Results 71 to 80 of about 3,457,300 (349)

A Lissajous Curve–Based Method for Busbar Protection

open access: yesInternational Transactions on Electrical Energy Systems
In this paper, a novel time-domain method based on the orientation analysis of the superimposed current component Lissajous curves is presented for busbar protection.
M. Sarlak
doaj   +1 more source

Assessing Asymmetric Fault-Tolerant Software [PDF]

open access: yes, 2010
The most popular forms of fault tolerance against design faults use "asymmetric" architectures in which a "primary" part performs the computation and a "secondary" part is in charge of detecting errors and performing some kind of error processing and ...
Popov, P. T., Strigini, L.
core   +1 more source

Patient‐specific pharmacogenomics demonstrates xCT as predictive therapeutic target in colon cancer with possible implications in tumor connectivity

open access: yesMolecular Oncology, EarlyView.
This study integrates transcriptomic profiling of matched tumor and healthy tissues from 32 colorectal cancer patients with functional validation in patient‐derived organoids, revealing dysregulated metabolic programs driven by overexpressed xCT (SLC7A11) and SLC3A2, identifying an oncogenic cystine/glutamate transporter signature linked to ...
Marco Strecker   +16 more
wiley   +1 more source

Enhancing the EAST-ADL error model with HiP-HOPS semantics [PDF]

open access: yes, 2014
EAST-ADL is a domain-specific modelling language for the engineering of automotive embedded systems. The language has abstractions that enable engineers to capture a variety of information about design in the course of the lifecycle — from requirements ...
Chen, De-Jiu   +5 more
core  

Aggressive prostate cancer is associated with pericyte dysfunction

open access: yesMolecular Oncology, EarlyView.
Tumor‐produced TGF‐β drives pericyte dysfunction in prostate cancer. This dysfunction is characterized by downregulation of some canonical pericyte markers (i.e., DES, CSPG4, and ACTA2) while maintaining the expression of others (i.e., PDGFRB, NOTCH3, and RGS5).
Anabel Martinez‐Romero   +11 more
wiley   +1 more source

Deep Learning-Based Algorithm for Internal Fault Detection of Power Transformers during Inrush Current at Distribution Substations

open access: yesEnergies
The reliability and stability of differential protection in power transformers could be threatened by several types of inferences, including magnetizing inrush currents, current transformer saturation, and overexcitation from external faults.
Sopheap Key, Gyu-Won Son, Soon-Ryul Nam
doaj   +1 more source

Cooperative Virtual Sensor for Fault Detection and Identification in Multi-UAV Applications [PDF]

open access: yes, 2018
This paper considers the problem of fault detection and identification (FDI) in applications carried out by a group of unmanned aerial vehicles (UAVs) with visual cameras.
Heredia Benot, Guillermo   +2 more
core   +2 more sources

Intein‐based modular chimeric antigen receptor platform for specific CD19/CD20 co‐targeting

open access: yesMolecular Oncology, EarlyView.
CARtein is a modular CAR platform that uses split inteins to splice antigen‐recognition modules onto a universal signaling backbone, enabling precise, scarless assembly without re‐engineering signaling domains. Deployed here against CD19 and CD20 in B‐cell malignancies, the design supports flexible multi‐antigen targeting to boost T‐cell activation and
Pablo Gonzalez‐Garcia   +9 more
wiley   +1 more source

Self-testing and repairing computer Patent [PDF]

open access: yes, 1970
Self testing and repairing computer comprising control and diagnostic unit and rollback points for error ...
Avizienis, A. A.
core   +1 more source

A goal-based modeling approach to develop security requirements of fault tolerant security-critical systems [PDF]

open access: yes, 2012
Large amount of (security) faults existing in software systems could be complex and hard to identify during the fault analysis. So, it is not always possible to fully mitigate the internal or external security faults (vulnerabilities or threats) within ...
Moghtadaei, Mohammad   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy