Results 91 to 100 of about 212,585 (292)
Seismic analysis and design of tunnels within fault ground: A review
The research methods of seismic response of tunnels within fault ground, including field investigations, analytical solutions, physical experiments, and numerical simulations, and seismic countermeasures are discussed. The present study examines the shortcomings and limitations of the current research and design, and puts forward proposals for future ...
Xingda Wang +6 more
wiley +1 more source
This review summarizes the synergistic effects of mixed impurities on ammonia‐selective catalytic reduction (NH3‐SCR) catalysts, including the poisoning mechanism of the catalyst caused by mixed impurities, the antagonistic effects between the impurities, and the research on the anti‐poisoning strategies for the catalyst in recent years.
Hongyan Xue +3 more
wiley +1 more source
Background: Pulmonary fibrosis (PF) is a progressive and fatal lung disorder, and emerging evidence suggests that dysregulation of peroxisome proliferator-activated receptor gamma (PPARγ) plays a critical role in its pathogenesis.
Xueyang Lin +17 more
doaj +1 more source
Collective retaliation and the WTO dispute settlement system [PDF]
Copyright @ 2009 The Estey Centre for Law and Economics in International Trade. Estey Centre Journal of International Law and Trade Policy is an open access journal.Article 22 of the Dispute Settlement Understanding (DSU) of the WTO offers, as last ...
Korotana, MS
core
This review summarizes key parameters including cathode loading and electrolyte consumption, clarifies the practical application scope of alkali metal batteries, and research progress on advanced electrolytes for grid‐scale energy storage systems. The growing demand for grid‐scale battery energy storage systems (BESSs) has prompted researchers to turn ...
Hui Shao, Zhiwei Ni, Jinkui Feng
wiley +1 more source
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali +6 more
wiley +1 more source
Advanced Cloud Privacy Threat Modeling
Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat modeling as a part of requirements engineering in secure software development provides a structured approach for identifying attacks and proposing ...
Gholami, Ali, Laure, Erwin
core +1 more source
How Signals of Silence Sustain Sexual Harassment and What to Do About It
ABSTRACT Sexual harassment has persisted for decades as an open secret within organizations, creating an ongoing challenge for Human Resource practitioners. Many employees experience or witness harassment yet say nothing. When they contemplate complaining, they are discouraged from doing so. Some still muster the courage to speak out about these abuses,
Angela L. Workman‐Stark +6 more
wiley +1 more source
Attack vectors against social networking systems : the Facebook example [PDF]
Social networking systems (SNS’s) such as Facebook are an ever evolving and developing means of social interaction, which is not only being used to disseminate information to family, friends and colleagues but as a way of meeting and interacting ...
Leitch, Shona +2 more
core +2 more sources
Glioblastoma (GBM) is highly aggressive and therapy‐resistant, warranting exploration of novel treatment strategies, among them mechanical high‐intensity focused ultrasound (mFUS), which holds significant promise for tumor ablation. The present study examined mFUS‐induced changes specifically in carbohydrate metabolism, which affects vulnerability to ...
Frieda Bayler +10 more
wiley +1 more source

