Showing 821 - 840 results of 4,920 for search '(( sources optimization method ) OR ( source optimization methods ))', query time: 0.32s Refine Results
  1. 821
  2. 822

    Synergistic carbon source utilization in Biofloc aquaculture of common carp (Cyprinus carpio): impacts on growth, health, and environmental parameters by Nandini Rai, J. M. Julka, Akshaya Panigrahi, Sofia Priyadarsani Das

    Published 2025-04-01
    “…This study investigated the effects of varying carbon-to-nitrogen ratios, achieved through different combinations of jaggery and corn flour, rice flour, or rice bran, on the growth performance, body composition, histological health, and immune response of common carp (Cyprinus carpio) fingerlings in a BFT system.MethodsA 90-day experiment was conducted using common carp fingerlings, where different groups were fed diets supplemented with jaggery in combination with either corn flour, rice flour, or rice bran, creating varying C:N ratios. …”
    Get full text
    Article
  3. 823

    Initialization Methods for FPGA-Based EMT Simulations by Xin Ma, Xiao-Ping Zhang

    Published 2024-01-01
    “…To accelerate initialization, software-to-hardware algorithm and structure are developed to automate initialization data sources for different topologies. Case study shows Method 2–4 can both initialize successfully on FPGA platform, while Method 4 achieves the best timing and routing performance. …”
    Get full text
    Article
  4. 824

    Software diversification method based on binary rewriting by Benwei HE, Yunfei GUO, Yawen WANG, Qingfeng WANG, Hongchao HU

    Published 2023-04-01
    “…Software diversity is an effective defense against code-reuse attacks, but most existing software diversification technologies are based on source code.Obtaining program source code may be difficult, while binary files are challenging to disassemble accurately and distinguish between code pointers and data constants.This makes binary file diversification difficult to generate high levels of randomization entropy, and easily compromised by attackers.To overcome these challenges, a binary file oriented software diversification method was proposed based on static binary rewriting technology, namely instruction offset randomization.This method inserted NOP instructions of varying byte lengths before program instructions with a certain probability, reducing the number of unintended gadgets in the program and randomly offsetting the original instruction address.This disrupts the program’s original memory layout and increases the cost of code-reuse attacks.At the same time, an optimization strategy based on hot code was designed for this method.The execution times of basic blocks in binary files were obtained by dynamic pile insertion, so as to adjust the NOP instruction insertion probability in each basic block.The higher the execution frequency, the fewer NOP instructions were inserted into the basic block, which can ensure lower performance overhead and produce higher randomization entropy.In the experimental part, the SPEC benchmark program was used to test the optimized method from the aspects of performance overhead, gadget survival rate and file size.The results show that a 15% insertion probability achieves the best effect, with an average gadget survival rate of less than 1.49%, increasing attackers’ difficulty in reusing the same gadget attack chain.Furthermore, only a 4.1% operation overhead and 7.7% space overhead are added, maintaining high levels of security.…”
    Get full text
    Article
  5. 825

    Exergy analysis of the boiler using the pinch method by E. A. Yushkova, V. A. Lebedev

    Published 2019-12-01
    “…Exergy analysis of thermal systems shows quantitative and qualitative characteristics of efficiency. The pinch method allows us to solve specific design problems to optimize the parameters of heat power facilities. …”
    Get full text
    Article
  6. 826

    Optical Cryptanalysis Method Using Wavefront Shaping by Meihua Liao, Dajiang Lu, Wenqi He, Xiang Peng

    Published 2017-01-01
    “…In this paper, a practical optical cryptanalysis method using wavefront shaping is proposed. Considering that the confusion and diffusion of information in the optical cryptosystem are actually caused by scattering effect of random phase mask(s), the proposed method employs a point source function and the feedback-based optimization algorithm, which can obtain an equivalent key of the optical cryptosystem. …”
    Get full text
    Article
  7. 827
  8. 828

    The Main Trends in Improving the Activities of a Higher Educational Institution in the Context of Digital Transformation by I. E Zhukovskaya

