Suggested Topics within your search.
Suggested Topics within your search.
-
361
Investigating the truncated fractional telegraph equation in engineering: Solitary wave solutions, chaotic and sensitivity analysis
Published 2025-03-01“…For this purpose, the Galilean transformation is applied, and a variety of graphs in 2D phase portraits and time-series analyses have been sketched. …”
Get full text
Article -
362
Research on a Method for Identifying Key Fault Information in Substations
Published 2025-05-01Get full text
Article -
363
Research on lightning impulse simulation method and protection technology of a traction power supply system
Published 2022-01-01“…Through the comparison of different configuration schemes of lightning arrester in traction substation, it was concluded that the installation of lightning arrester on the low-voltage output side of traction transformer is the best scheme.…”
Get full text
Article -
364
Magnetic Field Effects on Convective Heat Transfer of Ferrofluid from a Heated Sphere in Porous Media
Published 2025-05-01“…The resulting nonlinear systems of equations are then numerically solved inside the computing domain into a regular rectangle using the effective Finite Difference Method (FDM). Numerical outcomes are then represented in terms of local Nusselt number, velocity, temperature profile, and skin friction coefficient, respectively for a range of porosity parameters, ϵ = 0.4, 0.6, 0.8, magnetic effect parameter or Hartmann number, Ha = 0.0, 1.0, 3.0, 5.0 and the ferroparticle volume fraction coefficients, ϕ = 0%, 2%, 4%, 6%. …”
Get full text
Article -
365
Spatiotemporal Evolution and Driving Mechanisms of kNDVI in Different Sections of the Yangtze River Basin Using Multiple Statistical Methods and the PLSPM Model
Published 2025-01-01“…Compared to traditional correlation analysis and the geographical detector method, PLSPM, as a theoretically driven statistical method, can simultaneously process path relationships among multiple latent variables, effectively revealing the intensity and pathways of driving factors’ influences, while providing more credible and interpretable explanations for kNDVI variation mechanisms. …”
Get full text
Article -
366
Height transformation between SVS2000/TRST and IN SVS2010/KOPER with the national height transformation model
Published 2025-01-01“…The height transformation surface - SLO-VTP2024 was created on the basis of 2,116 height differences between the old and the new height system on benchmarks evenly distributed across Slovenia. …”
Get full text
Article -
367
Extracting speech spectrogram of speech signal based on generalized S-transform.
Published 2025-01-01“…By adjusting parameters, the proposed method flexibly produces spectrograms with different resolutions, offering a novel and effective approach to obtain speech signal spectrograms. …”
Get full text
Article -
368
-
369
Microstructure of PDA/PVDF ultrafiltration membranes under two pore-forming agents and comparison of their retention of organic dyes
Published 2024-12-01“…In order to improve the pollution resistance of polyvinylidene fluoride (PVDF) ultrafiltration membrane to organic dyes, PVDF modified ultrafiltration membrane (PDA/PVDF membrane) was prepared by phase transformation method using polydopamine (PDA) as modifier, polyvinylpyrrolidone (PVP) and lithium chloride (LiCl) as pore-forming agents, respectively. …”
Get full text
Article -
370
Nanoparticle-mediated gene delivery techniques in plant systems
Published 2025-02-01“…Recent advancements in nanotechnology have introduced novel gene-delivery systems, utilizing micro and nanoparticles, which can overcome many limitations of conventional plant gene delivery methods by exhibiting superior transformation efficiency, demonstrate compatibility with biological systems, offer protection to different cargoes, and hold significant capability for enhancing plant regeneration. …”
Get full text
Article -
371
2D affine transform parameters by Gaussian elimination with pivoting
Published 2025-06-01“…In photogrammetry one of the important coordinates transformation methods used to transform photo coordinates is the 2D affine transformation which takes into consideration the change in the differences in scale factor in the x and y directions. …”
Get full text
Article -
372
The applications of Hankel transform to the computation of nearfields of circular baflled sources
Published 2014-05-01“…We have applied the Hankel transform and King's integral. Two examples were calculated - namely the piston with uniform velocity distribution and membrane for different values of the rate of the speed of elastic waves in the membrane to the speed in the medium.…”
Get full text
Article -
373
Wavelet Transform Aided Single-Carrier FDMA With Index Modulation
Published 2025-01-01“…Single-carrier frequency-division multiple access (SC-FDMA) is a well-known multiuser transmission method for uplink communications owing to its low peak-to-average power ratio (PAPR) characteristics. …”
Get full text
Article -
374
Clustering EU countries by the level of information and communication technologies development
Published 2025-06-01“…In the first stage, based on the k-means method, the EU countries were divided into three clusters, which characterize their differences in the ICT development level. …”
Get full text
Article -
375
Application of Hilbert-Huang transform in the analysis of satellite-communication signals
Published 2020-04-01“…For that reason, different methods are used to process the received signal and to remove these perturbations, and thus recover the information. …”
Get full text
Article -
376
Application of the Hough Transform to Dispersion Control of Overlapping Particles and Their Agglomerates
Published 2023-10-01“…It implies repeatedly running the Hough transform with different combinations of parameters. …”
Get full text
Article -
377
Collaboration as Method: Field Lessons from South Sulawesi, Indonesia and Khon Kaen, Thailand
Published 2025-06-01Get full text
Article -
378
-
379
Image steganography based on nonsubsampled Contourlet transform and Hill cipher
Published 2016-06-01“…A novel image steganography was proposed,which was based on nonsubsampled Contourlet transform (NSCT)and Hill cipher.Firstly,cover image was decomposed with NSCT.It provided a multi-scale and multi-directional representation of an image.One of subbands was selected to embed secret data.Then Hill cipher was applied to encrypt the secret message.How to find a proper cipher matrix was important in this way.The selected matrix should be inevitable and relatively prime to the number of alphabets.The skill of 2<sup>k</sup> correction was applied to ease the difference between cover and stego image.Experiment results show that both stego image and retrieved image have better image quality with the proposed approach than other methods.…”
Get full text
Article -
380
A Method for Estimating the SOH of Lithium-Ion Batteries Based on Graph Perceptual Neural Network
Published 2024-09-01Get full text
Article