Results 91 to 100 of about 1,364,067 (299)

Understanding the Inefficiency of Security-Constrained Economic Dispatch

open access: yes, 2017
The security-constrained economic dispatch (SCED) problem tries to maintain the reliability of a power network by ensuring that a single failure does not lead to a global outage.
Cai, Desmond   +2 more
core   +1 more source

Using a Supramolecular Approach to Engineer Modular Hydrogel Platforms for Culturing Protoplasts – from General Tissue Engineering to Cellular Agriculture

open access: yesAdvanced Biology, EarlyView.
Using supramolecular monomers, various hydrogel culture systems were formulated to culture protoplasts; including 2D, 2.5D, and 3D hydrogels. Depending on the culture platform, bioactive functionalization led to protoplast enlargement (2D and 2.5D) or plasmolysis (3D). This work shows the potential to modularly engineer synthetic platforms for cellular
Maritza M. Rovers   +3 more
wiley   +1 more source

Infrared Neural Stimulation Elicits Distinct Molecular Pathways in Astrocytes Based on Laser Pulse Parameters

open access: yesAdvanced Biology, EarlyView.
Infrared (IR) light evokes distinct calcium and water transport responses in astrocytes, depending on stimulation duration and protocol. This study uses widefield imaging and pharmacology to reveal differential engagement of astroglial signaling pathways.
Wilson R. Adams   +7 more
wiley   +1 more source

SPAN security policies and guidelines [PDF]

open access: yes
A guide is provided to system security with emphasis on requirements and guidelines that are necessary to maintain an acceptable level of security on the network. To have security for the network, each node on the network must be secure.
Green, James L., Sisson, Patricia L.
core   +1 more source

Comparative Wear and Friction Analysis of Sliding Surface Materials for Hydrostatic Bearing under Oil Supply Failure Conditions

open access: yesAdvanced Engineering Materials, EarlyView.
Hydrostatic bearings excel in high‐precision applications, but their performance hinges on a continuous external supply. This study evaluates various material combinations for sliding surfaces to mitigate damage during supply failures or misalignment and to discover the most effective materials identified for enhancing the reliability and efficiency of
Michal Michalec   +6 more
wiley   +1 more source

Modeling and performance evaluation of computer systems security operation

open access: yes, 2012
A model of computer system security operation is developed based on the fork-join queueing network formalism. We introduce a security operation performance measure, and show how it may be used to performance evaluation of actual systems.Comment ...
Guster, D., Krivulin, N. K.
core  

Building in web application security at the requirements stage : a tool for visualizing and evaluating security trade-offs : a thesis presented in partial fulfilment of the requirements for the degree of Master of Information Science in Information Systems at Massey University, Albany, New Zealand [PDF]

open access: yes, 2007
One dimension of Internet security is web application security. The purpose of this Design-science study was to design, build and evaluate a computer-based tool to support security vulnerability and risk assessment in the early stages of web application ...
Nehring, Natalia Alekseevna
core  

3D‐Printed Architected Material for the Generation of Foam‐Based Protective Equipment

open access: yesAdvanced Engineering Materials, EarlyView.
This study investigates 3D‐printed architected structures as alternatives to traditional foams in protective gear. It focuses on customizing impact strength and damping through design and manufacturing integration. Testing shows these structures outperform conventional foams, offering enhanced customizability, lower weight, and tunable performance ...
Ali Zolfagharian   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy