Results 21 to 30 of about 2,662,524 (294)

Near-threshold hadron scattering with effective field theory [PDF]

open access: yesEPJ Web of Conferences
. When an exotic hadron locates near the threshold with the channel couplings, the internal structure of the exotic hadron is related to the scattering length. To incorporate the threshold effect, the Flatté amplitude has been often used to determine the
Sone Katsuyoshi, Hyodo Tetsuo
doaj   +1 more source

A model for the onset of transport in systems with distributed thresholds for conduction [PDF]

open access: yes, 2004
We present a model supported by simulation to explain the effect of temperature on the conduction threshold in disordered systems. Arrays with randomly distributed local thresholds for conduction occur in systems ranging from superconductors to metal ...
A. Priolo   +7 more
core   +1 more source

Simple threshold rules solve explore/exploit trade‐offs in a resource accumulation search task [PDF]

open access: yes, 2020
How, and how well, do people switch between exploration and exploitation to search for and accumulate resources? We study the decision processes underlying such exploration/exploitation trade‐offs using a novel card selection task that captures the ...
Baumann C.   +5 more
core   +1 more source

Towards Data Driven Spatio-Temporal Threshold Identification Based on Cost Effective Public Health Information Management Framework

open access: yesIEEE Access, 2022
Appropriate public health action comes from data driven decision support systems. While sophisticated health information exchange framework may be costly in developing countries, the health care delivery system in place may provide a promising ...
Muhammad Nazakat   +3 more
doaj   +1 more source

TAW: Cost-Effective Threshold Authentication With Weights for Internet of Things

open access: yesIEEE Access, 2019
In the Internet of Things, based on the collaboration of sensing nodes, sensing data are collected and transmitted. The collaboration of sensing nodes also plays an important role in the safeguard of the Internet of Things.
Zhenhu Ning   +7 more
doaj   +1 more source

Threshold Resummation in Momentum Space from Effective Field Theory [PDF]

open access: yes, 2006
Methods from soft-collinear effective theory are used to perform the threshold resummation of Sudakov logarithms for the deep-inelastic structure function F_2(x,Q^2) in the endpoint region x->1 directly in momentum space. An explicit all-order formula is
Becher, Thomas   +2 more
core   +2 more sources

Quantum State Sensitivity of an Autoresonant Superconducting Circuit [PDF]

open access: yes, 2012
When a frequency chirped excitation is applied to a classical high-Q nonlinear oscillator, its motion becomes dynamically synchronized to the drive and large oscillation amplitude is observed, provided the drive strength exceeds the critical threshold ...
Ginossar, E.   +5 more
core   +2 more sources

Exploring the threshold for the start of respiratory syncytial virus infection epidemic season using sentinel surveillance data in Japan

open access: yesFrontiers in Public Health, 2023
IntroductionAn unusual seasonality of respiratory syncytial virus (RSV) infection in Japan is observed in recent years after 2017, becoming challenging to prepare for: a seasonal shift from autumn–winter to summer–autumn in 2017–2019, no major epidemic ...
Takeshi Miyama   +11 more
doaj   +1 more source

Effects of threshold resummation [PDF]

open access: yesPhysics Letters B, 1999
12 pages, 2 ...
Lai, Hung-Liang, Li, Hsiang-nan
openaire   +2 more sources

A Novel Approach for Selecting Effective Threshold Values in Ternary State Estimation Using Particle Swarm Optimization

open access: yesApplied Sciences, 2022
Inspired by recent breakthroughs in cyber-physical systems (CPSs) and their applications, in this paper, we propose a novel multi-objective method to optimize the threshold values within the ternary event-based framework. To reduce communication overhead,
Somayeh Davar, Thomas Fevens
doaj   +1 more source

Home - About - Disclaimer - Privacy