Search alternatives:
source » sources (Expand Search)
Showing 501 - 520 results of 1,534 for search 'source configuration', query time: 0.10s Refine Results
  1. 501

    Large-Scale Containment Cooler Performance Experiments under Accident Conditions by Ralf Kapulla, Guillaume Mignot, Domenico Paladino

    Published 2012-01-01
    “…A wall jet interacts with an operating containment cooler located in the middle (M-configuration) and the top (T-configuration) of the containment vessel. …”
    Get full text
    Article
  2. 502

    Global and Local Path Planning Study in a ROS-Based Research Platform for Autonomous Vehicles by Pablo Marin-Plaza, Ahmed Hussein, David Martin, Arturo de la Escalera

    Published 2018-01-01
    “…During the experiment, we proved the low sensitivity of the TEB method to variations of the vehicle model configuration and constraints.…”
    Get full text
    Article
  3. 503

    On-demand generation of nondiffracting Helmholtz–Gauss laser beams by Ly Ly Nguyen Thi, Kuo-Chih Chang, Shu-Chun Chu

    Published 2025-04-01
    “…The key technique involves controlling the two end-phase boundaries of a dual-modulation digital laser resonator with a concentric configuration, thereby ensuring stable round-trip conditions for generating various nondiffracting beams. …”
    Get full text
    Article
  4. 504

    Dual system trusted terminal computing architecture based on TPCM RoT by HUANG Jianhui, ZHANG Jiangjiang, SHEN Changxiang, ZHANG Jianbiao

    Published 2025-04-01
    “…A dual architecture was adopted to implement a progressive parallel trusted execution environment architecture based on trusted roots, solving the problems of terminal device source, platform execution environment, and terminal device trusted management from the perspectives of hardware trusted root chips and underlying basic software. …”
    Get full text
    Article
  5. 505

    Design and Development of Educational Modular Mobile Robot Platform by Denis Kotarski, Petar Piljek, Tomislav Šančić

    Published 2025-01-01
    “…The proposed modular platform underwent validation across three robot configurations and three different control ecosystems.…”
    Get full text
    Article
  6. 506

    Is Modernity Single and Universal?: Olaju and the Multilateral Modernity by Adeshina Afolayan

    Published 2021-12-01
    “…With olaju, we arrive at the conclusion that both Europe and non-Europe are complicit in the formation and configuration of what it means to be modern. It is only from this premise that the foundation of multiple modernities can properly be erected. …”
    Get full text
    Article
  7. 507

    BEASTling: A software tool for linguistic phylogenetics using BEAST 2. by Luke Maurits, Robert Forkel, Gereon A Kaiping, Quentin D Atkinson

    Published 2017-01-01
    “…We present a new open source software tool called BEASTling, designed to simplify the preparation of Bayesian phylogenetic analyses of linguistic data using the BEAST 2 platform. …”
    Get full text
    Article
  8. 508

    φ-evo: A program to evolve phenotypic models of biological networks. by Adrien Henry, Mathieu Hemery, Paul François

    Published 2018-06-01
    “…We present φ-evo, an open-source program to evolve in silico phenotypic networks performing a given biological function. …”
    Get full text
    Article
  9. 509

    Experimental method for determining the supply current of a PMOS power transistor for use as a RADFET dosimeter by Eduardo Gomes Mendonça, Tassio Cortês Cavalcante, Rafael Galhardo Vaz, Evaldo Carlos Fonseca Pereira Junior, Odair Lelis Gonçalez

    Published 2023-05-01
    “…In this work it is presented a novel experimental method to determine the optimal drain-source current value to be supplied to a p-type MOSFET used in a traditional RADFET configuration (diode connected transistor) for monitoring of the accumulated X- and gamma-radiation dose. …”
    Get full text
    Article
  10. 510

    The Multiobjective Based Large-Scale Electric Vehicle Charging Behaviours Analysis by Yimin Zhou, Zhifei Li, Xinyu Wu

    Published 2018-01-01
    “…As a precedent of open-source simulation system, this paper provides a stand-alone strategy and architecture to regulate the EV charging behaviours without the unified monitoring or management of the grid.…”
    Get full text
    Article
  11. 511

    Full Downwind Turbine Simulations Using Actuator Line Method by A. Matiz-Chicacausa, Omar D. Lopez

    Published 2018-01-01
    “…In the present work the actuator line (AL) technique is proposed to model a complete wind turbine (rotor and tower) in downwind configuration. The case study used is the Unsteady Aerodynamics Experiment (UAE) Phase VI turbine to analyze its suitability in capturing the tower shadow effect. …”
    Get full text
    Article
  12. 512