    Published 2021-07-01
    “…In this publication, an analysis of literary and Internet sources on the problem of optimizing educational, pedagogic and scientific activities in a higher educational institution is carried out on the basis of improving the digital infrastructure, as well as the methods and forms of education. …”
    Get full text
    Article
  9. 829
  10. 830

    Graph-based method for constructing consensus trees by Torquet Elio, Jansson Jesper, Tahiri Nadia

    Published 2025-01-01
    “…Availability and implementation: The source code of PrimConsTree is freely available on GitHub at https://github.com/tahiri-lab/PrimConsTree.…”
    Get full text
    Article
  11. 831
  12. 832

    EXPERIMENTAL TESTING OF AN IN VIVO METHOD OF PHOTOTOXICITY EVALUATION by V. А. Vavilova, E. V. Shekunova, V. A. Kashkin, M. N. Makarova, V. G. Makarov, A. Ya. Khaymenov

    Published 2018-06-01
    “…The purpose of this study was to test an economically viable and informative method for in vivo evaluation of tetracycline and ketorolac phototoxicity using outbred rats. …”
    Get full text
    Article
  13. 833

    Microgrid system for electric vehicle charging stations integrated with renewable energy sources using a hybrid DOA–SBNN approach by Kommoju Naga Durga Veera Sai Eswar, M. Arun Noyal Doss, Mohammad Shorfuzzaman, Ali Elrashidi

    Published 2025-01-01
    “…The proposed method outperforms all current techniques, including the Multi swarm Optimization (MSO), the Multi-Objective Gray Wolf Optimizer (MOGWO), and the Modified Multi-objective Salp Swarm Optimization algorithm (MMOSSA). …”
    Get full text
    Article
  14. 834

    Research on Coordinated Control of Dynamic Reactive Power Sources of DC Blocking and Commutation Failure Transient Overvoltage in New Energy Transmission by Shuqin Sun, Zhenghai Yuan, Dezhi Chen, Zaihua Li, Xiaojun Tang, Yunting Song, Guanghao Zhou

    Published 2025-05-01
    “…Subsequently, a multi-source coordinated optimization model is developed with the objective of minimizing transient overvoltages under simultaneous dual-fault conditions. …”
    Get full text
    Article
  15. 835
  16. 836

    DAGIP: alleviating cell-free DNA sequencing biases with optimal transport by Antoine Passemiers, Stefania Tuveri, Tatjana Jatsenko, Adriaan Vanderstichele, Pieter Busschaert, An Coosemans, Dirk Timmerman, Sabine Tejpar, Peter Vandenberghe, Diether Lambrechts, Daniele Raimondi, Joris Robert Vermeesch, Yves Moreau

    Published 2025-03-01
    “…Our method improves cancer detection and copy number alteration analysis by alleviating the sources of variation that are not of biological origin. …”
    Get full text
    Article
  17. 837

    Multi-Focus Image Fusion Using Energy Valley Optimization Algorithm by Harun Akbulut

    Published 2024-09-01
    “…This study proposes a block-based multi-focus image fusion method using the Energy Valley Optimization Algorithm (EVOA), which has been introduced in recent years. …”
    Get full text
    Article
  18. 838

    An Optimal Control of Energy Storage Systems Using Wind Power Prediction by Kenta Koiwa, Tomonori Tashiro, Tomoya Ishii, Tadanao Zanma, Kang-Zhi Liu

    Published 2024-01-01
    “…In the proposed method, an output reference of ESS can be obtained as the solution of an optimization problem. …”
    Get full text
    Article
  19. 839

    Model Similarity Calculation Based on Adaptive Global Optimal Harmony Search by GAO Xue-yao, DONG Xin-ran, ZHANG Chun-xiang

    Published 2020-12-01
    “…Self-adaptive global best harmony search algorithm is used to find an optimal face matching sequence between source model and target one from face similarity matrix. …”
    Get full text
    Article
  20. 840

    Optimized molecule detection in localization microscopy with selected false positive probability by Miroslav Hekrdla, David Roesel, Niklas Hansen, Soumya Frederick, Khalilullah Umar, Vladimíra Petráková

    Published 2025-01-01
    “…Here, we present an optimized molecule detection method which combines probabilistic thresholding with theoretically optimal filtering. …”
    Get full text
    Article