Results 91 to 100 of about 573,472 (352)

Link Clustering with Extended Link Similarity and EQ Evaluation Division. [PDF]

open access: yes, 2013
Link Clustering (LC) is a relatively new method for detecting overlapping communities in networks. The basic principle of LC is to derive a transform matrix whose elements are composed of the link similarity of neighbor links based on the Jaccard ...
Blanzieri, Enrico   +4 more
core   +2 more sources

Deterministic Detection of Single Ion Implantation

open access: yesAdvanced Engineering Materials, EarlyView.
Focused ion beam implantation with high detection efficiencies will enable the rapid and scalable fabrication of advanced spin‐based technologies such as qubits. This work presents the detection efficiencies of a wide range of ions implanted into solid‐state hosts, with efficiencies of >90% recorded for ion species and substrate combinations of ...
Mason Adshead   +6 more
wiley   +1 more source

Chemoselective Sequential Polymerization: An Approach Toward Mixed Plastic Waste Recycling

open access: yesAdvanced Functional Materials, EarlyView.
Inspired by biological protein metabolism, this study demonstrates the closed‐loop recycling of mixed synthetic polymers via ring‐closing depolymerization followed by a chemoselective sequential polymerizations process. The approach recovers pure polymers from mixed feedstocks, even in multilayer formats, highlighting a promising strategy to overcome a
Gadi Slor   +5 more
wiley   +1 more source

Report of Euseius amissibilis (Acari: Phytoseiidae) from citrus orchards of the western part of Mazandaran, Iran [PDF]

open access: yesنامه انجمن حشره‌شناسی ایران, 2008
During 2005-2006, a faunistic study was carried out to identify predatory mites associated with citrus trees in the western part of Mazandaran, Iran. Five species, viz. Amblyseius herbicolus Chant, Typhlodromips caspiansis Denmark & Daneshvar, Neoseiulus
M. Shiroodbakhshi   +3 more
doaj  

Pseudomyxoma peritonei due to mucinous adenocarcinoma of the appendix

open access: yesJournal of the Belgian Society of Radiology, 2013
A 60-year-old man was referred for evaluation of long-standing abdominal pain. CT scan of the abdomen showed a fluid-filled dilated appendix with mural calcifications (Fig.
S Idjuski   +3 more
doaj   +1 more source

Shaping Ti3C2 MXene Nanospheres for Precision Near‐Infrared Photothermal Therapy

open access: yesAdvanced Functional Materials, EarlyView.
In this study, we report producing spherical MXenes via fs laser fragmentation of Ti3C2 flakes in liquid medium. The nanoparticles demonstrated pronounced light absorption and high photothermal conversion efficiencies of 68% and 63% under heating with NIR‐I and NIR‐II lasers, respectively.
Julia S. Babkova   +21 more
wiley   +1 more source

Research Note: Contribution to Mushroom Flora of Rawalpindi-Islamabad, Pakistan

open access: yesJournal of Bioresource Management, 2014
Seven hymenomycetous fungi (mushrooms) were collected from the twin cities area during July 2008. These were identified as the members of the order Agaricales, class Basidiomycetes.
Kishwar Sultana   +3 more
doaj   +1 more source

Pasture Productivity Trial [PDF]

open access: yes, 2017
Pasture is an essential component of the ration on organic dairy farms. Productivity of pastures is key to ensure the cattle have a plentiful source of high quality feed during the entire grazing season.
Cummings, Erica   +4 more
core   +1 more source

3D‐Printed Porous Hydroxyapatite Formed via Enzymatic Mineralization

open access: yesAdvanced Functional Materials, EarlyView.
Bone combines lightness, strength, and the ability to heal, inspiring new materials design. This work introduces a room‐temperature, enzyme‐mediated 3D printing method to create porous hydroxyapatite scaffolds. The process avoids energy‐intensive sintering, preserves bioactivity, and allows control over porosity and mineralization.
Francesca Bono   +6 more
wiley   +1 more source

IP PBX Asterisk NOW telecommunication network and choice of tools for carrying out attacks. Development and research of the attack scheme to the developed client–server network on the basis of Wi-Fi

open access: yesҚарағанды университетінің хабаршысы. Физика сериясы, 2016
Communication of clients with the server passes through a wireless point of Wi-Fi access. The attacking device is the laptop which has the software package of CommView for Wi-Fi.
M.Z. Yakubova, T.G. Serikov
doaj  

Home - About - Disclaimer - Privacy