Carbon Incorporation and Anion Dynamics as Synergistic Drivers for Ultrafast Diffusion in Superionic LiCB 11 H 12 and NaCB 11 H 12
نویسندگان
چکیده
منابع مشابه
11 Mathematical Induction 12
Before presenting the details of the principle of mathematical induction let’s understand the situations to which it applies. We’ve seen that to prove a universal assertion, we start by setting up the scenario that represents the hypothesis of the assertion. This scenario involves certain hypothetical objects, and certain assumptions. We then use the information of the scenario to work towards ...
متن کاملNeuroendocrine recovery after 2-week 12-h day and night shifts: an 11-day follow-up.
PURPOSE The study aimed to investigate the course and duration of neuroendocrine recovery after 2-week 12-h day and night shift working periods and to study whether there were differences in recovery between the shift groups. METHODS Twenty-nine male offshore employees working 2-week 12-h shift tours participated in the study; 15 participated after a day shift tour and 14 after a night shift ...
متن کاملCan-11-3693 1..12
Neuroinflammation driven by the vanilloid-type ion channel receptor transient receptor potential vanilloid type 1 (TRPV-1) is suspected to play a role in the pathophysiology of inflammatory bowel disease. Because inflammatory bowel disease is known to elevate the risk of colon cancer, we examined postulated roles for TRPV1–driven neuroinflammation in promoting colitis-associated and spontaneous...
متن کاملCancer Immunity 12:11 (2012)
The communicative enthusiasm of Lloyd Old Before starting this introduction on the development of monoclonal antibodies for cancer therapy and the role of Lloyd Old in the field, in parallel with his central interest in T cell activation by tumor antigen vaccination, let me say a few subjective words about a unique human quality of Lloyd: his extraordinary communicative enthusiasm. That quality...
متن کاملWeeks 11-12: Streaming and Parallel Algorithms
• A network service provider wants to keep track of the traffic going through the network, in order to detect unusual patterns, which may be a sign of malicious activity. For example, an increased traffic to a particular IP address may suggest a Denial of Service attack is under way. Such unusual traffic patterns should be detected almost in real time, however the throughput of the network is s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Advanced Energy Materials
سال: 2018
ISSN: 1614-6832,1614-6840
DOI: 10.1002/aenm.201703422