    Achieving net zero energy penalty in post-combustion carbon capture through solar Energy: Parabolic trough and photovoltaic technologies by Farzin Hosseinifard, Milad Hosseinpour, Mohsen Salimi, Majid Amidpour

    Published 2024-10-01
    “…Addressing this challenge necessitates the integration of renewable energy sources. This study is dedicated to optimizing the conventional post-combustion carbon capture configuration, focusing on energy, exergy, and exergoeconomic considerations. …”
    Get full text
    Article
  13. 513

    Information Bottleneck-Based Domain Adaptation for Hybrid Deep Learning in Scalable Network Slicing by Tianlun Hu, Qi Liao, Qiang Liu, Georg Carle

    Published 2024-01-01
    “…This VIB-based estimator is continuously fine-tuned with a mixture of samples from both the source and target domains until convergence. Evaluating on a multi-cell network with time-varying slice configurations, the VIB-enhanced IDLA algorithm outperforms baselines such as heuristic and deep reinforcement learning-based solutions, achieving twice the convergence speed and 16.52% higher asymptotic performance after slicing configuration changes. …”
    Get full text
    Article
  14. 514

    Performance Evaluation at the Remote Site for RF Frequency Dissemination Over Fiber by Shanglin Li, Cong Wang, Haoyuan Lu, Jianye Zhao

    Published 2017-01-01
    “…In the frequency dissemination system over fiber, users can obtain highly stable RF frequency signal from one frequency source. To ensure that the stability loss of the system meets the user's need, performance evaluation for RF frequency dissemination over fiber is necessary. …”
    Get full text
    Article
  15. 515

    Cooperative Transmission in Cognitive Radio Ad Hoc Networks by Juncheng Jia, Shukui Zhang

    Published 2012-05-01
    “…Such an approach leverages relay-assisted discontiguous OFDM (DOFDM) for data transmission at physical and MAC layers in a basic three-node configuration. With this scheme, a relay node will be selected that can bridge the source and the destination using its common channels between those two nodes. …”
    Get full text
    Article
  16. 516

    Geodatabase per la valutazione speditiva a larga scala della vulnerabilità sismica di un’area urbana complessa: applicazione alla città di Firenze by Pauline Deguy, Maurizio Ripepe, Giorgio Lacanna, Letizia Orti

    Published 2022-01-01
    “…This study is based on the creation of a GIS database containing useful information to identify and valuate some indicators of seismic vulnerability in order to understand an earthquake’s effect for the actual configuration of a city. This system could be a growing source of information on cities and, if used in the proper way, a useful tool for monitoring, for seismic vulnerability assessment, and for spatial urban planning. …”
    Get full text
    Article
  17. 517

    Low-voltage programming of RRAM-based crossbar arrays using MOS parasitic diodes by Sachin Maheshwari, Alex Serb, Themis Prodromakis

    Published 2025-07-01
    “…To mitigate this issue, we propose a new configuration—1-transistor-1-diode-1-resistor (1T1D1R)—in which diodes are used (including bulk source/drain parasitic diodes of the access transistor) to bypass the gating transistor during the programming operation (“write”). …”
    Get full text
    Article
  18. 518

    Tensor-Based Methods for Blind Spatial Signature Estimation in Multidimensional Sensor Arrays by Paulo R. B. Gomes, André L. F. de Almeida, João Paulo C. L. da Costa, João C. M. Mota, Daniel Valle de Lima, Giovanni Del Galdo

    Published 2017-01-01
    “…The second tensor-based algorithm is formulated for the case in which the sources are uncorrelated and exploits the dual-symmetry of the covariance tensor. …”
    Get full text
    Article
  19. 519

    On Generating Synthetic Datasets for Photometric Stereo Applications by Elisa Crabu, Giuseppe Rodriguez

    Published 2025-04-01
    “…Moreover, the camera and the light source, in some situations, have to be placed at a close distance from the target, rather than at infinite distance from it. …”
    Get full text
    Article
  20. 520

    Cooperative Optimal Control Strategy for Microgrid under Grid-Connected and Islanded Modes by Xuemei Zheng, Qiuming Li, Peng Li, Danmei Ding

    Published 2014-01-01
    “…This paper investigates the control performance of a physical configuration of a microgrid (MG), integrated with photovoltaic (PV) arrays, battery energy storage systems (BESSs), and variable loads. …”
    Get full text
    Article