-
501
Large-Scale Containment Cooler Performance Experiments under Accident Conditions
Published 2012-01-01“…A wall jet interacts with an operating containment cooler located in the middle (M-configuration) and the top (T-configuration) of the containment vessel. …”
Get full text
Article -
502
Global and Local Path Planning Study in a ROS-Based Research Platform for Autonomous Vehicles
Published 2018-01-01“…During the experiment, we proved the low sensitivity of the TEB method to variations of the vehicle model configuration and constraints.…”
Get full text
Article -
503
On-demand generation of nondiffracting Helmholtz–Gauss laser beams
Published 2025-04-01“…The key technique involves controlling the two end-phase boundaries of a dual-modulation digital laser resonator with a concentric configuration, thereby ensuring stable round-trip conditions for generating various nondiffracting beams. …”
Get full text
Article -
504
Dual system trusted terminal computing architecture based on TPCM RoT
Published 2025-04-01“…A dual architecture was adopted to implement a progressive parallel trusted execution environment architecture based on trusted roots, solving the problems of terminal device source, platform execution environment, and terminal device trusted management from the perspectives of hardware trusted root chips and underlying basic software. …”
Get full text
Article -
505
Design and Development of Educational Modular Mobile Robot Platform
Published 2025-01-01“…The proposed modular platform underwent validation across three robot configurations and three different control ecosystems.…”
Get full text
Article -
506
Is Modernity Single and Universal?: Olaju and the Multilateral Modernity
Published 2021-12-01“…With olaju, we arrive at the conclusion that both Europe and non-Europe are complicit in the formation and configuration of what it means to be modern. It is only from this premise that the foundation of multiple modernities can properly be erected. …”
Get full text
Article -
507
BEASTling: A software tool for linguistic phylogenetics using BEAST 2.
Published 2017-01-01“…We present a new open source software tool called BEASTling, designed to simplify the preparation of Bayesian phylogenetic analyses of linguistic data using the BEAST 2 platform. …”
Get full text
Article -
508
φ-evo: A program to evolve phenotypic models of biological networks.
Published 2018-06-01“…We present φ-evo, an open-source program to evolve in silico phenotypic networks performing a given biological function. …”
Get full text
Article -
509
Experimental method for determining the supply current of a PMOS power transistor for use as a RADFET dosimeter
Published 2023-05-01“…In this work it is presented a novel experimental method to determine the optimal drain-source current value to be supplied to a p-type MOSFET used in a traditional RADFET configuration (diode connected transistor) for monitoring of the accumulated X- and gamma-radiation dose. …”
Get full text
Article -
510
The Multiobjective Based Large-Scale Electric Vehicle Charging Behaviours Analysis
Published 2018-01-01“…As a precedent of open-source simulation system, this paper provides a stand-alone strategy and architecture to regulate the EV charging behaviours without the unified monitoring or management of the grid.…”
Get full text
Article -
511
Full Downwind Turbine Simulations Using Actuator Line Method
Published 2018-01-01“…In the present work the actuator line (AL) technique is proposed to model a complete wind turbine (rotor and tower) in downwind configuration. The case study used is the Unsteady Aerodynamics Experiment (UAE) Phase VI turbine to analyze its suitability in capturing the tower shadow effect. …”
Get full text
Article -
512
Achieving net zero energy penalty in post-combustion carbon capture through solar Energy: Parabolic trough and photovoltaic technologies
Published 2024-10-01“…Addressing this challenge necessitates the integration of renewable energy sources. This study is dedicated to optimizing the conventional post-combustion carbon capture configuration, focusing on energy, exergy, and exergoeconomic considerations. …”
Get full text
Article -
513
Information Bottleneck-Based Domain Adaptation for Hybrid Deep Learning in Scalable Network Slicing
Published 2024-01-01“…This VIB-based estimator is continuously fine-tuned with a mixture of samples from both the source and target domains until convergence. Evaluating on a multi-cell network with time-varying slice configurations, the VIB-enhanced IDLA algorithm outperforms baselines such as heuristic and deep reinforcement learning-based solutions, achieving twice the convergence speed and 16.52% higher asymptotic performance after slicing configuration changes. …”
Get full text
Article -
514
Performance Evaluation at the Remote Site for RF Frequency Dissemination Over Fiber
Published 2017-01-01“…In the frequency dissemination system over fiber, users can obtain highly stable RF frequency signal from one frequency source. To ensure that the stability loss of the system meets the user's need, performance evaluation for RF frequency dissemination over fiber is necessary. …”
Get full text
Article -
515
Cooperative Transmission in Cognitive Radio Ad Hoc Networks
Published 2012-05-01“…Such an approach leverages relay-assisted discontiguous OFDM (DOFDM) for data transmission at physical and MAC layers in a basic three-node configuration. With this scheme, a relay node will be selected that can bridge the source and the destination using its common channels between those two nodes. …”
Get full text
Article -
516
Geodatabase per la valutazione speditiva a larga scala della vulnerabilità sismica di un’area urbana complessa: applicazione alla città di Firenze
Published 2022-01-01“…This study is based on the creation of a GIS database containing useful information to identify and valuate some indicators of seismic vulnerability in order to understand an earthquake’s effect for the actual configuration of a city. This system could be a growing source of information on cities and, if used in the proper way, a useful tool for monitoring, for seismic vulnerability assessment, and for spatial urban planning. …”
Get full text
Article -
517
Low-voltage programming of RRAM-based crossbar arrays using MOS parasitic diodes
Published 2025-07-01“…To mitigate this issue, we propose a new configuration—1-transistor-1-diode-1-resistor (1T1D1R)—in which diodes are used (including bulk source/drain parasitic diodes of the access transistor) to bypass the gating transistor during the programming operation (“write”). …”
Get full text
Article -
518
Tensor-Based Methods for Blind Spatial Signature Estimation in Multidimensional Sensor Arrays
Published 2017-01-01“…The second tensor-based algorithm is formulated for the case in which the sources are uncorrelated and exploits the dual-symmetry of the covariance tensor. …”
Get full text
Article -
519
On Generating Synthetic Datasets for Photometric Stereo Applications
Published 2025-04-01“…Moreover, the camera and the light source, in some situations, have to be placed at a close distance from the target, rather than at infinite distance from it. …”
Get full text
Article -
520
Cooperative Optimal Control Strategy for Microgrid under Grid-Connected and Islanded Modes
Published 2014-01-01“…This paper investigates the control performance of a physical configuration of a microgrid (MG), integrated with photovoltaic (PV) arrays, battery energy storage systems (BESSs), and variable loads. …”
Get full text
Article