Results 111 to 120 of about 4,982 (270)

Der Obelisk

open access: yes, 2012
Source: Friedrich Schiller: Sämtliche Werke, Auf Grund der Originaldrucke herausgegeben von Gerhard Fricke und Herbert G. Göpfert in Verbindung mit Herbert Stubenrauch, Band 1–5, 3. Auflage, München: Hanser, 1962.
openaire   +1 more source

Charge Transport Across Single Molecules at the Metal–Superconductor Interface

open access: yesSmall, EarlyView.
The evolution of Andreev reflection in single‐molecule junctions is probed with the decreasing distance between a normal‐metal tip and a conventional superconductor. Andreev reflection becomes most effective when a molecular orbital straddles the Fermi level.
Lorenz Meyer   +5 more
wiley   +1 more source

Microstructure Evolution in Directionally Solidified Fe–C–Mn–(Si) Peritectic Steels

open access: yessteel research international, EarlyView.
This study investigates how growth velocity and silicon additions affect dendritic morphology, primary arm spacing, and mushy‐zone evolution in directionally solidified quaternary peritectic steels. Silicon substantially broadens the freezing range and lengthens the mushy zone, increasing susceptibility to interdendritic cracking.
André Phillion   +4 more
wiley   +1 more source

Design and Validation of Zeroing Neural Network With Active Noise Rejection Capability for Time‐Varying Problems Solving

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Recently, the zeroing neural network (ZNN) has demonstrated remarkable effectiveness in tackling time‐varying problems, delivering robust performance across both noise‐free and noisy environments. However, existing ZNN models are limited in their ability to actively suppress noise, which constrains their robustness and precision in solving ...
Yilin Shang   +3 more
wiley   +1 more source

From Distributed Noisy Data to Event‐Triggered Pinning Observer‐Based Control

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT This paper presents an event‐triggered pinning observer‐based control of unknown large‐scale interconnected systems under false data injection attacks using distributed noisy data without any system identification step. An exogenous system is used to model the false data injection attack.
Xuan Jia   +3 more
wiley   +1 more source

Linguistic Evidence Suggests that Xiōng‐nú and Huns Spoke the Same Paleo‐Siberian Language

open access: yesTransactions of the Philological Society, EarlyView.
Abstract The Xiōng‐nú were a tribal confederation who dominated Inner Asia from the third century BC to the second century AD. Xiōng‐nú descendants later constituted the ethnic core of the European Huns. It has been argued that the Xiōng‐nú spoke an Iranian, Turkic, Mongolic or Yeniseian language, but the linguistic affiliation of the Xiōng‐nú and the ...
Svenja Bonmann, Simon Fries
wiley   +1 more source

Mujeres Públicas and women in public: Scrutinising the history of prostitution in eighteenth‐ and nineteenth‐century Mexico

open access: yesGender &History, EarlyView.
Abstract Past studies of prostitution have mislabelled Mexican women as prostitutes when it is not clear that they had engaged in transactional sex. Here, we examine the history of prostitution between 1750 and 1865, detailing both legal frameworks and judicial evidence to address the reasons for the inflation of prostitution's presence in Mexico ...
Nora E. Jaffary, Luis Londoño
wiley   +1 more source

Faithful men and false women: Love‐suicide in early modern English popular print

open access: yesGender &History, EarlyView.
Abstract This article explores the representation of suicide committed for love in English popular print in the seventeenth and early eighteenth centuries. It shows how, within ballads and pamphlets, suicide resulting from failed courtship was often portrayed as romantic and an expression of devotion.
Imogen Knox
wiley   +1 more source

Home - About - Disclaimer - Privacy