-
101
A comprehensive review of dwell time optimization methods in computer-controlled optical surfacing
Published 2024-09-01Get full text
Article -
102
Review of Thermal Calculation Methods for Boilers—Perspectives on Thermal Optimization for Improving Ecological Parameters
Published 2024-12-01“…A reasonable energy transition should be based on the direction of the thermal optimization of already functioning structures and adaptation of their operating parameters to the planned new ecological fuels in the sense of the intensification of energy converted from primary form to thermal energy, and in the last step, it should reorganize the energy and industrial sectors, leaving only these groups of devices treated as a stable and necessary source of energy. …”
Get full text
Article -
103
Prediction Method of Lithology Log Based on XGBoost Algorithm
Published 2024-12-01“…The XGBoost algorithm has been applied in the logging field, and it provides a new method for improving the accuracy of lithology logging data.…”
Get full text
Article -
104
A tutorial review of policy iteration methods in reinforcement learning for nonlinear optimal control
Published 2025-06-01“…Reinforcement learning (RL) has been a powerful framework for designing optimal controllers for nonlinear systems. This tutorial review provides a comprehensive exploration of RL techniques, with a particular focus on policy iteration methods for the development of optimal controllers. …”
Get full text
Article -
105
Probabilistic Optimization Method for Pilot-Bus Selection and Network Partitioning of AC/DC System
Published 2020-08-01“…To ensure higher voltage control ability of regional power supply to the converter bus, a probabilistic optimization method for pilot-bus selection and network partitioning of AC/DC system is proposed in this paper. …”
Get full text
Article -
106
Deep learning vulnerability detection method based on optimized inter-procedural semantics of programs
Published 2023-12-01“…In recent years, software vulnerabilities have been causing a multitude of security incidents, and the early discovery and patching of vulnerabilities can effectively reduce losses.Traditional rule-based vulnerability detection methods, relying upon rules defined by experts, suffer from a high false negative rate.Deep learning-based methods have the capability to automatically learn potential features of vulnerable programs.However, as software complexity increases, the precision of these methods decreases.On one hand, current methods mostly operate at the function level, thus unable to handle inter-procedural vulnerability samples.On the other hand, models such as BGRU and BLSTM exhibit performance degradation when confronted with long input sequences, and are not adept at capturing long-term dependencies in program statements.To address the aforementioned issues, the existing program slicing method has been optimized, enabling a comprehensive contextual analysis of vulnerabilities triggered across functions through the combination of intra-procedural and inter-procedural slicing.This facilitated the capture of the complete causal relationship of vulnerability triggers.Furthermore, a vulnerability detection task was conducted using a Transformer neural network architecture equipped with a multi-head attention mechanism.This architecture collectively focused on information from different representation subspaces, allowing for the extraction of deep features from nodes.Unlike recurrent neural networks, this approach resolved the issue of information decay and effectively learned the syntax and semantic information of the source program.Experimental results demonstrate that this method achieves an F1 score of 73.4% on a real software dataset.Compared to the comparative methods, it shows an improvement of 13.6% to 40.8%.Furthermore, it successfully detects several vulnerabilities in open-source software, confirming its effectiveness and applicability.…”
Get full text
Article -
107
Enhancement method of series hybrid ship energy efficiency for speed and energy collaborative optimization
Published 2023-06-01“…Our findings demonstrated that this optimization method can distribute the output of the power source in a better way, thereby optimising the speed of the vessel and maintaining stable sailing. …”
Get full text
Article -
108
Optimized Method to Generate Well-Characterized Macrophages from Induced Pluripotent Stem Cells
Published 2025-01-01“…<b>Methods</b>: We refined the traditional embryoid body-based differentiation strategy to create a novel three-phase method that optimizes yield, consistent quality, and reproducibility. …”
Get full text
Article -
109
A Single Phase Inverter Using The Unipolar Sinusoidal Pulse Width Modulation Method
Published 2025-07-01Get full text
Article -
110
A Novel Method for News Recommendation on Websites Using the Clustered-Vectors Optimization Algorithm
Published 2025-01-01Get full text
Article -
111
Optimizing the Hexagonal Fuzzy Transportation Problem With the Novel Dhouib-Matrix-TP1 Method
Published 2025-01-01“…Transportation Problem (TP) is considered a combinatorial optimization problem, and its aim is to minimize the total transportation cost from several sources to different destinations. …”
Get full text
Article -
112
Design of Optimization Method for Light Energy Utilization in Fiber Optic Day-lighting System
Published 2025-06-01“…【Methods】A fiber optic probe structure is designed to address the issue of real-time alignment of sunlight, targeting the nonlinear response of zenith angle. …”
Get full text
Article -
113
Research on Reactor Radiation Shielding Optimization Method Based on Multi-objective Evolutionary Algorithm
Published 2024-06-01“…Traditional multi-objective optimization methods for radiation shielding suffer from limitations such as a restricted number of optimization objectives, a limited set of optimization parameters, and suboptimal global optimization, rendering them inadequate for intelligent radiation shielding design. …”
Article -
114
Comparison and Optimization of Sr Isotope Analysis in Carbonate Rocks by Multiple-step Leaching Method
Published 2023-08-01“…In the future, the experimental methods will be further improved to encompass samples from diverse sources and varying purity, thereby ensuring the reliability and universality of the experimental approach.…”
Get full text
Article -
115
-
116
Leveraging Open-Source Large Language Models for Data Augmentation in Hospital Staff Surveys: Mixed Methods Study
Published 2024-11-01“…MethodsThe surveys were designed to elicit narratives of everyday adaptation by frontline radiology staff during the initial phase of the COVID-19 pandemic. …”
Get full text
Article -
117
Multi-time scale source and load intelligent scheduling method for distribution network based on multi-agent game
Published 2022-03-01“…Considering that the user demand will affect the effect of multi-time scale source load intelligent dispatching in distribution network to a certain extent, a multi-agent game based multi-time scale source load intelligent dispatching method is proposed. …”
Get full text
Article -
118
Open-source electronics Arduino platform for soil water measurement with the dual-probe heat-pulse (DPHP) method
Published 2024-12-01“…In this manuscript, we report on implementation of this method using a custom-made inexpensive open-source electronic hardware measurement system, based on the Arduino Uno platform. …”
Get full text
Article -
119
Solving the Single-Source Capacitated Facility Location Problem Using a Crow Search-Based Hybrid Method
Published 2025-01-01“…The Single Source Capacitated Facility Location Problem (SSCFLP) stands as a pivotal yet highly complex challenge in facility location science, underpinning real-world supply chains where single-sourcing constraints are critical for service quality and operational efficiency. …”
Get full text
Article -
120
Optimization Scheduling of Multiple Heterogeneous Energy Sources
Published 2025-05-01“…The discussion revolves around the methods of multi-source heterogeneous energy optimization scheduling to achieve intelligent scheduling and efficient operation of energy systems. …”
Get full text
Article