Search alternatives:
process optimization » robust optimization (Expand Search), policy optimization (Expand Search)
model optimization » codon optimization (Expand Search), global optimization (Expand Search), wolf optimization (Expand Search)
based process » based processes (Expand Search), based probes (Expand Search), based proteins (Expand Search)
binary based » library based (Expand Search), binary mask (Expand Search), linac based (Expand Search)
binary a » binary _ (Expand Search), binary b (Expand Search), hilary a (Expand Search)
a model » _ model (Expand Search), 3d model (Expand Search)
process optimization » robust optimization (Expand Search), policy optimization (Expand Search)
model optimization » codon optimization (Expand Search), global optimization (Expand Search), wolf optimization (Expand Search)
based process » based processes (Expand Search), based probes (Expand Search), based proteins (Expand Search)
binary based » library based (Expand Search), binary mask (Expand Search), linac based (Expand Search)
binary a » binary _ (Expand Search), binary b (Expand Search), hilary a (Expand Search)
a model » _ model (Expand Search), 3d model (Expand Search)
-
1
Python-Based Algorithm for Estimating NRTL Model Parameters with UNIFAC Model Simulation Results
Published 2025“…A Python-based algorithm was developed for estimating the nonrandom two-liquid (NRTL) model parameters of aqueous binary systems in a straightforward manner from simplified molecular-input line-entry specification (SMILES) strings of substances in a system. …”
-
2
-
3
-
4
A* Path-Finding Algorithm to Determine Cell Connections
Published 2025“…</p><p dir="ltr">Astrocytes were dissociated from E18 mouse cortical tissue, and image data were processed using a Cellpose 2.0 model to mask nuclei. …”
-
5
-
6
-
7
-
8
-
9
Machine Learning-Ready Dataset for Cytotoxicity Prediction of Metal Oxide Nanoparticles
Published 2025“…Details on the data sourcing process, prompt engineering strategies for large language model (LLM)-based extraction, and validation protocols are provided in the Supplementary Information section.…”