Results 91 to 100 of about 23,429,950 (320)

Real‐Time Optimal Operation of Water Systems Under Demand Uncertainty and Maximum Water Age Constraints

open access: yesWater Resources Research
The inherent uncertainty in water demand poses significant challenges to water distribution systems' (WDSs) efficiency and quality. This study introduces a model predictive control framework tailored for real‐time optimal operation of WDSs under ...
Elad Salomons   +4 more
doaj   +1 more source

By dawn or dusk—how circadian timing rewrites bacterial infection outcomes

open access: yesFEBS Letters, EarlyView.
The circadian clock shapes immune function, yet its influence on infection outcomes is only beginning to be understood. This review highlights how circadian timing alters host responses to the bacterial pathogens Salmonella enterica, Listeria monocytogenes, and Streptococcus pneumoniae revealing that the effectiveness of immune defense depends not only
Devons Mo   +2 more
wiley   +1 more source

Hematopoietic (stem) cells—The elixir of life?

open access: yesFEBS Letters, EarlyView.
The aging of HSCs (hematopoietic stem cells) and the blood system leads to the decline of other organs. Rejuvenating aged HSCs improves the function of the blood system, slowing the aging of the heart, kidney, brain, and liver, and the occurrence of age‐related diseases.
Emilie L. Cerezo   +4 more
wiley   +1 more source

Synaptic plasticity-based regularizer for artificial neural networks

open access: yesScientific Reports
Regularization is an important tool for the generalization of ANN models. Due to the lack of constraints, it cannot guarantee that the model will work in a real environment with input data distribution changes.
Qais Yousef, Pu Li
doaj   +1 more source

Highly efficient ceramic membrane synthesized from sugar scum and fly ash as sustainable precursors for dyes removal

open access: yesHeliyon
Recycling solid industrial wastes into valuable materials is always the priority solution in waste management. In this perspective, sugar scum and fly ash were used to produce an effective low-cost porous ceramic membrane.
Y. El maguana   +5 more
doaj   +1 more source

Phosphatidylinositol 4‐kinase as a target of pathogens—friend or foe?

open access: yesFEBS Letters, EarlyView.
This graphical summary illustrates the roles of phosphatidylinositol 4‐kinases (PI4Ks). PI4Ks regulate key cellular processes and can be hijacked by pathogens, such as viruses, bacteria and parasites, to support their intracellular replication. Their dual role as essential host enzymes and pathogen cofactors makes them promising drug targets.
Ana C. Mendes   +3 more
wiley   +1 more source

Prospect certainty for data-driven models

open access: yesScientific Reports
The inherent nature of uncertainty in the inputs of data-driven models can lead to incorrect outputs. Such outcomes are difficult to ascertain due to the lack of reference data during the deployment, which hinders their acceptance in practical ...
Qais Yousef, Pu Li
doaj   +1 more source

Series AC Arc Fault Detection Method Based on High-Frequency Coupling Sensor and Convolution Neural Network

open access: yesSensors, 2020
Arc faults induced by residential low-voltage distribution network lines are still one of the main causes of residential fires. When a series arc fault occurs on the line, the value of the fault current in the circuit is limited by the load.
Ruobo Chu   +2 more
doaj   +1 more source

Structural insights into lacto‐N‐biose I recognition by a family 32 carbohydrate‐binding module from Bifidobacterium bifidum

open access: yesFEBS Letters, EarlyView.
Bifidobacterium bifidum establishes symbiosis with infants by metabolizing lacto‐N‐biose I (LNB) from human milk oligosaccharides (HMOs). The extracellular multidomain enzyme LnbB drives this process, releasing LNB via its catalytic glycoside hydrolase family 20 (GH20) lacto‐N‐biosidase domain.
Xinzhe Zhang   +5 more
wiley   +1 more source

On the Detection of Fake Certificates via Attribute Correlation

open access: yesEntropy, 2015
Transport Layer Security (TLS) and its predecessor, SSL, are important cryptographic protocol suites on the Internet. They both implement public key certificates and rely on a group of trusted certificate authorities (i.e., CAs) for peer authentication ...
Xiaojing Gu, Xingsheng Gu
doaj   +1 more source

Home - About - Disclaimer - Privacy