Results 241 to 250 of about 44,688 (302)
Engineering Strategies for Stable and Long‐Life Alkaline Zinc‐Based Flow Batteries
Alkaline zinc‐based flow batteries face persistent challenges from unstable zinc deposition, including dendrite growth, passivation, corrosion, and hydrogen evolution, which severely limit cycling stability. Current research addresses these issues through coordinated electrode structuring, electrolyte regulation, and membrane design to control zinc ...
Yuran Bai +6 more
wiley +1 more source
A reactive in situ solution complexation strategy reconstructs the surface of 2.0 eV ultra‐wide‐bandgap perovskites via proton transfer. This chemical modulation eliminates metallic defects and induces a degenerate‐like n‐type surface, establishing an Ohmic tunneling contact.
Saemon Yoon +11 more
wiley +1 more source
Synaptotagmin 5, not synaptotagmin 1, is required for cortical granule exocytosis at fertilization of mouse eggs†. [PDF]
Mehlmann LM, Uliasz TF, Lowther KM.
europepmc +1 more source
Ischemic treatment of the duodenal windsock web using the ultra-thin endoscope, with modified detachable snares. [PDF]
Oguro K +5 more
europepmc +1 more source
Endovascular management of a fractured dialysis catheter: a case report and review of retrieval techniques. [PDF]
Lin T, Wang Q, Huang W, Liu Y, He C.
europepmc +1 more source
Regulation of vacuole fusion in stomata by dephosphorylation of the HOPS subunit VPS39. [PDF]
Pullen AM +5 more
europepmc +1 more source
A bacterial family of fatty acid acyltransferases related to the <i>Shigella</i> effector IcsB. [PDF]
Bajunaid W +6 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, 2009
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of fraud detection due to the high cost of fraud, and being able to automatically detect potential fraud quickly and precisely allows human investigators to work more ...
Mary McGlohon +4 more
openaire +1 more source
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of fraud detection due to the high cost of fraud, and being able to automatically detect potential fraud quickly and precisely allows human investigators to work more ...
Mary McGlohon +4 more
openaire +1 more source
SNAREs (soluble N-ethylmaleimide-sensitive factor attachment protein receptors) are now generally accepted to be the major players in the final stage of the docking and the subsequent fusion of diverse vesicle-mediated transport events. The SNARE-mediated process is conserved evolutionally from yeast to human, as well as mechanistically and ...
Wanjin Hong
exaly +4 more sources
Proceedings of the 2006 ACM CoNEXT conference on - CoNEXT '06, 2006
Secure routing in wireless sensor networks (WSN) is a crucial problem that has drawn the attention of researchers. The motivation for tackling this problem comes directly from the highly constrained nature of WSN and its easy exposure to insecure conditions. Many solutions to provide security at the network layer have been proposed. The common approach,
Ismat K. Maarouf, A. R. Naseer
openaire +2 more sources
Secure routing in wireless sensor networks (WSN) is a crucial problem that has drawn the attention of researchers. The motivation for tackling this problem comes directly from the highly constrained nature of WSN and its easy exposure to insecure conditions. Many solutions to provide security at the network layer have been proposed. The common approach,
Ismat K. Maarouf, A. R. Naseer
openaire +2 more sources

