Results 11 to 20 of about 10,089 (214)

Redundancy Strategies for Hydrogen Injection Into Natural Gas Infrastructure: An Analysis of System Reliability

open access: yesEnergy Science & Engineering
The integration of hydrogen into existing natural gas networks represents a transformative approach to enhancing the utilization of renewable energy sources.
Finn Börje Wesemeyer, Karsten Müller
doaj   +2 more sources

Metronomic Chemotherapy in Breast Cancer: Unleashing the Potential of Combination Regimens. [PDF]

open access: yesCancer Innov
Metronomic chemotherapy (MCT) in breast cancer enhances antitumor efficacy through continuous low‐dose drug administration, reducing toxicity and improving quality of life. Combined with immunotherapy, endocrine therapy, or targeted agents, MCT reshapes the tumor microenvironment, delays resistance, and prolongs survival.
Liu J, Mo H, Li Q, Cazzaniga ME, Ma F.
europepmc   +2 more sources

EDWF-MTTF-based heuristic scheduling algorithm in time-sensitive networks

open access: yesDianxin kexue
With the rapid integration and development of industrial control and information networks, time-sensitive networks based on ethernet have received widespread attention.In these networks, time-triggered communication scheduling is adopted to ensure the ...
Chuanhuang LI   +7 more
doaj   +3 more sources

Reliability of vertical-cavity surface-emitting laser arrays with redundancy

open access: yesAutomatika, 2021
This paper describes theoretical reliability analysis of a system containing n optical ports in which each optical port contains m redundant vertical-cavity surface-emitting lasers.
Dubravko Babić
doaj   +1 more source

Time dependent performance analysis of a Smart Trash bin using state-based Markov model and Reliability approach

open access: yesCleaner Logistics and Supply Chain, 2023
In this paper, the authors have developed a quantitative mathematical model to assess the performance of a smart trash bin. This model takes into account six hardware components of the trash bin, including Arduino Uno, ultrasonic sensor, servo motor ...
Pardeep Kumar, Amit Kumar
doaj   +1 more source

An Approach for Predictive Maintenance Decisions for Components of an Industrial Multistage Machine That Fail before Their MTTF: A Case Study

open access: yesSystems, 2022
Making the correct maintenance strategy decision for industrial multistage machines (MSTM) is a constant challenge for industrial manufacturers. Preventive maintenance strategies are the most popular and provide interesting results but cannot prevent ...
Francisco Javier Álvarez García   +1 more
doaj   +1 more source

Introduction to the special section on dependable network computing [PDF]

open access: yes, 2001
Dependable network computing is becoming a key part of our daily economic and social life. Every day, millions of users and businesses are utilizing the Internet infrastructure for real-time electronic commerce transactions, scheduling important events ...
Avresky, D. R.   +2 more
core   +1 more source

Improved prediction for failure time of multilayer ceramic capacitors (MLCCs): A physics-based machine learning approach

open access: yesAPL Machine Learning, 2023
Multilayer ceramic capacitors (MLCC) play a vital role in electronic systems, and their reliability is of critical importance. The ongoing advancement in MLCC manufacturing has improved capacitive volumetric density for both low and high voltage devices;
Pedram Yousefian   +3 more
doaj   +1 more source

Degradation Analysis of Probabilistic Parallel Choice Systems [PDF]

open access: yes, 2014
Degradation analysis is used to analyze the useful lifetimes of systems, their failure rates, and various other system parameters like mean time to failure (MTTF), mean time between failures (MTBF), and the system failure rate (SFR).
Rao, Shrisha, Saxena, Avinash
core   +1 more source

MODELLING MALWARE PROPAGATION ON THE INTERNET OF THINGS USING AN AGENT BASED APPROACH ON COMPLEX NETWORKS [PDF]

open access: yesJordanian Journal of Computers and Information Technology, 2020
Malware threat is a major hindrance to efficient information exchange on the Internet of Things (IoT). Modelling malware propagation is one of the most imperative applications aimed at understanding mechanisms for protecting the Internet of Things ...
Karanja Evanson Mwangi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy