Results 101 to 110 of about 3,230,283 (325)
Magnetic particle capture in high‐gradient magnetic separation: A theoretical and experimental study
Abstract High‐gradient magnetic separation (HGMS) has traditionally been used in mineral processing, with many effective models developed for typically employed rod‐wire shaped matrices. However, its potential in bioprocessing, especially for high‐value products, introduces new demands on plant and matrix design. This study presents a multi‐scale model
Marko Tesanovic+3 more
wiley +1 more source
Abstract Distillation is widely used for separating liquid mixtures, but its high heating demand poses challenges for achieving net‐zero emissions. This study presents an innovative approach to electrifying distillation for load adaptability and flexible operation, aligning with dynamic electricity markets driven by renewables.
Meng Qi+5 more
wiley +1 more source
Vertex operator algebras, Higgs branches, and modular differential equations
Every four-dimensional N=2 $$ \mathcal{N}=2 $$ superconformal field theory comes equipped with an intricate algebraic invariant, the associated vertex operator algebra.
Christopher Beem, Leonardo Rastelli
doaj +1 more source
Algebraic Number Theory and Code Design for Rayleigh Fading Channels [PDF]
Frédérique Oggier, Emanuele Viterbo
openalex +2 more sources
Abstract The modernization of pharmaceutical manufacturing is driving a shift from traditional batch processing to continuous alternatives. Synthesizing end‐to‐end optimal (E2EO) manufacturing routes is crucial for the pharmaceutical industry, especially when considering multiple operating modes—such as batch, continuous, or hybrid (containing both ...
Yash Barhate+4 more
wiley +1 more source
On Algebraic Number Theory Domains Dedekind [PDF]
Ghadge Ramesh Bhaskarrao -
openalex +1 more source
Process Resilience under Optimal Data Injection Attacks
Abstract In this article, we study the resilience of process systems in an information‐theoretic framework, from the perspective of an attacker capable of optimally constructing data injection attacks. The attack aims to distract the stationary distributions of process variables and stay stealthy, simultaneously.
Xiuzhen Ye, Wentao Tang
wiley +1 more source
A computational introduction to number theory and algebra [PDF]
Victor Shoup
openalex +2 more sources
A Privacy‐Preserving System for Confidential Carpooling Services Using Homomorphic Encryption
This research presents a homomorphic encryption‐based solution to enhance privacy in carpooling without compromising functionality. Rigorous experiments confirm its robustness, accuracy, and efficiency in securely matching users while preserving confidentiality.
David Palma+3 more
wiley +1 more source