Results 61 to 70 of about 1,839,896 (336)
PIR Control Strategy of MMC-RPC Based on Differential Flatness Theory
In order to deal with the negative sequence, reactive power, harmonic and other power quality problems of traction power supply system, the power relationship between the left and right power supply arms of V/v transformer was analyzed, and the power ...
Pinggang SONG +2 more
doaj
Tellipsoid: Exploiting inter-gene correlation for improved detection of differential gene expression [PDF]
Motivation: Algorithms for differential analysis of microarray data are vital to modern biomedical research. Their accuracy strongly depends on effective treatment of inter-gene correlation.
Deller, Jr., J. R. +2 more
core
Tracking Vector Magnetograms with the Magnetic Induction Equation [PDF]
The differential affine velocity estimator (DAVE) developed in Schuck (2006) for estimating velocities from line-of-sight magnetograms is modified to directly incorporate horizontal magnetic fields to produce a differential affine velocity estimator for ...
Fieller E. C. +5 more
core +1 more source
Differential power analysis of stream ciphers with LFSRs
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Bo Qu +3 more
openaire +2 more sources
ABSTRACT Introduction Pulmonary dysfunction and sleep abnormalities are common in children with sickle cell disease (SCD) and are associated with worse clinical outcomes. Whether spirometry abnormalities are associated with polysomnography (PSG) findings remains unclear.
Ammar Saadoon Alishlash +4 more
wiley +1 more source
Design and Evaluation of a DSP Based Differential Relay of Power Transformer
The problem of mal operation of differential protection of power transformer due to the inrush magnetizing current has long considered as a challenging problem.
Abdelkader ABDELMOUMENE +2 more
doaj +1 more source
Innovative Method of the Power Analysis [PDF]
This paper describes an innovative method of the power analysis which presents the typical example of successful attacks against trusted cryptographic devices such as RFID (Radio-Frequency IDentifications) and contact smart cards.
Martinasek, Z., Zeman, V.
core +1 more source
ABSTRACT End‐of‐life conversations with adolescents and young adults (AYAs) with cancer rarely occur without the guidance of healthcare professionals. As a part of the ‘Difficult Discussions’ study, focused on palliative care and advance care planning discussions with AYAs with cancer, we investigated the factors that healthcare professionals identify ...
Justine Lee +9 more
wiley +1 more source
ABSTRACT Background Survivors of childhood acute lymphoblastic leukemia (ALL) often exhibit early deficits in muscle and movement competence, which can compromise long‐term health. Integrative neuromuscular training (INT), a multifaceted approach combining fundamental movement activities with strength exercises, may help address these deficits during ...
Anna Maria Markarian +7 more
wiley +1 more source
Stability and Control of Power Systems using Vector Lyapunov Functions and Sum-of-Squares Methods
Recently sum-of-squares (SOS) based methods have been used for the stability analysis and control synthesis of polynomial dynamical systems. This analysis framework was also extended to non-polynomial dynamical systems, including power systems, using an ...
Anghel, Marian, Kundu, Soumya
core +1 more source

