Results 191 to 200 of about 17,761 (329)

Surgical management for inferior turbinate hypertrophy: a narrative review

open access: diamond, 2021
Mano Leoni Divya   +2 more
openalex   +2 more sources

Characterization of Multimodality in Wind Farm Layout Optimization

open access: yesEnergy Science &Engineering, EarlyView.
ABSTRACT The phenomena of multiple optima in wind farm layout optimization (WFLO) problems is investigated. The choice of optimization algorithm and cost of solving WFLO problems is driven by the degree of local optimality in the design space; however little work has attempted to characterize this.
Daniel J. Poole
wiley   +1 more source

Massive Bilateral Middle Turbinate Concha Bullosa: A Case Report [PDF]

open access: diamond
Abdulaziz Fadel Alfadley   +3 more
openalex   +1 more source

Comparative Numerical Studies for the Flow Energy Dissipation Features in a Vertical Two‐Stage Centrifugal Pump in Pump and Turbine Conditions

open access: yesEnergy Science &Engineering, EarlyView.
Based on entropy theory, this study presents a comparative numerical analysis of the flow energy dissipation (FED) in a VTSP under two distinct operating conditions: pump condition and turbine condition, both characterized by relatively high hydraulic efficiencies of 88.9% and 87.4%, respectively. In pump condition, the highest FED production occurs in
S. Liu   +5 more
wiley   +1 more source

Multi-antigen MVA-vectored SARS-CoV-2 vaccine, GEO-CM04S1, induces cross-protective immune responses to ancestral and Omicron variants. [PDF]

open access: yesFront Immunol
Elsharkawy A   +13 more
europepmc   +1 more source

Data‐Driven Dual‐Channel Dynamic Event‐Triggered Load Frequency Control for Multiarea Power Systems Under DoS Attacks

open access: yesEnergy Science &Engineering, EarlyView.
ABSTRACT System dynamics uncertainties and cyberattacks pose significant challenges to load frequency control in power systems. This paper presents a data‐driven load frequency control strategy for interconnected multi‐area power systems subject to denial‐of‐service attacks that disrupt both feedforward and feedback communication channels.
Yuhao Chen   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy