Search alternatives:
source » sources (Expand Search)
Showing 801 - 820 results of 4,920 for search 'source optimization methods', query time: 0.17s Refine Results
  1. 801

    Computational Simulations and Strategies for Optimal Hydrogen Storage Materials Design by Vikram Mahamiya, Alok Shukla, Abhishek Kumar Adak, Hoonkyung Lee, Nicola Seriani, Ralph Gebauer

    Published 2025-05-01
    “…Lett. 97, 056104 (2006)] as a method for calculating maximum hydrogen adsorption per site under varying temperatures and pressures, facilitating estimates of reversible hydrogen delivery. …”
    Get full text
    Article
  2. 802

    Optimal Scheduling of Hybrid Games Considering Renewable Energy Uncertainty by Haihong Bian, Kai Ji, Yifan Zhang, Xin Tang, Yongqing Xie, Cheng Chen

    Published 2025-07-01
    “…The resulting two-level optimization problem is solved using Karush–Kuhn–Tucker (KKT) conditions and the Alternating Direction Method of Multipliers (ADMM). …”
    Get full text
    Article
  3. 803

    Optimal Bidding Strategies for the Participation of Aggregators in Energy Flexibility Markets by Gian Giuseppe Soma, Giuseppe Marco Tina, Stefania Conti

    Published 2025-05-01
    “…The proposed optimal scheduling procedure accounts for important practical and technical aspects related to the DERs’ operation and their flexibility estimation. …”
    Get full text
    Article
  4. 804

    Parameter optimization of biochar pressing into a briquette for energy use by Samuel Tesfaye Mekonone, Dilom Girmay

    Published 2025-10-01
    “…The focus of this research is pressing of the char into cylindrical shapes of briquettes to improve the quality by having a high fixed carbon, heating value, and density, a low burning rate, and a short ignition time, processed with varying parameters such as binder ratio, pressing pressure, and dwell time optimized using the Taguchi-Gray Relational method. …”
    Get full text
    Article
  5. 805

    DRLinSPH: an open-source platform using deep reinforcement learning and SPHinXsys for fluid-structure-interaction problems by Mai Ye, Hao Ma, Yaru Ren, Chi Zhang, Oskar J. Haidn, Xiangyu Hu

    Published 2025-12-01
    “…Smoothed particle hydrodynamics (SPH) offers a flexible and efficient computational approach for modeling large deformations, fractures, and complex interface movements inherent in FSI, outperforming traditional grid-based methods. This work presents DRLinSPH, an open-source Python platform that integrates the SPH-based numerical environment provided by the open-source software SPHinXsys with the mature DRL platform Tianshou to enable parallel training for FSI problems. …”
    Get full text
    Article
  6. 806

    Low-Frequency Noise Attenuation in a Closed Space Using Adaptive Directivity Control Sources of a Quadrupole Type by Marios GIOUVANAKIS, Christos SEVASTIADIS, George PAPANIKOLAOU

    Published 2019-01-01
    “…A finite element model of a modal enclosed sound field is excited harmonically, representing a noise field in the low-frequency range. The control sources are comprised of elementary dipole sources for which the driving signals are adjusted by an optimization method. …”
    Get full text
    Article
  7. 807

    Calculational investigations and analysis of characteristics of research reactor WWR-M as a source of neutrons for solution of scientific and applied tasks by P. M. Vorona, V. F. Razbudey

    Published 2010-03-01
    “…Recommendations associated with optimization of the reactor core are adduced for amplification of its capabilities as a neutron source in experimental researches.…”
    Get full text
    Article
  8. 808

    Computational investigation of magnetohydrodynamics Casson Micropolar fluid flowing past a permeable linearly stretchy wall with heat source by S. Alao, R. A. Oderinu, B. A. Sanusi, T. A. Oyeyinka, F. J. Ayanbukola

    Published 2025-08-01
    “…To affirm the accuracy of the simulation, the outputs are validated using 4th order Runge-Kutta method via shooting technique serving as the control method with the aid of Mathematical software (Maple 18.0). …”
    Get full text
    Article
  9. 809
  10. 810

    RETROSPECTIVE ANALYSIS OF HYPOXIC TRAINING IN ROAD CYCLING IN BULGARIA PERIOD (1945-1965) by Iv. Kolev

    Published 2021-11-01
    “…The study was conducted using the methods: study of information sources, document analysis, theoretical analysis and synthesis. …”
    Get full text
    Article
  11. 811

