Maryland Shared Open Access Repository
MD-SOAR is a shared digital repository platform for eleven colleges and universities in Maryland. It is currently funded by the University System of Maryland and Affiliated Institutions (USMAI) Library Consortium (usmai.org) and other participating partner institutions. MD-SOAR is jointly governed by all participating libraries, who have agreed to share policies and practices that are necessary and appropriate for the shared platform. Within this broad framework, each library provides customized repository services and collections that meet local institutional needs. Please follow the links below to learn more about each library's repository services and collections.
BrowseCommunities and Collections | By Issue Date | Authors | Titles | Subjects | Type
SubmitSubmit item to MD-SOAR
Institutions in MD-SOAR
Select a community to browse its collections.
Computational predictions suggest that structural similarity in viral polymerases may lead to comparable allosteric binding sites. (Elsevier, 2016-06-01)The identification of ligand-binding sites is often the first step in drug targeting and design. To date there are numerous computational tools available to predict ligand binding sites. These tools can guide or mitigate ...
(Oxord academic, 2018-05-31)Sensory drive, the concept that sensory systems primarily evolve under the influence of environmental features and that animal signals are evolutionarily shaped and tuned by these previously existing sensory systems, has ...
New documentation of pine forest nesting by the Critically Endangered Bahama Oriole (Icterus northropi) (BirdsCaribbean, 2018-08-28)The Bahama Oriole (Icterus northropi) is a Critically Endangered species endemic to The Bahamas and currently found only on the Andros island complex. With the elevation of the Bahama Oriole to full species status in 2011, ...
(Research Gate, 2016-07)As a core mechanism for cybersecurity, the ability to detect cyber-attacks is increasingly critical nowadays. There have been many types of network intrusion detection approaches, such as flow-based and packet-based, ...