Other

The 729 molecular descriptor information (independent variables) of 1974 compounds

The biological activity of 1974 compounds against ERα

The five ADMET properties

Categories:
131 Views

simulation data

Categories:
72 Views

Alboom is a crowd-based smartphone application and database system to record, store, analyze, share, and provide early warning information regarding harmful algal blooms (HABs). Similar to other participatory-based applications, the willingness of community members to be actively involved is paramount to the success of the application implementation. The dataset is the investigation results of usability and acceptance of Alboom. The questionnaires were built using an augmented technology acceptance model (TAM) to identify factors that affect the continual use intention of the application.

Categories:
123 Views

 DFT-NEGF analysis of Fe/MgO/Fe MTJ having gate voltage over insulated barrier region (MgO) is presented. Because of different work functions of gate and barrier materials, transfer of density of states (DOS) in forbidden energy gap of MgO is found above Fermi energy due to Schottky effect.

Categories:
135 Views

Several works attempted to establish procedures to individuate bugs, defects or anomalies during the different phases of software development, especially in the implementation phase. The mere detection of anomalies is not sufficient, though, at least until they get fixed. Corrective actions can be formulated to remove anomalies and enhance the software quality. Preventive actions are equally important in as much as they avoid the emergence and recurrence of anomalies in the future.

Categories:
316 Views

Flight data recorded during experiment.

Categories:
158 Views

This platform is bio-inspired musculoskeletal robot, which contains biological muscular dynamics and brain-inspired control methods.

Categories:
129 Views

The Bitcoin Lightning Network (LN) disrupts the scenario as a fast and scalable method to make payment transactions off-chain, alongside the Bitcoin network, thereby reducing the on-chain burden. Understanding the topology of the LN is crucial, not only because it is key to performance, but also for ensuring its security and privacy guarantees. The topology of the LN affects, among others, the ability to successfully route payments between nodes, its resilience (against both attacks and random failures), and the privacy of payments.

Categories:
255 Views

Quantum volume (QV) has become the de-facto standard benchmark to quantify the capability of Noisy Intermediate-Scale Quantum (NISQ) devices. While QV values are often reported by NISQ providers for their systems, we perform our own series of QV calculations on 24 NISQ devices currently offered by IBM~Q, IonQ, Rigetti, Oxford Quantum Circuits, and Quantinuum (formerly Honeywell). Our approach characterizes the performances that an advanced user of these NISQ devices can expect to achieve with a reasonable amount of optimization, but without white-box access to the device.

Categories:
158 Views

Companion data of the paper "Using social media and personality traits to assess software developers’ emotions" submitted to the IEEE Access journal, 2022. This dataset contains the anonymized dataset used in the study, including the answers of demographic survey, the answers to the Big Five Inventory, the experiment protocol, the manual analysis from psychologists and participants, all generated charts and data analysis.

Categories:
415 Views

Pages