-
821
-
822
Exploring the Key Features of Repeating Fast Radio Bursts with Machine Learning
Published 2025-01-01Get full text
Article -
823
A dual time-scale optimal dispatch algorithm for PV systems: Integrating centralized optimal power dispatch with distributed power deviation absorption in DC smart grids
Published 2025-05-01“…Traditional dispatch methods struggle to effectively manage PV power deviations in real-time. …”
Get full text
Article -
824
Minimizing the Active Power Losses and Retaining the Voltage Profile of the Distribution System Using Soft Computing Techniques with DG Source
Published 2022-01-01“…The radial distribution system has lower power losses, best voltage profile, cost of saving the DG source, optimal placing of a suitable rating of the DG source, optimal location of the DG source, and cost of saving the DG source which were achieved in this work. …”
Get full text
Article -
825
Design and evaluation of a high-performance betavoltaic battery utilizing vertically stacked diamond matched 90Sr source
Published 2025-06-01“…However, the optimal overall efficiency of 0.46% was obtained at the source efficiency of 90% and the same unit thickness. …”
Get full text
Article -
826
Experimental study on preparation of mine-used filling cementitious material from multi-source coal-based solid wastes
Published 2024-12-01“…By conducting orthogonal test, the optimal ratio of each component in the cementitious material was determined, and the Tesser five-step method was used to study the occurrence and leaching characteristics of heavy metal elements in the cementitious material. …”
Get full text
Article -
827
Software diversification method based on binary rewriting
Published 2023-04-01“…Software diversity is an effective defense against code-reuse attacks, but most existing software diversification technologies are based on source code.Obtaining program source code may be difficult, while binary files are challenging to disassemble accurately and distinguish between code pointers and data constants.This makes binary file diversification difficult to generate high levels of randomization entropy, and easily compromised by attackers.To overcome these challenges, a binary file oriented software diversification method was proposed based on static binary rewriting technology, namely instruction offset randomization.This method inserted NOP instructions of varying byte lengths before program instructions with a certain probability, reducing the number of unintended gadgets in the program and randomly offsetting the original instruction address.This disrupts the program’s original memory layout and increases the cost of code-reuse attacks.At the same time, an optimization strategy based on hot code was designed for this method.The execution times of basic blocks in binary files were obtained by dynamic pile insertion, so as to adjust the NOP instruction insertion probability in each basic block.The higher the execution frequency, the fewer NOP instructions were inserted into the basic block, which can ensure lower performance overhead and produce higher randomization entropy.In the experimental part, the SPEC benchmark program was used to test the optimized method from the aspects of performance overhead, gadget survival rate and file size.The results show that a 15% insertion probability achieves the best effect, with an average gadget survival rate of less than 1.49%, increasing attackers’ difficulty in reusing the same gadget attack chain.Furthermore, only a 4.1% operation overhead and 7.7% space overhead are added, maintaining high levels of security.…”
Get full text
Article -
828
Retrieval of Passive Seismic Virtual Source Data Under Non-Ideal Illumination Conditions Based on Enhanced U-Net
Published 2025-05-01“…The multidimensional deconvolution method (MDD) alleviates reliance on passive-source distribution, but requires wavefield decomposition of the original data. …”
Get full text
Article -
829
Class-aware multi-source domain adaptation algorithm for medical image analysis using reweighted matrix matching strategy.
Published 2025-01-01“…Additionally, first-order and second-order moment matching strategies are applied to effectively align the source and target domains, while an adaptive weighting mechanism is utilized to optimize the contributions of different source domains to the target domain. …”
Get full text
Article -
830
Blind source separation and unmanned aerial vehicle classification using CNN with hybrid cross-channel and spatial attention module
Published 2025-07-01“…By enhancing the whitening process during the data preprocessing step, the blind source separation process becomes more stable and reliable. …”
Get full text
Article -
831
A Fuzzy Multi-Criteria Approach for Selecting Open-Source ERP Systems in SMEs Using Fuzzy AHP and TOPSIS
Published 2025-01-01“…This research aims to propose an innovative methodology by integrating the fuzzy Analytical Hierarchy Process (fuzzy AHP) and fuzzy Technique for Order Preference by Similarity to the Ideal Solution (fuzzy TOPSIS) to improve the open-source ERP selection process. The method involves eight criteria and 26 sub-criteria to comprehensively evaluate 11 open-source ERP alternatives, specifically for SMEs in the transportation services sector in Indonesia. …”
Get full text
Article -
832
Exergy analysis of the boiler using the pinch method
Published 2019-12-01“…Exergy analysis of thermal systems shows quantitative and qualitative characteristics of efficiency. The pinch method allows us to solve specific design problems to optimize the parameters of heat power facilities. …”
Get full text
Article -
833
Optical Cryptanalysis Method Using Wavefront Shaping
Published 2017-01-01“…In this paper, a practical optical cryptanalysis method using wavefront shaping is proposed. Considering that the confusion and diffusion of information in the optical cryptosystem are actually caused by scattering effect of random phase mask(s), the proposed method employs a point source function and the feedback-based optimization algorithm, which can obtain an equivalent key of the optical cryptosystem. …”
Get full text
Article -
834
-
835
Research on Coordinated Control of Dynamic Reactive Power Sources of DC Blocking and Commutation Failure Transient Overvoltage in New Energy Transmission
Published 2025-05-01“…Subsequently, a multi-source coordinated optimization model is developed with the objective of minimizing transient overvoltages under simultaneous dual-fault conditions. …”
Get full text
Article -
836
Graph-based method for constructing consensus trees
Published 2025-01-01“…Availability and implementation: The source code of PrimConsTree is freely available on GitHub at https://github.com/tahiri-lab/PrimConsTree.…”
Get full text
Article -
837
Production method for electrospun chitosan-based membranes
Published 2025-06-01Get full text
Article -
838
EXPERIMENTAL TESTING OF AN IN VIVO METHOD OF PHOTOTOXICITY EVALUATION
Published 2018-06-01“…The purpose of this study was to test an economically viable and informative method for in vivo evaluation of tetracycline and ketorolac phototoxicity using outbred rats. …”
Get full text
Article -
839
Comparative analysis of geothermal and reservoir numerical simulation methods
Published 2024-12-01“…By comparing the foundational mathematical models, numerical methods, and case studies of geothermal and reservoir simulations, this study highlights the similarities and differences in their application to the development of these two energy sources. …”
Get full text
Article -
840
Interleaving between Ant Colony Optimization and Tabu Search for Image Matching
Published 2007-12-01“…The role of matching is to integrate multiple sources of object information into a single image. …”
Get full text
Article