Search alternatives:
method » methods (Expand Search)
Showing 2,481 - 2,500 results of 4,920 for search 'sources optimization method', query time: 0.19s Refine Results
  1. 2481

    The ineffectiveness of urban development plans in realizing a sustainable city(Case study: Zanjan) by mahboob reyhan, mohsen ahadnejad, taghi heydari

    Published 2024-04-01
    “…Therefore, in the context of identifying the causes of inefficiency of urban development plans, a mixed approach was used, which is a combination of two quantitative and qualitative methods. Data were also obtained from primary and secondary sources. …”
    Get full text
    Article
  2. 2482

    Coordinated Energy Management Strategy for DC Microgrid With Hybrid Energy Storage System: A Real‐Time Case Study by Biks Alebachew Taye

    Published 2025-06-01
    “…The economic viability of solar, wind, and energy storage systems is meticulously evaluated using HOMER Pro software, aiding in the identification of viable energy sources. Once optimized energy resources, energy storage solutions, and load demands are identified, a systematic approach is taken. …”
    Get full text
    Article
  3. 2483

    Techniques for increasing the efficiency of microclonal propagation of potatoes (review) by Yu. D. Smirnova, E. A. Podolian

    Published 2024-06-01
    “…The application of tissue culture method for propagation of potato plants is the most significant. …”
    Get full text
    Article
  4. 2484

    Peran Kemaritiman Dalam Memperkuat Perekonomian Indonesia by Manahan Budiarto Pandjaitan, K Khusaini, M. Faisal Aminuddin, Panji Suwarno

    Published 2025-05-01
    “…The method used is a literature study, namely the collection and analysis of information from various written sources systematically. …”
    Get full text
    Article
  5. 2485

    Accelerating EdDSA Signature Verification with Faster Scalar Size Halving by Muhammad ElSheikh, İrem Keskinkurt Paksoy, Murat Cenk, M. Anwar Hasan

    Published 2025-06-01
    “…For the first time ever, EEA generated half-size scalars are used for verification of individual Ed25519 signatures yielding timing results that outperform ed25519-donna, a highly optimized open source implementation, by 16.12%. We also propose a new randomization method applied with half-size scalars to batch verification of Ed25519 signatures for which we report speed-ups compared to the well-known Bernstein et al. method for batch sizes larger than six, specifically, our method achieves 11.60% improvement for batch size 64. …”
    Get full text
    Article
  6. 2486

    On the use of the scaled spherical wave expansions for recovering the target sound field in non-anechoic spaces by Chao Li, Ding-Yu Hu, Yong-Chang Li, Yuan Liu

    Published 2025-05-01
    “…In addition, a simplified formulation was developed specifically for target sources with rigid surfaces, further enhancing the method’s practicality. …”
    Get full text
    Article
  7. 2487

    Education as a Science and Its Relevance in the Digital Era by Restu Rizki Amanda, Udin Supriadi, Nurti Budiyanti, Eri Anugrah

    Published 2025-01-01
    “…The article employs a qualitative approach with a literature review method to analyze the research themes. The process begins with the identification of relevant topics, followed by the collection of various literature sources. …”
    Get full text
    Article
  8. 2488

    Enhanced LED light driven photocatalytic degradation of Cefdinir using bismuth titanate nanoparticles by Sara Ishaq, Ahmed H. Nadim, Joliana F. Farid, Sawsan M. Amer, Heba T. Elbalkiny

    Published 2025-07-01
    “…Factors affecting the degradation protocol were optimized using a central composite design model, and the degradation efficiency was assessed using a validated RP-HPLC method. …”
    Get full text
    Article
  9. 2489

    Static Voltage Stability Evaluation and Correction Strategy Based on Stage Solving Strategy and SIFT by Yan Wen, Xiaoming Liu, Yongzhi Zhou, Huiwen Zhang, Donglei Sun

    Published 2025-01-01
    “…Aiming at the static voltage instability problem of the power grid caused by large-scale access of renewable energy sources, the study adopts the scale invariant feature transform algorithm for boundary feature extraction, while optimizing the traditional generalized resilience index of the power grid. …”
    Get full text
    Article
  10. 2490

