Results 91 to 100 of about 1,529,970 (307)
To find a trajectory with low radar detection probability for stealth aircraft under the assumption of 2D space, performing a rapid turning maneuver is a useful way to reduce the radar detection probability of an aircraft by changing the azimuth angle ...
Jingxin Guan +3 more
doaj +1 more source
Smart Computer Security Audit: Reinforcement Learning with a Deep Neural Network Approximator [PDF]
A significant challenge in modern computer security is the growing skill gap as intruder capabilities increase, making it necessary to begin automating elements of penetration testing so analysts can contend with the growing number of cyber threats.
Alonso, E. +4 more
core
ABSTRACT Introduction Bloodstream infections due to repeated vascular access (VA) puncture and circuit connections remain major concerns in hemodialysis. Therefore, we examined current practices for glove, disinfectant, and personal protective equipment (PPE) use according to VA type in national university hospitals in Japan.
Aiko Yamada +6 more
wiley +1 more source
Dendrimer Conjugation Enhances Tumor Penetration and Cell Kill of Doxorubicin in 3D Coculture Lung Cancer Models [PDF]
Background: Doxorubicin (DOX) is a potent chemotherapeutic widely used for solid tumors (1). Despite high efficacy in 2D cell culture, DOX efficacy does not translate to in vivo lung cancer models (2).
Almuqbil, Rashed +5 more
core +1 more source
A Bibliometric Analysis of Publications in Uremic Toxins From 1991 to 2024
ABSTRACT Background Uremic toxins are a growing area of research in nephrology, with significant implications in the progression and treatment of chronic kidney disease (CKD) and the management of end‐stage kidney disease (ESKD). This bibliometric analysis aims to evaluate the global research trends, key contributors, and the impact of publications in ...
Yuh‐Shan Ho +7 more
wiley +1 more source
Standard NIJ 0115.00 (prema Nacionalnom institutu pravde SAD), namenjen je za utvrđivanje minimuma tehničkih zahteva i metoda ispitivanja otpornosti zaštitnih prsluka, koji treba da zaštite gornji deo tela od uboda nožem i predmetima sa oštrim vrhom ...
Đuro Jovanić
doaj +1 more source
Glass transition temperatures of liquid prepolymers obtained by thermal penetrometry [PDF]
Thermal penetrometry is experimental technique for detecting temperature at which frozen prepolymer becomes soft enough to be pierced by weighted penetrometer needle; temperature at which this occurs is called penetration temperature.
Ashcraft, A. C., Potts, J. E., Jr.
core +1 more source
Magnetic penetration depth in disordered iron-based superconductors
We study the effect of disorder on the London penetration depth in iron-based superconductors. The theory is based on a two-band model with quasi-two-dimensional Fermi surfaces, which allows for the coexistence region in the phase diagram between ...
Dzero, M. +4 more
core +1 more source
Revealing the structure of land plant photosystem II: the journey from negative‐stain EM to cryo‐EM
Advances in cryo‐EM have revealed the detailed structure of Photosystem II, a key protein complex driving photosynthesis. This review traces the journey from early low‐resolution images to high‐resolution models, highlighting how these discoveries deepen our understanding of light harvesting and energy conversion in plants.
Roman Kouřil
wiley +1 more source
The first penetration field H_{J}(T) of Josephson vortices is measured through the onset of microwave absorption in the locked state, in slightly overdoped $\rm{Bi_{2}Sr_{2}CaCu_{2}O_{8+\delta}}$ single crystals (T_{c} ~ 84 K).
A. A. Zhukov +61 more
core +3 more sources

