Showing 821 - 840 results of 4,920 for search '(( source optimization methods ) OR ( sources optimization methods ))', query time: 0.39s Refine Results
  1. 821
  2. 822
  3. 823
  4. 824

    Minimizing the Active Power Losses and Retaining the Voltage Profile of the Distribution System Using Soft Computing Techniques with DG Source by P. Sundararaman, E. Mohan, S. V. Aswin Kumer, Sridhar Udayakumar, Abdissa Fekadu Moti

    Published 2022-01-01
    “…The radial distribution system has lower power losses, best voltage profile, cost of saving the DG source, optimal placing of a suitable rating of the DG source, optimal location of the DG source, and cost of saving the DG source which were achieved in this work. …”
    Get full text
    Article
  5. 825

    Design and evaluation of a high-performance betavoltaic battery utilizing vertically stacked diamond matched 90Sr source by Shiquan Cao, Guanghui Zhang, Yumin Liu, Zhengce Jiang, Heling Yao, Yuncheng Han, Maogen Su

    Published 2025-06-01
    “…However, the optimal overall efficiency of 0.46% was obtained at the source efficiency of 90% and the same unit thickness. …”
    Get full text
    Article
  6. 826

    Experimental study on preparation of mine-used filling cementitious material from multi-source coal-based solid wastes by Zhifei LIU, Wei WU, Zhongwei BI, Xingyu FU, Yeqing LANG, Qingli HOU, Xinguo JIA

    Published 2024-12-01
    “…By conducting orthogonal test, the optimal ratio of each component in the cementitious material was determined, and the Tesser five-step method was used to study the occurrence and leaching characteristics of heavy metal elements in the cementitious material. …”
    Get full text
    Article
  7. 827

    Software diversification method based on binary rewriting by Benwei HE, Yunfei GUO, Yawen WANG, Qingfeng WANG, Hongchao HU

    Published 2023-04-01
    “…Software diversity is an effective defense against code-reuse attacks, but most existing software diversification technologies are based on source code.Obtaining program source code may be difficult, while binary files are challenging to disassemble accurately and distinguish between code pointers and data constants.This makes binary file diversification difficult to generate high levels of randomization entropy, and easily compromised by attackers.To overcome these challenges, a binary file oriented software diversification method was proposed based on static binary rewriting technology, namely instruction offset randomization.This method inserted NOP instructions of varying byte lengths before program instructions with a certain probability, reducing the number of unintended gadgets in the program and randomly offsetting the original instruction address.This disrupts the program’s original memory layout and increases the cost of code-reuse attacks.At the same time, an optimization strategy based on hot code was designed for this method.The execution times of basic blocks in binary files were obtained by dynamic pile insertion, so as to adjust the NOP instruction insertion probability in each basic block.The higher the execution frequency, the fewer NOP instructions were inserted into the basic block, which can ensure lower performance overhead and produce higher randomization entropy.In the experimental part, the SPEC benchmark program was used to test the optimized method from the aspects of performance overhead, gadget survival rate and file size.The results show that a 15% insertion probability achieves the best effect, with an average gadget survival rate of less than 1.49%, increasing attackers’ difficulty in reusing the same gadget attack chain.Furthermore, only a 4.1% operation overhead and 7.7% space overhead are added, maintaining high levels of security.…”
    Get full text
    Article
  8. 828

    Retrieval of Passive Seismic Virtual Source Data Under Non-Ideal Illumination Conditions Based on Enhanced U-Net by Wensha Huang, Pan Zhang, Binghui Zhao, Donghao Zhang, Liguo Han

    Published 2025-05-01
    “…The multidimensional deconvolution method (MDD) alleviates reliance on passive-source distribution, but requires wavefield decomposition of the original data. …”
    Get full text
    Article
  9. 829

    Class-aware multi-source domain adaptation algorithm for medical image analysis using reweighted matrix matching strategy. by Huiying Zhang, Yongmeng Li, Lei He, Wenbo Zhang, Yuchen Shen, Lumin Xing

    Published 2025-01-01
    “…Additionally, first-order and second-order moment matching strategies are applied to effectively align the source and target domains, while an adaptive weighting mechanism is utilized to optimize the contributions of different source domains to the target domain. …”
    Get full text
    Article
  10. 830

