Results 91 to 100 of about 1,364,067 (299)
Understanding the Inefficiency of Security-Constrained Economic Dispatch
The security-constrained economic dispatch (SCED) problem tries to maintain the reliability of a power network by ensuring that a single failure does not lead to a global outage.
Cai, Desmond +2 more
core +1 more source
Using supramolecular monomers, various hydrogel culture systems were formulated to culture protoplasts; including 2D, 2.5D, and 3D hydrogels. Depending on the culture platform, bioactive functionalization led to protoplast enlargement (2D and 2.5D) or plasmolysis (3D). This work shows the potential to modularly engineer synthetic platforms for cellular
Maritza M. Rovers +3 more
wiley +1 more source
Infrared (IR) light evokes distinct calcium and water transport responses in astrocytes, depending on stimulation duration and protocol. This study uses widefield imaging and pharmacology to reveal differential engagement of astroglial signaling pathways.
Wilson R. Adams +7 more
wiley +1 more source
SPAN security policies and guidelines [PDF]
A guide is provided to system security with emphasis on requirements and guidelines that are necessary to maintain an acceptable level of security on the network. To have security for the network, each node on the network must be secure.
Green, James L., Sisson, Patricia L.
core +1 more source
Hydrostatic bearings excel in high‐precision applications, but their performance hinges on a continuous external supply. This study evaluates various material combinations for sliding surfaces to mitigate damage during supply failures or misalignment and to discover the most effective materials identified for enhancing the reliability and efficiency of
Michal Michalec +6 more
wiley +1 more source
Modeling and performance evaluation of computer systems security operation
A model of computer system security operation is developed based on the fork-join queueing network formalism. We introduce a security operation performance measure, and show how it may be used to performance evaluation of actual systems.Comment ...
Guster, D., Krivulin, N. K.
core
Building in web application security at the requirements stage : a tool for visualizing and evaluating security trade-offs : a thesis presented in partial fulfilment of the requirements for the degree of Master of Information Science in Information Systems at Massey University, Albany, New Zealand [PDF]
One dimension of Internet security is web application security. The purpose of this Design-science study was to design, build and evaluate a computer-based tool to support security vulnerability and risk assessment in the early stages of web application ...
Nehring, Natalia Alekseevna
core
3D‐Printed Architected Material for the Generation of Foam‐Based Protective Equipment
This study investigates 3D‐printed architected structures as alternatives to traditional foams in protective gear. It focuses on customizing impact strength and damping through design and manufacturing integration. Testing shows these structures outperform conventional foams, offering enhanced customizability, lower weight, and tunable performance ...
Ali Zolfagharian +5 more
wiley +1 more source

