Results 71 to 80 of about 462,135 (294)

Attacked risk analysis and influencing factors of nuclear power station [PDF]

open access: yesZhihui kongzhi yu fangzhen
Nuclear power stations are important pillars of the national nuclear system, whose defense security is an important guarantee for ensuring the safety and sustainable development of nuclear energy, providing support for national energy security.
WANG Fengshan, WANG Jinze, WU Fang
doaj   +1 more source

Fabrication, Properties, and Applications of Scaffolds for Bone Tissue Regeneration

open access: yesAdvanced Materials Technologies, EarlyView.
This review explores cutting‐edge biomaterials and fabrication techniques for scaffolds in bone tissue regeneration. It conducts a critical comparison of various strategies, meticulously analyzes the key contradictions in the field, and outlines an integrated development path spanning from biomaterial selection to clinical application, while ...
Shangsi Chen, Min Wang
wiley   +1 more source

Transducers Across Scales and Frequencies: A System‐Level Framework for Multiphysics Integration and Co‐Design

open access: yesAdvanced Materials Technologies, EarlyView.
Transducers convert physical signals into electrical and optical representations, yet each mechanism is bounded by intrinsic trade‐offs across bandwidth, sensitivity, speed, and energy. This review maps transduction mechanisms across physical scale and frequency, showing how heterogeneous integration and multiphysics co‐design transform isolated ...
Aolei Xu   +8 more
wiley   +1 more source

The Adoption Problem and Anti-Exceptionalism about Logic [PDF]

open access: yes, 2019
Anti-exceptionalism about logic takes logic to be, as the name suggests, unexceptional. Rather, in naturalist fashion, the anti-exceptionalist takes logic to be continuous with science, and considers logical theories to be adoptable and revisable ...
Finn, Suki
core   +1 more source

Fibroblast Activation Protein Promotes Thoracic Aortic Dissection via PLAUR/ITGB1‐Mediated Pro‐inflammatory Macrophage Polarization

open access: yesAdvanced Science, EarlyView.
This study reveals that FAP promotes thoracic aortic dissection (TAD) through a nonenzymatic mechanism involving fibroblast‐macrophage crosstalk via the FAP/PLAUR/ITGB1/FAK axis. Targeting this pathway might offer a promising therapeutic strategy for TAD.
Hongqiao Zhu   +7 more
wiley   +1 more source

Argument mining method in financial domain based on large language models

open access: yesNantong Daxue xuebao. Ziran kexue ban
In recent years, financial text analysis has been shifting from coarse-grained sentiment polarity classification to fine-grained inference tasks focusing on logical relations between sentence pairs.
DING Fei;KANG Xin
doaj   +1 more source

Mechanical Overloading‐Induced Nanomineral Crystal Perturbation from the Osteochondral Interface: A Potential Initiator of Osteoarthritis

open access: yesAdvanced Science, EarlyView.
Laser‐induced graphene (LIG) provides a scalable, laser‐direct‐written route to porous graphene architecture with tunable chemistry and defect density. Through heterojunction engineering, catalytic functionalization, and intrinsic self‐heating, LIG achieves highly sensitive and selective detection of NOX, NH3, H2, and humidity, supporting next ...
Nan Jiang   +8 more
wiley   +1 more source

On the influence of topological characteristics on robustness of complex networks

open access: yes, 2013
In this paper, we explore the relationship between the topological characteristics of a complex network and its robustness to sustained targeted attacks.
Kasthurirathna, Dharshana   +2 more
core   +1 more source

Discovery of an Adaptive Neuroimmune Response Driving Itch and Fast Tick Removal with Implications for Preventing Pathogen Transmission

open access: yesAdvanced Science, EarlyView.
Doehl et al. discovered an adaptive neuroimmune mechanism that induces itch in tick‐exposed guinea pigs, enabling rapid tick removal. This itch‐induced tick removal (IITR) is mediated by an adaptive cellular immune response and is independent of IgG, IgE, or TRPV1.
Johannes S. P. Doehl   +27 more
wiley   +1 more source

Modelling fraud detection by attack trees and Choquet integral [PDF]

open access: yes
Modelling an attack tree is basically a matter of associating a logical ÒndÓand a logical ÒrÓ but in most of real world applications related to fraud management the Ònd/orÓlogic is not adequate to effectively represent the relationship between a parent ...
Mario Fedrizzi   +2 more
core  

Home - About - Disclaimer - Privacy