Renormalon resummation and exponentiation of soft and collinear gluon radiation in the thrust distribution [PDF]
The thrust distribution in e+e- annihilation is calculated exploiting its exponentiation property in the two-jet region t = 1-T
Abbiendi +81 more
core +2 more sources
A Regional Socio-Economic Life Cycle Assessment of a Bioeconomy Value Chain [PDF]
A bioeconomy tackles sustainable development at both the global and regional levels, as it relies on the optimized use of renewable bio-based resources for the provisioning of food, materials, and energy to meet societal demands.
Bezama, Alberto +4 more
core +1 more source
Foreign debt and economic growth in Sub-Saharan Africa: A new look
The study investigates the separate effect of short-term foreign debt, long-term foreign debt, and International Monetary Fund credit (IMF credit hereafter) on economic growth in sub-Saharan Africa (SSA henceforth), which have been overlooked in the ...
Rotimi Ayoade Ogunjumo
doaj +1 more source
The BCS theory of q-deformed nucleon pairs - qBCS
We construct a coherent state of q-deformed zero coupled nucleon pairs distributed in several single-particle orbits. Using a variational approach, the set of equations of qBCS theory, to be solved self consistently for occupation probabilities, gap ...
A. J. Macfarlane +16 more
core +1 more source
Closed N=2 Strings: Picture-Changing, Hidden Symmetries and SDG Hierarchy
We study the action of picture-changing and spectral flow operators on a ground ring of ghost number zero operators in the chiral BRST cohomology of the closed N=2 string and describe an infinite set of symmetry charges acting on physical states.
ALEXANDER D. POPOV +2 more
core +1 more source
Improving intermittent waste heat recovery with ORC systems by integrating thermal energy storage [PDF]
https://scholarlyworks.lvhn.org/progress_notes/1201/thumbnail ...
Beyne, Wim +4 more
core +3 more sources
L2R-MLP: a multilabel classification scheme for the detection of DNS tunneling
Domain name system (DNS) tunneling attacks can bypass firewalls, which typically “trust” DNS transmissions by concealing malicious traffic in the packets trusted to convey legitimate ones, thereby making detection using conventional security techniques ...
Emmanuel Oluwatobi Asani +7 more
doaj +1 more source
Opportunities and challenges for the sustainability of lakes and reservoirs in relation to the sustainable development goals (SDGs) [PDF]
Emerging global threats, such as biological invasions, climate change, land use intensification, and water depletion, endanger the sustainable future of lakes and reservoirs.
Goethals, Peter, Ho, Long Tuan
core +2 more sources
Nanoporous Microelectrodes for Neural Electrophysiology Recordings in Organotypic Culture
The highly porous microelectrodes have been designed and printed on culture membranes, allowing to record electrophysiological neural activity for rodent brain slices. To keep the biocompatible nanoporous structure, the microelectrodes and insulative layer are fabricated on the bottom of culture membranes with only small connector pads added on the top.
Petro Lutsyk +3 more
wiley +1 more source
The efficiency of sustainable development goals 4 and 8 in China: impact of low fertility
China’s declining birth rate is gradually eroding the demographic dividend, potentially affecting education, employment, and the economy. This study constructs a meta two-stage dynamic Directional Distance Function (DDF) Data Envelopment Analysis (DEA ...
Li Ji +5 more
doaj +1 more source

