-
801
-
802
DRLinSPH: an open-source platform using deep reinforcement learning and SPHinXsys for fluid-structure-interaction problems
Published 2025-12-01“…Smoothed particle hydrodynamics (SPH) offers a flexible and efficient computational approach for modeling large deformations, fractures, and complex interface movements inherent in FSI, outperforming traditional grid-based methods. This work presents DRLinSPH, an open-source Python platform that integrates the SPH-based numerical environment provided by the open-source software SPHinXsys with the mature DRL platform Tianshou to enable parallel training for FSI problems. …”
Get full text
Article -
803
A novel framework for neutron-gamma density logging: semi-empirical modeling, directional neutron sources, and experimental benchmarking
Published 2025-06-01“…This study proposes a novel NGD logging method that utilizes a directional neutron source to enhance measurement precision while reducing the number of required detectors. …”
Get full text
Article -
804
Methods for Rapid Characterization of Tunable Microbubble Formulations
Published 2024-12-01“…In this paper, a comprehensive method was developed to compare microbubble formulations with different lipid shell compositions using optical and acoustic methods of measurement to collect the size distribution, concentration, and mean scattering intensity. …”
Get full text
Article -
805
Software diversification method based on binary rewriting
Published 2023-04-01“…Software diversity is an effective defense against code-reuse attacks, but most existing software diversification technologies are based on source code.Obtaining program source code may be difficult, while binary files are challenging to disassemble accurately and distinguish between code pointers and data constants.This makes binary file diversification difficult to generate high levels of randomization entropy, and easily compromised by attackers.To overcome these challenges, a binary file oriented software diversification method was proposed based on static binary rewriting technology, namely instruction offset randomization.This method inserted NOP instructions of varying byte lengths before program instructions with a certain probability, reducing the number of unintended gadgets in the program and randomly offsetting the original instruction address.This disrupts the program’s original memory layout and increases the cost of code-reuse attacks.At the same time, an optimization strategy based on hot code was designed for this method.The execution times of basic blocks in binary files were obtained by dynamic pile insertion, so as to adjust the NOP instruction insertion probability in each basic block.The higher the execution frequency, the fewer NOP instructions were inserted into the basic block, which can ensure lower performance overhead and produce higher randomization entropy.In the experimental part, the SPEC benchmark program was used to test the optimized method from the aspects of performance overhead, gadget survival rate and file size.The results show that a 15% insertion probability achieves the best effect, with an average gadget survival rate of less than 1.49%, increasing attackers’ difficulty in reusing the same gadget attack chain.Furthermore, only a 4.1% operation overhead and 7.7% space overhead are added, maintaining high levels of security.…”
Get full text
Article -
806
RETROSPECTIVE ANALYSIS OF HYPOXIC TRAINING IN ROAD CYCLING IN BULGARIA PERIOD (1945-1965)
Published 2021-11-01“…The study was conducted using the methods: study of information sources, document analysis, theoretical analysis and synthesis. …”
Get full text
Article -
807
-
808
Optical Cryptanalysis Method Using Wavefront Shaping
Published 2017-01-01“…In this paper, a practical optical cryptanalysis method using wavefront shaping is proposed. Considering that the confusion and diffusion of information in the optical cryptosystem are actually caused by scattering effect of random phase mask(s), the proposed method employs a point source function and the feedback-based optimization algorithm, which can obtain an equivalent key of the optical cryptosystem. …”
Get full text
Article -
809
Retrieval of Passive Seismic Virtual Source Data Under Non-Ideal Illumination Conditions Based on Enhanced U-Net
Published 2025-05-01“…The multidimensional deconvolution method (MDD) alleviates reliance on passive-source distribution, but requires wavefield decomposition of the original data. …”
Get full text
Article -
810
Design and evaluation of a high-performance betavoltaic battery utilizing vertically stacked diamond matched 90Sr source
Published 2025-06-01“…However, the optimal overall efficiency of 0.46% was obtained at the source efficiency of 90% and the same unit thickness. …”
Get full text
Article -
811
Class-aware multi-source domain adaptation algorithm for medical image analysis using reweighted matrix matching strategy.
Published 2025-01-01“…Additionally, first-order and second-order moment matching strategies are applied to effectively align the source and target domains, while an adaptive weighting mechanism is utilized to optimize the contributions of different source domains to the target domain. …”
Get full text
Article -
812
Minimizing the Active Power Losses and Retaining the Voltage Profile of the Distribution System Using Soft Computing Techniques with DG Source
Published 2022-01-01“…The radial distribution system has lower power losses, best voltage profile, cost of saving the DG source, optimal placing of a suitable rating of the DG source, optimal location of the DG source, and cost of saving the DG source which were achieved in this work. …”
Get full text
Article -
813
Blind source separation and unmanned aerial vehicle classification using CNN with hybrid cross-channel and spatial attention module
Published 2025-07-01“…In order to accurately and effectively identify different types of UAVs, a UAV category recognition method based on improved convolutional neural network (CNN) is proposed. …”
Get full text
Article -
814
Experimental study on preparation of mine-used filling cementitious material from multi-source coal-based solid wastes
Published 2024-12-01“…By conducting orthogonal test, the optimal ratio of each component in the cementitious material was determined, and the Tesser five-step method was used to study the occurrence and leaching characteristics of heavy metal elements in the cementitious material. …”
Get full text
Article -
815
An open-source interactive AI framework for assisting automatic literature review in forensic medicine: Focus on brain injury mechanisms.
Published 2025-01-01“…This study evaluates the utility of ASReview for forensic medical literature review.<h4>Methods</h4>A three-stage experimental design was implemented. …”
Get full text
Article -
816
A Fuzzy Multi-Criteria Approach for Selecting Open-Source ERP Systems in SMEs Using Fuzzy AHP and TOPSIS
Published 2025-01-01“…This research aims to propose an innovative methodology by integrating the fuzzy Analytical Hierarchy Process (fuzzy AHP) and fuzzy Technique for Order Preference by Similarity to the Ideal Solution (fuzzy TOPSIS) to improve the open-source ERP selection process. The method involves eight criteria and 26 sub-criteria to comprehensively evaluate 11 open-source ERP alternatives, specifically for SMEs in the transportation services sector in Indonesia. …”
Get full text
Article -
817
ICT-Net: A Framework for Multi-Domain Cross-View Geo-Localization with Multi-Source Remote Sensing Fusion
Published 2025-06-01Get full text
Article -
818
Energy Efficiency, Local Entropy Sources and Exergy Analysis in Measuring Orifice Plates: A Computational Fluid Dynamics Approach
Published 2025-03-01“…By quantifying entropy sources through numerical simulations, this study provides insights into optimizing flow metering techniques and reducing irreversibilities. …”
Get full text
Article -
819
Air-ground collaborative multi-source orbital integrated detection system: Combining 3D imaging and intrusion recognition.
Published 2025-01-01“…With the rapid expansion of railway networks globally, ensuring rail infrastructure safety through efficient detection methods has become critical. Traditional inspection systems face limitations in flexibility, adaptability to adverse weather, and multifunctional integration. …”
Get full text
Article -
820
Improved control of multi terminal direct current voltage source converters using proportional integral and lead lag controllers
Published 2025-02-01“…The results showed that connecting a PI controller to the DC link voltage stabilizer and lead-lag compensators to the power source and load achieved optimal performance with an average overshoot of 78% and an average stabilization time of 398 msec. …”
Get full text
Article