    Initialization Methods for FPGA-Based EMT Simulations by Xin Ma, Xiao-Ping Zhang

    Published 2024-01-01
    “…To accelerate initialization, software-to-hardware algorithm and structure are developed to automate initialization data sources for different topologies. Case study shows Method 2–4 can both initialize successfully on FPGA platform, while Method 4 achieves the best timing and routing performance. …”
    Get full text
    Article
  12. 812
  13. 813

    A novel framework for neutron-gamma density logging: semi-empirical modeling, directional neutron sources, and experimental benchmarking by Abolfazl Rafizade, Seyed Abolfazl Hosseini

    Published 2025-06-01
    “…This study proposes a novel NGD logging method that utilizes a directional neutron source to enhance measurement precision while reducing the number of required detectors. …”
    Get full text
    Article
  14. 814

    Software diversification method based on binary rewriting by Benwei HE, Yunfei GUO, Yawen WANG, Qingfeng WANG, Hongchao HU

    Published 2023-04-01
    “…Software diversity is an effective defense against code-reuse attacks, but most existing software diversification technologies are based on source code.Obtaining program source code may be difficult, while binary files are challenging to disassemble accurately and distinguish between code pointers and data constants.This makes binary file diversification difficult to generate high levels of randomization entropy, and easily compromised by attackers.To overcome these challenges, a binary file oriented software diversification method was proposed based on static binary rewriting technology, namely instruction offset randomization.This method inserted NOP instructions of varying byte lengths before program instructions with a certain probability, reducing the number of unintended gadgets in the program and randomly offsetting the original instruction address.This disrupts the program’s original memory layout and increases the cost of code-reuse attacks.At the same time, an optimization strategy based on hot code was designed for this method.The execution times of basic blocks in binary files were obtained by dynamic pile insertion, so as to adjust the NOP instruction insertion probability in each basic block.The higher the execution frequency, the fewer NOP instructions were inserted into the basic block, which can ensure lower performance overhead and produce higher randomization entropy.In the experimental part, the SPEC benchmark program was used to test the optimized method from the aspects of performance overhead, gadget survival rate and file size.The results show that a 15% insertion probability achieves the best effect, with an average gadget survival rate of less than 1.49%, increasing attackers’ difficulty in reusing the same gadget attack chain.Furthermore, only a 4.1% operation overhead and 7.7% space overhead are added, maintaining high levels of security.…”
    Get full text
    Article
  15. 815

    An open-source interactive AI framework for assisting automatic literature review in forensic medicine: Focus on brain injury mechanisms. by Ya-Wen Liu, Dong-Hua Zou, He-Wen Dong, Yuan-Yuan Liu, En-Hao Fu, Zhi-Ling Tian, Ning-Guo Liu

    Published 2025-01-01
    “…This study evaluates the utility of ASReview for forensic medical literature review.<h4>Methods</h4>A three-stage experimental design was implemented. …”
    Get full text
    Article
  16. 816
  17. 817

    Energy Efficiency, Local Entropy Sources and Exergy Analysis in Measuring Orifice Plates: A Computational Fluid Dynamics Approach by Marcin Kruzel, Krzysztof J. Wołosz

    Published 2025-03-01
    “…By quantifying entropy sources through numerical simulations, this study provides insights into optimizing flow metering techniques and reducing irreversibilities. …”
    Get full text
    Article
  18. 818

    Optical Cryptanalysis Method Using Wavefront Shaping by Meihua Liao, Dajiang Lu, Wenqi He, Xiang Peng

    Published 2017-01-01
    “…In this paper, a practical optical cryptanalysis method using wavefront shaping is proposed. Considering that the confusion and diffusion of information in the optical cryptosystem are actually caused by scattering effect of random phase mask(s), the proposed method employs a point source function and the feedback-based optimization algorithm, which can obtain an equivalent key of the optical cryptosystem. …”
    Get full text
    Article
  19. 819

    Air-ground collaborative multi-source orbital integrated detection system: Combining 3D imaging and intrusion recognition. by Mengyuan Yan, Xingyu Yang, Wei Gao, Lifan Rong, Shengbo Li, Yuan Xiong

    Published 2025-01-01
    “…With the rapid expansion of railway networks globally, ensuring rail infrastructure safety through efficient detection methods has become critical. Traditional inspection systems face limitations in flexibility, adaptability to adverse weather, and multifunctional integration. …”
    Get full text
    Article
  20. 820

    Improved control of multi terminal direct current voltage source converters using proportional integral and lead lag controllers by Youngmin Gong, Insu Kim, Wonyoung Choi

    Published 2025-02-01
    “…The results showed that connecting a PI controller to the DC link voltage stabilizer and lead-lag compensators to the power source and load achieved optimal performance with an average overshoot of 78% and an average stabilization time of 398 msec. …”
    Get full text
    Article