julien Béguinot, Wei Cheng, Sylvain Guilley, Loïc Masure, Olivier Rioul i François-Xavier Standaert. "Improved Alpha-Information Bounds for Higher-Order Masked Cryptographic Implementations". W 2023 IEEE Information Theory Workshop (ITW). IEEE, 2023. http://dx.doi.org/10.1109/itw55543.2023.10161608.
Pełny tekst źródłaLiu, Yi, Wei Cheng, Sylvain Guilley i Olivier Rioul. "On Conditional Alpha-Information and its Application to Side-Channel Analysis". W 2021 IEEE Information Theory Workshop (ITW). IEEE, 2021. http://dx.doi.org/10.1109/itw48936.2021.9611409.
Pełny tekst źródłaGriffiths, Benjamin J., Stephen D. Mayhew, Karen J. Mullinger, João Jorge, Ian Charest, Maria Wimber i Simon Hanslmayr. "Alpha/beta power decreases track the fidelity of stimulus-specific information". W 2019 Conference on Cognitive Computational Neuroscience. Brentwood, Tennessee, USA: Cognitive Computational Neuroscience, 2019. http://dx.doi.org/10.32470/ccn.2019.1199-0.
Pełny tekst źródłaFilipe, Pedro, António Preto, Panos Koukos, Alexandre Bonvin i Irina Moreira. "Alpha-helical and beta-sheet membrane- membrane protein dimers: centralizing information". W MOL2NET 2017, International Conference on Multidisciplinary Sciences, 3rd edition. Basel, Switzerland: MDPI, 2017. http://dx.doi.org/10.3390/mol2net-03-05107.
Pełny tekst źródłaRaporty organizacyjne na temat "Alpha-information"
Bounds, J. A. Technology information profile: Long-Range Alpha Detector (LRAD). Office of Scientific and Technical Information (OSTI), luty 1995. http://dx.doi.org/10.2172/10116822.
Pełny tekst źródłaHlushak, Oksana M., Volodymyr V. Proshkin i Oksana S. Lytvyn. Using the e-learning course “Analytic Geometry” in the process of training students majoring in Computer Science and Information Technology. [б. в.], wrzesień 2019. http://dx.doi.org/10.31812/123456789/3268.
Pełny tekst źródłaMiller, R. E., i D. L. Smith. A compilation of information on the {sup 31}P(p,{alpha}){sup 28}Si reaction and properties of excited levels in the compound nucleus {sup 32}S. Office of Scientific and Technical Information (OSTI), listopad 1997. http://dx.doi.org/10.2172/578637.
Pełny tekst źródłaGurevitz, Michael, Michael E. Adams, Boaz Shaanan, Oren Froy, Dalia Gordon, Daewoo Lee i Yong Zhao. Interacting Domains of Anti-Insect Scorpion Toxins and their Sodium Channel Binding Sites: Structure, Cooperative Interactions with Agrochemicals, and Application. United States Department of Agriculture, grudzień 2001. http://dx.doi.org/10.32747/2001.7585190.bard.
Pełny tekst źródłaGurevitz, Michael, Michael E. Adams i Boaz Shaanan. Structural Elements and Neuropharmacological Features Involved in the Insecticidal Properties of an Alpha Scorpion Neurotoxin: A Multidisciplinary Approach. United States Department of Agriculture, sierpień 1995. http://dx.doi.org/10.32747/1995.7573061.bard.
Pełny tekst źródła