Results 51 to 60 of about 662,855 (289)
Security feedback trust model of power network demand response terminal triggered by hacker attacks
With the rapid expansion of power system scale, demand response business is promoted to develop. More and more demand response terminals are connected to the smart grid, smart grid is an intelligent system that allows the grid to effectively perform its ...
Jianfei Chen +3 more
doaj +1 more source
Single‐molecule DNA flow‐stretch assays for high‐throughput DNA–protein interaction studies
We describe an optimised single‐molecule DNA flow‐stretch assay that visualises DNA–protein interactions in real time. Linear DNA fragments are tethered to a surface and stretched by buffer flow for fluorescence imaging. Using λ and φX174 DNA, this protocol enhances reproducibility and accessibility, providing a versatile approach for studying diverse ...
Ayush Kumar Ganguli +8 more
wiley +1 more source
How to find horizon-independent optimal strategies leading off to infinity: a max-plus approach
A general problem in optimal control consists of finding a terminal reward that makes the value function independent of the horizon. Such a terminal reward can be interpreted as a max-plus eigenvector of the associated Lax-Oleinik semigroup.
Akian, Marianne +2 more
core +1 more source
The crystal structure of Borrelia burgdorferi nicotinamidase (PncA/BBE22) reveals the correct full‐length protein initiated from a non‐canonical AUU start codon. The structure validates previous biochemical findings and resolves a long‐standing annotation error, demonstrating that the truncated database sequence is structurally incompatible with the ...
Kalvis Brangulis
wiley +1 more source
In this work, we construct new definitions for a causal terminal value problem involving Riemann-Liouville fractional derivatives, and study the unique solution by combining techniques from generalized quasilinearization.
Coskun Yakar, Mehmet Arslan
doaj
This research investigates the properties of fractional differential equations characterized by variable orders, focusing on their existence, uniqueness, and Ulam-Hyers stability.
Ahmed Refice +5 more
doaj +1 more source
A Linear Network Code Construction for General Integer Connections Based on the Constraint Satisfaction Problem [PDF]
The problem of finding network codes for general connections is inherently difficult in capacity constrained networks. Resource minimization for general connections with network coding is further complicated.
Cui, Ying +6 more
core +2 more sources
The dual roles of CC and CXC chemokines in distinguishing active, latent, and subclinical tuberculosis were reviewed, along with an evaluation of their potential as diagnostic biomarkers and therapeutic targets to advance precision medicine in tuberculosis management. The graphical abstract was generated with AI assistance (Gemini 3.0).
Xuying Yin, Dangsheng Xiao, Jiezuan Yang
wiley +1 more source
Mobile Network Cell Information Detection Method Based on Mobile Crowdsensing [PDF]
The base station information table is the core data asset for the telecom operator to operate and maintain the mobile network.It has important commercial value for the location service provider,but there are problems that the base station information ...
LI Ke,WANG Hai,XU Xiaolong,DU Yu
doaj +1 more source
Practical Adaptive Fast Terminal Sliding Mode Control for Servo Motors
Position control of servo motor systems is a challenging task because of inevitable factors such as uncertainties, nonlinearities, parametric variations, and external perturbations.
Kamran Ali +3 more
doaj +1 more source

