-
321
The Impact of Green Finance on Agricultural Non-Point Source Pollution: Analysis of the Role of Environmental Regulation and Rural Land Transfer
Published 2024-09-01“…Utilizing the entropy value method and the unit survey inventory method, the research measures the levels of green finance development and agricultural non-point source pollution. …”
Get full text
Article -
322
Reserve optimization model of wind power with the coordination of multiple type electric power system sources
Published 2025-07-01“…Abstract Aiming at the optimization problem of frequency regulation energy reserve cost faced by wind power stations participating in primary frequency regulation, a reserve optimization model of wind power based on DPGMM-LSTM with the coordination of multi-type electric power system sources is proposed. …”
Get full text
Article -
323
Resilience-Oriented Optimization of Source-Grid-Load Flexible Resources in Distribution Systems: Review and Prospect
Published 2022-04-01“…The categories and modeling methods of flexible resources on source-grid-load sides, as well as their applications in resilient distribution systems, are reviewed and discussed in detail. …”
Get full text
Article -
324
Optimization of Multi-Source Remote Sensing Soil Salinity Estimation Based on Different Salinization Degrees
Published 2025-04-01“…Subsequently, machine learning methods such as random forest (RF), extreme gradient boosting (XGBoost), support vector machine (SVM), and multiple linear regression (MLR) were employed, in combination with sensitive spectral indices, to develop a multi-source remote sensing soil salinity estimation model optimized for different salinization degrees (mild or lower salinization vs. moderate or higher salinization). …”
Get full text
Article -
325
Optical Cryptanalysis Method Using Wavefront Shaping
Published 2017-01-01“…In this paper, a practical optical cryptanalysis method using wavefront shaping is proposed. Considering that the confusion and diffusion of information in the optical cryptosystem are actually caused by scattering effect of random phase mask(s), the proposed method employs a point source function and the feedback-based optimization algorithm, which can obtain an equivalent key of the optical cryptosystem. …”
Get full text
Article -
326
Software diversification method based on binary rewriting
Published 2023-04-01“…Software diversity is an effective defense against code-reuse attacks, but most existing software diversification technologies are based on source code.Obtaining program source code may be difficult, while binary files are challenging to disassemble accurately and distinguish between code pointers and data constants.This makes binary file diversification difficult to generate high levels of randomization entropy, and easily compromised by attackers.To overcome these challenges, a binary file oriented software diversification method was proposed based on static binary rewriting technology, namely instruction offset randomization.This method inserted NOP instructions of varying byte lengths before program instructions with a certain probability, reducing the number of unintended gadgets in the program and randomly offsetting the original instruction address.This disrupts the program’s original memory layout and increases the cost of code-reuse attacks.At the same time, an optimization strategy based on hot code was designed for this method.The execution times of basic blocks in binary files were obtained by dynamic pile insertion, so as to adjust the NOP instruction insertion probability in each basic block.The higher the execution frequency, the fewer NOP instructions were inserted into the basic block, which can ensure lower performance overhead and produce higher randomization entropy.In the experimental part, the SPEC benchmark program was used to test the optimized method from the aspects of performance overhead, gadget survival rate and file size.The results show that a 15% insertion probability achieves the best effect, with an average gadget survival rate of less than 1.49%, increasing attackers’ difficulty in reusing the same gadget attack chain.Furthermore, only a 4.1% operation overhead and 7.7% space overhead are added, maintaining high levels of security.…”
Get full text
Article -
327
Production method for electrospun chitosan-based membranes
Published 2025-06-01Get full text
Article -
328
Probabilistic optimal power flow in wind energy integrated power system based on the K‐medoids data clustering method considering correlated uncertain variables
Published 2023-10-01“…The probabilistic assessment is conducted by the K‐medoids method and the optimization problem is solved by the cooperation search algorithm (CSA) as an efficient evolutionary algorithm. …”
Get full text
Article -
329
A typical scenario generation method for renewable energy power systems based on time-sequenced operational simulations
Published 2025-05-01“…Traditional clustering methods based on source-load information struggle to accurately describe the time-sequenced operational characteristics of renewable energy power systems. …”
Get full text
Article -
330
Graph-based method for constructing consensus trees
Published 2025-01-01“…In this paper, we extend PrimConsTree, an graph-based method for constructing consensus trees. This algorithm incorporates topological information, edge frequency, clade frequency, and branch length to construct a more robust and comprehensive consensus tree. …”
Get full text
Article -
331
EXPERIMENTAL TESTING OF AN IN VIVO METHOD OF PHOTOTOXICITY EVALUATION
Published 2018-06-01“…The purpose of this study was to test an economically viable and informative method for in vivo evaluation of tetracycline and ketorolac phototoxicity using outbred rats. …”
Get full text
Article -
332
Chemometrically assisted optimization and validation of the HPLC method for the analysis of alectinib and its related impurity with measurement uncertainty evaluation and whiteness...
Published 2025-05-01“…The method’s optimization was carried out using the Box-Behnken design, whereas the optimized conditions were selected according to the desirability function. …”
Get full text
Article -
333
Research on Thickness Error Optimization Method of Rolling System Based on Improved Sparrow Search Algorithm–Bidirectional Long Short-Term Memory Network–Attention
Published 2024-10-01“…The experiments confirm the method’s effectiveness in improving the thickness accuracy of the rolling system and provide a new optimization scheme for the industry.…”
Get full text
Article -
334
-
335
Multi-objective optimal probabilistic planning in distribution systems considering load growth
Published 2025-01-01“…A comprehensive stochastic strategy is offered for a number of uncertainties, such as load increase and output power from renewable energy sources. Two IEEE bus networks are used to illustrate the suggested method's efficacy. …”
Get full text
Article -
336
Two‐stage stochastic robust optimal scheduling of virtual power plant considering source load uncertainty
Published 2024-12-01“…Abstract Aiming at the optimal scheduling problem of virtual power plant (VPP) with multiple uncertainties on the source‐load side, this paper proposes a two‐stage stochastic robust optimal scheduling method considering the uncertainty of the source‐load side. …”
Get full text
Article -
337
Comparative analysis of geothermal and reservoir numerical simulation methods
Published 2024-12-01“…By comparing the foundational mathematical models, numerical methods, and case studies of geothermal and reservoir simulations, this study highlights the similarities and differences in their application to the development of these two energy sources. …”
Get full text
Article -
338
-
339
Multi-period, Multi-contingency and Interval Optimal Power Flow for Dimensioning and Allocation of Spinning Reserve
Published 2025-07-01“…Abstract Due to their low environmental impact and decreasing costs, there has been significant growth in the use of renewable sources worldwide. However, their power generation fluctuates randomly, necessitating reliable energy supply methods. …”
Get full text
Article -
340
Computational methods and artificial intelligence-based modeling of magnesium alloys: a systematic review of machine learning, deep learning, and data-driven design and optimizatio...
Published 2025-08-01“…Findings indicate AI-based methods can expedite alloy design and performance optimization; however, challenges remain in data accessibility, model interpretability, and experimental validation. …”
Get full text
Article