Search alternatives:
protein function » protein glycation (Expand Search)
Showing 1 - 20 results of 26 for search '(( algorithm hardening function ) OR ( algorithm ((protein function) OR (python function)) ))', query time: 0.09s Refine Results
  1. 1

    Computational evluation of protein energy functions by Mansour, Nashat

    Published 2014
    “…A protein is characterized by its 3D structure, which defines its biological function. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 2

    Evolutionary algorithm for protein structure prediction by Mansour, Nashat

    Published 2010
    “…A protein is characterized by its 3D structure, which defines its biological function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 3

    Scatter Search algorithm for Protein Structure Prediction by Mansour, Nashat

    Published 2016
    “…Given the protein's sequence of Amino Acids (AAs), our algorithm produces a 3D structure that aims to minimise the energy function associated with the structure. …”
    Get full text
    Get full text
    Get full text
    article
  4. 4

    Evolutionary algorithm for predicting all-atom protein structure by Mansour, Nashat

    Published 2011
    “…This algorithm produces a 3D structure of the whole protein, including back-bone and side-chain atoms, by minimizing the energy function associated with the structure. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 5
  6. 6

    New aspect-oriented constructs for security hardening concerns by Mourad, Azzam

    Published 2009
    “…They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …”
    Get full text
    Get full text
    Get full text
    article
  7. 7

    New primitives to AOP weaving capabilities for security hardening concerns by Mourad, Azzam

    Published 2007
    “…They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 8

    Common weaving approach in mainstream languages for software security hardening by Alhadidi, Dima

    Published 2013
    “…In this paper, we propose a novel aspect-oriented approach based on GIMPLE, a language-independent and a tree-based representation generated by the GNU Compiler Collection (GCC), for the systemization of application security hardening. The security solutions are woven into GIMPLE representations in a systematic way, eliminating the need for manual hardening that might generate a considerable number of errors. …”
    Get full text
    Get full text
    Get full text
    article
  9. 9
  10. 10
  11. 11
  12. 12

    Fragment-based computational protein structure prediction by Mansour, Nashat

    Published 2014
    “…The 3-dimensional configuration determines a protein’s function. Hence, it is very important to determine the correct structure in order to identify the wrong folding that indicates a disease situation. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 13

    Fragment based protein structure prediction. (c2013) by Terzian, Meghrig Ohanes

    Published 2016
    “…The results, evaluated on three proteins, show that the algorithm produces tertiary structures with promising root mean square deviations, within reasonable times.…”
    Get full text
    Get full text
    masterThesis
  14. 14

    An Introduction to the Special Issue “Protein Glycation in Food, Nutrition, Health and Disease” by Naila Rabbani (291722)

    Published 2022
    “…The keynote speaker was Lasker Laureate Professor Kazutoshi Mori, speaking on the unfolded protein response, and there were sessions on: glycation in obesity, diabetes, and diabetic complications; glycation in food; glycation through the life course—from maternal bonding to aging; glycation in plants—physiology, function, and food security; glycation in the COVID-19 response; glycation analytics and chemistry; glycation in kidney disease, cancer, and mental health; glycation-related imaging, diagnostic algorithms, and therapeutics; and methods and models in glycation research. …”
  15. 15

    Scatter search metaheuristic for homology based protein structure prediction. (c2015) by Stamboulian, Mouses Hrag

    Published 2015
    “…Determining a protein’s structure is a challenging goal in structural bioinformatics, offering important insight towards understanding the function of a protein. …”
    Get full text
    Get full text
    masterThesis
  16. 16

    AGEomics Biomarkers and Machine Learning—Realizing the Potential of Protein Glycation in Clinical Diagnostics by Naila Rabbani (291722)

    Published 2022
    “…The term AGEomics is defined as multiplexed quantitation of spontaneous modification of proteins damage and other usually low-level modifications associated with a change of structure and function—for example, citrullination and transglutamination. …”
  17. 17

    Particle swarm optimization approach for protein structure prediction in the 3D HP model by Mansour, Nashat

    Published 2012
    “…Proteins fold, under the influence of several chemical and physical factors, into their 3D structures, which determine their biological functions and properties. …”
    Get full text
    Get full text
    Get full text
    article
  18. 18

    LNCRI: Long Non-Coding RNA Identifier in Multiple Species by Saleh Musleh (15279190)

    Published 2021
    “…<p>The pervasive nature of long non-coding RNA (lncRNA) transcription in the mammalian genomes has changed our protein-centric view of genomes. But the identification of lncRNAs is an important task to discover their functional role in species. …”
  19. 19
  20. 20

    Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité by Mourad, Azzam

    Published 2009
    “…They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
    Get full text
    Get full text
    Get full text
    article