Showing 301 - 320 results of 4,920 for search '(( source optimization (method OR methods) ) OR ( sources optimization (method OR methods) ))', query time: 0.43s Refine Results
  1. 301

    A two-stage flexible scheduling method for power systems with wind power considering the coordination of multiple resources by Aoyu Lei, Ligang Zhao, Yong Mei, Hongyue Zhen, Yongqiang Gao, Tinghui Zhou

    Published 2025-01-01
    “…In this paper, we propose a two-stage stochastic flexible dispatching method for power systems with large-scale wind power, which considers the coordination of unit commitment, optimal transmission switching, and optimal control of phase-shifting transformers within a unified framework. …”
    Get full text
    Article
  2. 302

    Identification of Voltage Sag Source in Distribution Network Based on BAS-SVM by Haitao LIU, Xiaoyi YE, Ganyun LÜ, Huajun YUAN, Zongpu GENG

    Published 2022-05-01
    “…In order to improve the identification accuracy of different voltage sag disturbance sources, a voltage sag source identification method based on beetle antennae search (BAS) and support vector machine (SVM) is proposed. …”
    Get full text
    Article
  3. 303
  4. 304

    GNSS-Based Monitoring Methods for Mining Headframes by Xu Yang, Zhe Zhou, Yanzhao Yang, Xinxin Yao, Chao Liu, Lei Liu, Shicheng Xie

    Published 2025-04-01
    “…This study introduces an innovative GNSS-based monitoring system designed to evaluate deformation in mining headframes, effectively addressing the limitations of traditional methods, such as inadequate real-time capabilities and complex data processing requirements. …”
    Get full text
    Article
  5. 305
  6. 306
  7. 307

    Methods for Rapid Characterization of Tunable Microbubble Formulations by Savannah L. Harpster, Alexandra M. Piñeiro, Joyce Y. Wong

    Published 2024-12-01
    “…In this paper, a comprehensive method was developed to compare microbubble formulations with different lipid shell compositions using optical and acoustic methods of measurement to collect the size distribution, concentration, and mean scattering intensity. …”
    Get full text
    Article
  8. 308

    Initialization Methods for FPGA-Based EMT Simulations by Xin Ma, Xiao-Ping Zhang

    Published 2024-01-01
    “…To accelerate initialization, software-to-hardware algorithm and structure are developed to automate initialization data sources for different topologies. Case study shows Method 2–4 can both initialize successfully on FPGA platform, while Method 4 achieves the best timing and routing performance. …”
    Get full text
    Article
  9. 309
  10. 310

    A Modified Horse Herd Optimization Algorithm and Its Application in the Program Source Code Clustering by Bahman Arasteh, Peri Gunes, Asgarali Bouyer, Farhad Soleimanian Gharehchopogh, Hamed Alipour Banaei, Reza Ghanbarzadeh

    Published 2023-01-01
    “…Based on the experimental data, the quality of the clustered models produced is approximately 3.219, with a standard deviation of 0.0718 across the ten benchmarks. The proposed method surpasses former methods in convergence, modularization quality, and result stability. …”
    Get full text
    Article
  11. 311

    Enhanced permeability prediction in porous media using particle swarm optimization with multi-source integration by Zhiping Chen, Jia Zhang, Daren Zhang, Xiaolin Chang, Wei Zhou

    Published 2024-12-01
    “…The model integrates multi-source data from the Lattice Boltzmann Method (LBM), Pore Network Modeling (PNM), and Finite Difference Method (FDM). …”
    Get full text
    Article
  12. 312
  13. 313

    Using Convex Optimization to Efficiently Apportion Tracer and Pollutant Sources From Point Concentration Observations by Richard Barnes, Alex G. Lipp

    Published 2024-05-01
    “…As a case study, we use this method to map the elemental geochemistry of sediment sources for rivers draining the Cairngorms mountains, UK. …”
    Get full text
    Article
  14. 314

    Source–load matching and energy storage optimization strategies for regional wind–solar energy systems by Y. Zhu, Q. Li, Z. Li, Z. Zhang

    Published 2025-07-01
    “…<p>In response to the issue of limited new energy output leading to poor smoothing effects on grid-connected load fluctuations, this paper proposes a load-power smoothing method based on “one source with multiple loads”. …”
    Get full text
    Article
  15. 315
  16. 316

    Software diversification method based on binary rewriting by Benwei HE, Yunfei GUO, Yawen WANG, Qingfeng WANG, Hongchao HU

    Published 2023-04-01
    “…Software diversity is an effective defense against code-reuse attacks, but most existing software diversification technologies are based on source code.Obtaining program source code may be difficult, while binary files are challenging to disassemble accurately and distinguish between code pointers and data constants.This makes binary file diversification difficult to generate high levels of randomization entropy, and easily compromised by attackers.To overcome these challenges, a binary file oriented software diversification method was proposed based on static binary rewriting technology, namely instruction offset randomization.This method inserted NOP instructions of varying byte lengths before program instructions with a certain probability, reducing the number of unintended gadgets in the program and randomly offsetting the original instruction address.This disrupts the program’s original memory layout and increases the cost of code-reuse attacks.At the same time, an optimization strategy based on hot code was designed for this method.The execution times of basic blocks in binary files were obtained by dynamic pile insertion, so as to adjust the NOP instruction insertion probability in each basic block.The higher the execution frequency, the fewer NOP instructions were inserted into the basic block, which can ensure lower performance overhead and produce higher randomization entropy.In the experimental part, the SPEC benchmark program was used to test the optimized method from the aspects of performance overhead, gadget survival rate and file size.The results show that a 15% insertion probability achieves the best effect, with an average gadget survival rate of less than 1.49%, increasing attackers’ difficulty in reusing the same gadget attack chain.Furthermore, only a 4.1% operation overhead and 7.7% space overhead are added, maintaining high levels of security.…”
    Get full text
    Article
  17. 317

    Exergy analysis of the boiler using the pinch method by E. A. Yushkova, V. A. Lebedev

    Published 2019-12-01
    “…Exergy analysis of thermal systems shows quantitative and qualitative characteristics of efficiency. The pinch method allows us to solve specific design problems to optimize the parameters of heat power facilities. …”
    Get full text
    Article
  18. 318

    Optimization of Collagen Extraction from Fish Scales Using Tris-Glycine Buffer: A Taguchi Methodological Approach by Mokgadi Ursula Makgobole, Stanley Chibuzor Onwubu, Abayomi Baruwa, Nomakhosi Mpofana, Zodidi Obiechefu, Deneshree Naidoo, Andile Khathi, Blessing Mkhwanazi

    Published 2024-12-01
    “…Collagen, a critical biomaterial with wide applications in pharmaceuticals, cosmetics, and medical industries, can be sourced sustainably from fish scales. This study optimizes the extraction of collagen using Tris-Glycine buffer from fish scales via the Taguchi method. …”
    Get full text
    Article
  19. 319

    Optical Cryptanalysis Method Using Wavefront Shaping by Meihua Liao, Dajiang Lu, Wenqi He, Xiang Peng

    Published 2017-01-01
    “…In this paper, a practical optical cryptanalysis method using wavefront shaping is proposed. Considering that the confusion and diffusion of information in the optical cryptosystem are actually caused by scattering effect of random phase mask(s), the proposed method employs a point source function and the feedback-based optimization algorithm, which can obtain an equivalent key of the optical cryptosystem. …”
    Get full text
    Article
  20. 320