-
1301
Low-carbon and economic optimization of a source-load-storage system based on Stackelberg game and chance constraints
Published 2025-01-01“…Next, considering the autonomy of the entities in SLSS, a decision-making model is developed based on the Stackelberg game. In this game-theoretic framework, the Power Management Operator acts as the leader, whereas the Power Generation Operator, Energy Storage Operator, and User serve as followers. …”
Get full text
Article -
1302
Features of interrogation of minors who are victims of violence
Published 2020-06-01“…The features of interrogation of minors who are victims of violence and their significance in criminal proceedings have been theoretically analyzed. The author has determined the subject matter, object and tasks of interrogation of minors and features of the impact of violence on the development of a child and evidence provided by this child. …”
Get full text
Article -
1303
Conversion relationships and three-dimensional storage and utilization modes of four water resources in an open-pit mining area
Published 2025-07-01“…The results of this study hold significant theoretical implications and considerable engineering application value for the efficient storage, conservation, allocation, and utilization of open-pit mine water.…”
Get full text
Article -
1304
Naive Bayes Analysis for Nutritional Fulfillment Prediction in Children
Published 2025-06-01“…This study uses the Naïve Bayes approach to forecast nutritional needs for children's growth and development, providing practical information for stunting prevention efforts. …”
Get full text
Article -
1305
Improving lifetime of WSN using modified Moth Flame Optimization
Published 2023-09-01“…Within the predetermined search space, it also does phase balancing between the exploration and development phases. In terms of residual energy, sensor node lifetime, used energy, end-to-end latency, and a maximum number of cycles, it differs from current classical and swarm intelligence (SI) techniques. …”
Get full text
Article -
1306
Resilient service function chain initial deployment and dynamic replacement towards 6G networks
Published 2025-06-01Get full text
Article -
1307
First M87 Event Horizon Telescope Results. VI. The Shadow and Mass of the Central Black Hole
Published 2019-01-01Get full text
Article -
1308
Device Substantiation for Generating Artificial Rain Drops by Pneumohydraulic Liquid Spraying
Published 2021-06-01“…(Materials and methods) The authors used an algorithm for calculating parameters in EXCEL or WPS spreadsheet processor and mathematical expressions. …”
Get full text
Article -
1309
Possibilities of statistical methodology in the study of economic security of the region
Published 2019-01-01Get full text
Article -
1310
From Halos to Galaxies. VI. Improved Halo Mass Estimation for SDSS Groups and Measurement of the Halo Mass Function
Published 2025-01-01“…To improve this, we have developed a new machine learning (ML) algorithm that accounts for these effects and is trained on simulations. …”
Get full text
Article -
1311
Dynamic Voltage Balancing Across Series-Connected 10 kV SiC JBS Diodes in Medium Voltage 3L-NPC Power Converter Having Snubberless Series-Connected 10 kV SiC MOSFETs
Published 2024-01-01“…The maximum error between the theoretical model and experimental data is 4.8%.…”
Get full text
Article -
1312
Numerical Simulation of Dynamic Response of Slab-Column Structures under Fire-Explosion Coupled Effects
Published 2025-01-01“…In the validation stage, two distinct finite element models were developed and rigorously validated against full-scale experimental data from existing literature. …”
Get full text
Article -
1313
Verification of functional models of chemical manufacturing
Published 2019-08-01“…A generalized algorithm for the verification of functional models and the rules for the verification of diagrams related by levels of detail were developed in this paper. …”
Get full text
Article -
1314
Neutrino interaction vertex reconstruction in DUNE with Pandora deep learning
Published 2025-06-01Get full text
Article -
1315
Exploiting full-duplex opportunities in WLANs via a reinforcement learning-based medium access control protocol
Published 2024-12-01“…Thus, we develop a Window-Constraint Bayesian (WCB) algorithm to generate optimized scheduling policies online. …”
Get full text
Article -
1316
Predicting effective drug combinations for cancer treatment using a graph-based approach
Published 2025-03-01“…Cross-validation results indicate that the RWRDC model outperforms other predictive models, particularly in breast, colorectal, and lung cancer predictions across various performance metrics. We have theoretically proven the convergence of its algorithm and provided an explanation for the algorithm's rationality. …”
Get full text
Article -
1317
Capacity Maximization Using Nash Bargaining in Indoor Optical Multiuser Interference-Limited Poisson Channel
Published 2020-01-01“…Moreover, to compare the performance with a non-game-theoretic approach, a convex optimization framework is developed. …”
Get full text
Article -
1318
Equilibrium Analysis of Electricity Market with Multi-Agents Considering Uncertainty
Published 2025-04-01“…To quantify the impacts on locational marginal prices and stakeholders’ economic interests when EV aggregators (EVAs), cloud energy storage operators (CESSOs), and load aggregators (LAs) collectively participate in market competition, this study develops a bi-level game-theoretic framework for market equilibrium analysis. …”
Get full text
Article -
1319
Simplified Adaptive Robust Motion Control with Varying Boundary Discontinuous Projection of Hydraulic Actuator
Published 2014-01-01“…This paper deals with the high performance adaptive robust motion control of electrohydraulic servo system driven by dual vane hydraulic rotary actuator. The recently developed adaptive robust control theory is used to handle the nonlinearities and modelling uncertainties in hydraulic systems. …”
Get full text
Article -
1320
On the Issue of Expert Terms in Forensic Linguistics
Published 2020-04-01“…The article also shows the algorithm for developing forensic linguistic terms depending on the wording of a legal provision on examples from expert practice.…”
Get full text
Article