Results 61 to 70 of about 2,622,455 (327)

Research on Remote Monitoring System for Leakage Protection of Electric Grid in Underground Mine

open access: yes, 2015
Aimed at realizing remote monitoring system for leakage protection of low-voltage power grid in underground mine in Shanxi Province, intelligent leakage protection device with ZigBee are used underground, and the monitoring software based on LabVIEW is ...
Liu Yue   +4 more
semanticscholar   +1 more source

Dapagliflozin prevents methylglyoxal‐induced retinal cell death in ARPE‐19 cells

open access: yesFEBS Open Bio, EarlyView.
Diabetic macular oedema is a diabetes complication of the eye, which may lead to permanent blindness. ARPE‐19 are human retinal cells used to study retinal diseases and potential therapeutics. Methylglyoxal is a compound increased in uncontrolled diabetes due to elevated blood glucose.
Naina Trivedi   +7 more
wiley   +1 more source

METHODOLOGY FOR ASSESSING THE SECURITY OF INFORMATION PASSED THROUGH THE TECHNICAL CHANNELS OF A SPECIAL-PURPOSE INFORMATISATION OBJECT

open access: yesВестник Дагестанского государственного технического университета: Технические науки, 2020
Objectives. In order to determine the security of a special-purpose informatisation object, it is necessary to calculate the effectiveness indicators of information security (IS) measures aimed at preventing unauthorised access (UA) threats associated ...
E. A. Rogozin   +2 more
doaj   +1 more source

Protecting subspaces by acting on the outside

open access: yes, 2010
Many quantum control tasks aim at manipulating the state of a quantum mechanical system within a finite subspace of states. However, couplings to the outside are often inevitable.
Almut Beige   +11 more
core   +1 more source

Monolayer protection for eletrochemical migration control in silver nanocomposite [PDF]

open access: yes, 2006
©2006 American Institute of Physics. The electronic version of this article is the complete one and can be found online at: http://link.aip.org/link/?APPLAB/89/112112/1DOI:10.1063/1.2353813The authors introduced an effective approach of using monolayer ...
Li, Yi, Wong, C. P.
core   +1 more source

Functional and Structural Evidence of Neurofluid Circuit Aberrations in Huntington Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Disrupted neurofluid regulation may contribute to neurodegeneration in Huntington disease (HD). Because neurofluid pathways influence waste clearance, inflammation, and the distribution of central nervous system (CNS)–delivered therapeutics, understanding their dysfunction is increasingly important as targeted treatments emerge.
Kilian Hett   +8 more
wiley   +1 more source

Privacy Games: Optimal User-Centric Data Obfuscation

open access: yes, 2015
In this paper, we design user-centric obfuscation mechanisms that impose the minimum utility loss for guaranteeing user's privacy. We optimize utility subject to a joint guarantee of differential privacy (indistinguishability) and distortion privacy ...
Shokri, Reza
core   +2 more sources

Effects of Carbon Nanoparticles on Triboelectro‐Induced Surface Defects

open access: yesAdvanced Engineering Materials, EarlyView.
Carbon nanoparticles added to grease modify the electrocontact behavior. The synergy of particle concentration and electric current dominates the surface damage of metals in contact. Electrical surface damage caused by current leakage is a critical challenge in high‐performance applications such as electric vehicle (EV) drivetrains and wind turbine ...
Mohsen Tajedini   +6 more
wiley   +1 more source

Design of Selective Leakage Protection Circuit Based on Method of Amplitude Discrimination and Phase Discriminatio

open access: yesGong-kuang zidonghua, 2010
The paper proposed a design scheme of selective leakage protection circuit based on method of amplitude discrimination and phase discrimination for electrical control equipments of fully mechanized devices of coal mine underground.The selective leakage ...
FAN Yi-long~, LI Hang~, YOU Guo-dong~
doaj  

Relations among Security Metrics for Template Protection Algorithms [PDF]

open access: yes, 2013
Many biometric template protection algorithms have been proposed mainly in two approaches: biometric feature transformation and biometric cryptosystem.
Inuma, Manabu, Otsuka, Akira
core   +1 more source

Home - About - Disclaimer - Privacy