    Blind source separation and unmanned aerial vehicle classification using CNN with hybrid cross-channel and spatial attention module by Jiangong Ni, Zhigang Zhou

    Published 2025-07-01
    “…By enhancing the whitening process during the data preprocessing step, the blind source separation process becomes more stable and reliable. …”
    Get full text
    Article
  11. 831

    A Fuzzy Multi-Criteria Approach for Selecting Open-Source ERP Systems in SMEs Using Fuzzy AHP and TOPSIS by Dana Marsetiya Utama, Muhammad Faisal Ibrahim, Ahmed Nedal Abid Al Kareem Jabari

    Published 2025-01-01
    “…This research aims to propose an innovative methodology by integrating the fuzzy Analytical Hierarchy Process (fuzzy AHP) and fuzzy Technique for Order Preference by Similarity to the Ideal Solution (fuzzy TOPSIS) to improve the open-source ERP selection process. The method involves eight criteria and 26 sub-criteria to comprehensively evaluate 11 open-source ERP alternatives, specifically for SMEs in the transportation services sector in Indonesia. …”
    Get full text
    Article
  12. 832

    Exergy analysis of the boiler using the pinch method by E. A. Yushkova, V. A. Lebedev

    Published 2019-12-01
    “…Exergy analysis of thermal systems shows quantitative and qualitative characteristics of efficiency. The pinch method allows us to solve specific design problems to optimize the parameters of heat power facilities. …”
    Get full text
    Article
  13. 833

    Optical Cryptanalysis Method Using Wavefront Shaping by Meihua Liao, Dajiang Lu, Wenqi He, Xiang Peng

    Published 2017-01-01
    “…In this paper, a practical optical cryptanalysis method using wavefront shaping is proposed. Considering that the confusion and diffusion of information in the optical cryptosystem are actually caused by scattering effect of random phase mask(s), the proposed method employs a point source function and the feedback-based optimization algorithm, which can obtain an equivalent key of the optical cryptosystem. …”
    Get full text
    Article
  14. 834
  15. 835

    Research on Coordinated Control of Dynamic Reactive Power Sources of DC Blocking and Commutation Failure Transient Overvoltage in New Energy Transmission by Shuqin Sun, Zhenghai Yuan, Dezhi Chen, Zaihua Li, Xiaojun Tang, Yunting Song, Guanghao Zhou

    Published 2025-05-01
    “…Subsequently, a multi-source coordinated optimization model is developed with the objective of minimizing transient overvoltages under simultaneous dual-fault conditions. …”
    Get full text
    Article
  16. 836

    Graph-based method for constructing consensus trees by Torquet Elio, Jansson Jesper, Tahiri Nadia

    Published 2025-01-01
    “…Availability and implementation: The source code of PrimConsTree is freely available on GitHub at https://github.com/tahiri-lab/PrimConsTree.…”
    Get full text
    Article
  17. 837
  18. 838

    EXPERIMENTAL TESTING OF AN IN VIVO METHOD OF PHOTOTOXICITY EVALUATION by V. А. Vavilova, E. V. Shekunova, V. A. Kashkin, M. N. Makarova, V. G. Makarov, A. Ya. Khaymenov

    Published 2018-06-01
    “…The purpose of this study was to test an economically viable and informative method for in vivo evaluation of tetracycline and ketorolac phototoxicity using outbred rats. …”
    Get full text
    Article
  19. 839

    Comparative analysis of geothermal and reservoir numerical simulation methods by GAI Changcheng, LI Hongda, REN Lu, CAO Wei, HAO Jie

    Published 2024-12-01
    “…By comparing the foundational mathematical models, numerical methods, and case studies of geothermal and reservoir simulations, this study highlights the similarities and differences in their application to the development of these two energy sources. …”
    Get full text
    Article
  20. 840

    Interleaving between Ant Colony Optimization and Tabu Search for Image Matching by Ghusoon Basheer

    Published 2007-12-01
    “…The role of matching is to integrate multiple sources of object information into a single image. …”
    Get full text
    Article