نتایج جستجو برای: stealth liposome
تعداد نتایج: 8672 فیلتر نتایج به سال:
The development of the Earned Schedule (ES) method by Lipke in 2003 has been shown to be an important extension to the Earned Value Management (EVM) method, increasing the utility of EVM data for project schedule analysis, control and oversight. As ES provides a reliable time-based indicator of Schedule Performance, the objective of this paper is to investigate whether the SPI(t) exhibited simi...
Introduction: The National Research Council Decadal Study on Terrestrial Analogs to Mars recommended the Bishop Tuff, exposed in the Volcanic Tableland, Bishop, California (Fig. 1), as an analog [1] because some Martian volcanoes and the Stealth region of southwestern Tharsis are thought to be composed of pyroclastic deposits [2–4]. Recent data from the Spirit rover also suggest that the Columb...
Manymalicious programs are just previously-seen programs that have had someminor changes made to them. A slightly different variant hardly qualifies as a stealth attack: being 99% the same as a known piece of malware should be a dead giveaway. This white paper describes a method for searching database of programs for a match. The methods are adapted from ordinary text search and analysis; the k...
Incorporation of membrane proteins into reconstituted lipid membranes is a common approach for studying their structure and function relationship in native-like environment. In this work, we investigated fluorescence properties liposome-reconstituted major light-harvesting complexes plants (LHCII). By utilizing liposome labelling with the fluorescent dye molecules single-molecule microscopy tec...
Level design for stealth games requires the ability to explore and understand the possible paths players may take through a given scenario and how they are impacted by different design choices. Good tool support can help by demonstrating the existence of such paths, but for rapid, interactive design, the relative difficulty of possible solutions also needs to be quantified, in a way that correl...
Question Wording & Indices for the CCES data: p. 2 Question Wording & Indices for the KN data: p. 4 Figure R1: Specification of the Three-Factor (SEM) Measurement Model: p. 6 Figure R2: Range of MOC Treatment x Stealth Interaction: p. 7 Table R1: Predicting Two Types of Political Participation (CCES): p. 8 Table R2: Predicting Two Types of Political Participation (KN): p. 9 Table R3: Participat...
The extent to which opportunities afforded by e-learning are embraced by an institution can depend in large measure on whether it is perceived as enabling and transformative or as a major and disruptive distraction. Most case studies focus on the former. This paper describes how e-learning was introduced into the latter environment. The sensitivity of competing pressures in a research intensive...
Motion camouflage is a stealth strategy observed in nature. We formulate the problem as a feedback system for particles moving at constant speed, and define what it means for the system to be in a state of motion camouflage. (Here we focus on the planar setting, although the results can be generalized to three-dimensional motion.) We propose a biologically plausible feedback law, and use a high...
The extent to which opportunities afforded by e-learning are embraced by an institution can depend in large measure on whether it is perceived as enabling and transformative or as a major and disruptive distraction. Most case studies focus on the former. This paper describes how e-learning was introduced into the latter environment. The sensitivity of competing pressures in a research intensive...
The extent to which opportunities afforded by e-learning are embraced by an institution can depend in large measure on whether it is perceived as enabling and transformative or as a major and disruptive distraction. Most case studies focus on the former. This paper describes how e-learning was introduced into the latter environment. The sensitivity of competing pressures in a research intensive...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید