Showing 1,781 - 1,800 results of 2,536 for search '"pi"', query time: 0.06s Refine Results
  1. 1781

    Far from equilibrium field theory for strongly coupled light and matter: Dynamics of frustrated multimode cavity QED by Hossein Hosseinabadi, Darrick E. Chang, Jamir Marino

    Published 2024-12-01
    “…Our approach is grounded in constructing “two-particle irreducible” (2PI) effective actions, which provide a nonperturbative and conserving framework for describing quantum evolution at a polynomial cost in time. …”
    Get full text
    Article
  2. 1782

    信息论在动物行为学中的应用 by 陈华豪, 张杰

    Published 1992-01-01
    “…本文用数值例子从以下几方面讨论了信息论在动物行为学中的应用,1)从信息论中最基本的公式H(X)=-∑pilog2pi出发,用它来描述动物行为中包含的信息量。2)讨论二元联合信息,说明同种动物行为(特征)间联合作用所含信息量。…”
    Get full text
    Article
  3. 1783

    p53 蛋白及细胞增殖指数与子宫颈鳞状细胞癌的关系 by 罗淑桂

    Published 2004-01-01
    “…【目的】研究子宫颈鳞癌细胞增殖指数(PI)以及突变p53蛋白表达与组织病理学的关系。【方法】采用流式细胞术和免疫组化方法对44例子宫颈鳞癌组织及10例正常子宫颈上皮组织进行了研究。…”
    Get full text
    Article
  4. 1784

    Insulin Resistance: A Proinflammatory State Mediated by Lipid-Induced Signaling Dysfunction and Involved in Atherosclerotic Plaque Instability by Fabrizio Montecucco, Sabine Steffens, François Mach

    Published 2008-01-01
    “…The FFA-induced activation of protein kinase C (PKC) delta, inhibitor kappaB kinase (IKK), or c-Jun N-terminal kinase (JNK) modulates insulin-triggered intracellular pathway (classically known as PI3-K-dependent). Therefore, reduction of FFA levels represents a selective target for modulating insulin resistance.…”
    Get full text
    Article
  5. 1785

    Dynamic Modeling and Control of Electromechanical Coupling for Mechanical Elastic Energy Storage System by Yang Yu, Zengqiang Mi

    Published 2013-01-01
    “…The simulation results in three different cases show that the proposed nonlinear dynamic model of MEES system is correct; the designed algorithm has a better control performance in contrast with the conventional PI control.…”
    Get full text
    Article
  6. 1786

    Polarizabilities from kaon Compton scattering by Dominik Stamen, Jan Luca Dammann, Yannis Korte, Bastian Kubis

    Published 2024-12-01
    “…We propose a method to extend the energy range serviceable for this purpose by reconstructing the $$K^*(892)$$ K ∗ ( 892 ) contribution model-independently from its $$K\pi $$ K π intermediate state, using dispersion theory. …”
    Get full text
    Article
  7. 1787

    The Kronecker Summation Method for Robust Stabilization Applied to a Chemical Reactor by Radek Matušů, Jana Závacká, Roman Prokop, Monika Bakošová

    Published 2011-01-01
    “…The paper focuses on robust stabilization where the suitable parameters of a simple continuous-time PI controller are determined through a combination of the Kronecker summation method, sixteen plant theorem, and an algebraic approach to control design in the ring of proper and stable rational functions. …”
    Get full text
    Article
  8. 1788

    Persons in Context. A Model to Represent Observations and Reconstructions of Historical Persons in Linked Data by Pieter E. Woltjer, Ivo Zandhuis, Bob Coret, Mark Lindeman, Jeroen D. Balkenende, Richard L. Zijdeman, Rick J. Mourits

    Published 2024-10-01
    “…Persons in Context, or PiCo, presents a data model for historical person records within the Resource Description Framework (RDF). …”
    Get full text
    Article
  9. 1789

    Set-Membership Estimation for Complex Networks Under FlexRay Protocol Based on the Proportional-Integral Observer With Probability Constraint by Chaochen Wang, Miaomiao Shi

    Published 2025-01-01
    “…It is the primary objective to provide a proportional-integral (PI) estimation approach with the capability of driving all estimation errors at individual nodes into a desired region with a predetermined probability. …”
    Get full text
    Article
  10. 1790

    Assessment of Serum Adiponectin and Leptin in Chronic Periodontitis Over Healthy Individuals by Reghunathan S. Preethanath, Swaroop Chandy, Nubesh Khan Syed, Bugude Shiva Shankar, Pavithra Rangarajan Seshadri, R Narayane, P. K. Saraswathi Bai

    Published 2024-12-01
    “…Assessments were conducted on periodontal markers, including bleeding on probing (POP), gingival index (GI), plaque index (PI), probing pocket depth (PPD), and clinical attachment level (CAL). …”
    Get full text
    Article
  11. 1791

    Utility of σ and π-Acceptors for the Spectrophotometric Determination of Gemifloxacin Mesylate in Pharmaceutical Formulations by Marothu Vamsi Krishna, Dannana Gowri Sankar

    Published 2008-01-01
    “…The methods are based on the charge transfer complexation reaction of the drug as n-electron donor with sigma (σ)-acceptor iodine, and the pi (π)-acceptors 2, 3-dichloro-5, 6-dicyano-p-benzoquinone (DDQ)-7,7,8,8-tetra cyanoquinodimethane (TCNQ) and tetracyanoethylene (TCNE). …”
    Get full text
    Article
  12. 1792

    Application of Gap Metric to LADRC Design in Multilinear Model of SDR by Hongfu Wang, Qinghua Zeng, An Wang, Zongyu Zhang

    Published 2022-01-01
    “…Finally, through the comparison of simulation with adaptive PI controller and model-assisted LADRC (M-LADRC), the results have shown that the control method designed in this paper can obtain satisfactory performance and has a good engineering application prospect.…”
    Get full text
    Article
  13. 1793

    Anomaly detection and location of malicious node for IoT based on smart contract in blockchain network by Haojie HUANG, Xiaoxiao WU, Gangqiang LI

    Published 2020-06-01
    “…With the explosive growth of the number of distributed devices in the Internet of things (IoT) network,the security of decentralized multi-agent optimization algorithm has become the forefront problem.The distributed algorithms in the IoT network are vulnerable to data injection attacks from internal malicious node because each agent locally estimates its state without any supervision.In general,the detection methods for malicious node run independently in each agent,inducing issues such as closed data,single points of failure,opaque detection processes,and so on.The proposed strategy considered detecting via an aid of blockchain technology and smart contracts in Ethereum to detect malicious node in the network.Based on the decentralized and multiple backup features of blockchain technology,the multi-site backup features of the blockchain technology enabled data sharing and avoided single point failure.In addition,the contract code,execution process and result of the smart contract were open and transparent,and the contract code and result could not be tampered to ensure that the detection process could be traced and verified.Finally,the average consensus algorithm was adopted as an example,and the proposed strategy was verified on a simplified IoT network implemented by Raspberry Pi.…”
    Get full text
    Article
  14. 1794
  15. 1795

    Isospin-breaking contribution to the model-independent axion-photon-photon coupling in U(3) chiral theory by Rui Gao, Jin Hao, Chun-Gui Duan, Zhi-Hui Guo, J. A. Oller, Hai-Qing Zhou

    Published 2025-01-01
    “…Abstract We pursue the calculation of the model-independent component of the axion-photon-photon coupling in the U(3) chiral perturbation theory up to next-to-leading order, with the emphasis on the isospin breaking effect. The mixing of the $$\pi ^0$$ π 0 - $$\eta $$ η - $$\eta '$$ η ′ -axion system is revised as well by working out the complete linear isospin-breaking terms. …”
    Get full text
    Article
  16. 1796
  17. 1797
  18. 1798

    Optimizing transcutaneous spinal stimulation: excitability of evoked spinal reflexes is dependent on electrode montage by Kelly Lynn Thatcher, Karen Emily Nielsen, Evan Blake Sandler, Oliver John Daliet, Jennifer Ann Iddings, Edelle Carmen Field-Fote

    Published 2025-01-01
    “…DV montages included: [1] cathode over T11/T12, anodes over iliac crests (DV-I), [2] cathode over T11/T12, anodes over umbilicus (DV-U), [3] dual paraspinal cathodes at T11/12, anodes over iliac crests (DV-PI), and [4] dual paraspinal cathodes at T11/12, anodes over umbilicus (DV-PU). …”
    Get full text
    Article
  19. 1799
  20. 1800

    Surgical Outcomes and Sociodemographic Disparities Across All Races: An ACS-NSQIP and NHIS Multi-Institutional Analysis of Over 7.5 Million Patients by Dany Y. Matar, BA, Samuel Knoedler, Anthony Y. Matar, BS, Sarah Friedrich, PhD, Harriet Kiwanuka, MD, Ryoko Hamaguchi, MD, Carla M. Hamwi, BS, Gabriel Hundeshagen, MD, MMS, Valentin Haug, MD, Ulrich Kneser, MD, PhD, Keisha Ray, PhD, Dennis P. Orgill, MD, PhD, Adriana C. Panayi, MD, PhD

    Published 2024-09-01
    “…Among 7,504,734 American College of Surgeons National Surgical Improvement Database patients specifying race, 83.8% were White (WT), 11.8% Black or African American (B/AA), 3.3% Asian (AS), 0.7% American Indian or Alaska Native (AI/AN), 0.4% Native Hawaiian or Pacific Islander (NH/PI), 7.3% Hispanic. Reoperation trends reveal favorable outcomes for WT, AS, and NH/PI patients compared with B/AA and AI/AN patients. …”
    Get full text
    Article