    High entropy powering green energy: hydrogen, batteries, electronics, and catalysis by Guotao Qiu, Tianhao Li, Xiao Xu, Yuxiang Liu, Maya Niyogi, Katie Cariaga, Corey Oses

    Published 2025-05-01
    “…We highlight the role of computational methods, such as density functional theory and machine learning, in accelerating the discovery and optimization of HEMs. …”
    Get full text
    Article
  11. 2491

    Research advances in mesenchymal stem cells and related therapies for rotator cuff tendon-to-bone healing by Laimeng Song, Na Li, Jiwu Chen

    Published 2025-08-01
    “…Clinical studies demonstrate reduced retear rates with MSC-based therapies, yet animal models show inconsistent outcomes, influenced by cell source, delivery methods, and dosage. MSC modifications (e.g., gene editing) and scaffold-based strategies further improve biomechanical strength and fibrocartilage regeneration. …”
    Get full text
    Article
  12. 2492

    Digital Technologies in the Financial sector: Evolution and Major Development Trends in Russia and Abroad by D. A. Artemenko, S. V. Zenchenko

    Published 2021-07-01
    “…The research is based on the analysis of data provided by international consulting companies, analytical centers, and official data sources of the Central Bank (Bank of Russia). The authors apply methods such as comparative research, empirical, logical, graphical, analysis, interpretation, and comparison. …”
    Get full text
    Article
  13. 2493

    Outdoor location scheme with fingerprinting based on machine learning of mobile cellular network by Zhichao ZHOU, Yi FENG, Xiaohan XIA, Yuyao FENG, Chao CAI, Jiahui QIU, Lihui YANG, Yunxiao WU

    Published 2021-08-01
    “…The positioning scheme based on mobile cellular network technology is one of the important technical approaches to provide network optimization, emergency rescue, police patrol and location services.The traditional positioning scheme based on cell base station location information has low positioning accuracy and large positioning error, so it cannot meet the requirements of some positioning applications.The scheme based on fingerprint location can greatly improve the location accuracy, save computational cost and enhance the usability based on the coarse location scheme of the cell and become the hotspot of the research.Rasterization and non-rasterization of outdoor fingerprint location scheme based on machine learning were studied and analyzed to meet the business requirements of outdoor fingerprint location.By means of parameter weighting, data fitting and other methods, large-scale fingerprint data were cleaned to improve the effectiveness of data sources.Through the realization of sub-modules such as demarcating research area, rasterizing, constructing fingerprint database, training model, correcting model, non-rasterizing, rough positioning coupling, matching parameter and training parameter, the operation efficiency and positioning accuracy of the algorithm were analyzed and optimized, and the key indexes affecting the algorithm performance were determined.Then, the performance of two fingerprint-based localization schemewas analyzed based on the simulation results.Finally, the typical scenarios of the fingerprint location scheme based on machine learning in practical application were presented.…”
    Get full text
    Article
  14. 2494

    Parametrical Synthesis of Radio Devices with the Set Quantity of Identical Cascades for Inclusion Variants of Jet Two-port Networks between a Nonlinear Part and Loading by A. A. Golovkov, A. V. Fomin

    Published 2021-12-01
    “…Non-linear parts are represented as a non-linear element and parallel or serial current or voltage feedback.Materials and methods. Four-pole theory, matrix algebra, decomposition method, method of synthesis of microwave control devices, numerical optimization methods.Results. …”
    Get full text
    Article
  15. 2495

    For assessing the efficiency of risk management at trading enterprises by O. N. Chuvilova, A. A. Kazakova, I. R. Temirbulatova, R. S. Muslimov

    Published 2023-09-01
    “…The study is devoted to proving the feasibility of using a universal method to evaluate the effectiveness of risk management and eliminate the variety of evaluation criteria using a variety of risk assessment methods proposed in scientific sources. …”
    Get full text
    Article
  16. 2496

    A Distributed Control Architecture for Autonomous Operation of a Hybrid AC/DC Microgrid System by R. Rahmani, A. Fakharian

    Published 2018-06-01
    “…The advantage of this method is the proper control of both stable and transient states in power-sharing moments. …”
    Get full text
    Article
  17. 2497

    A Coordinated Communication and Power Management Strategy for DC Converters in Renewable Energy Systems by Feng Zhou, Takahiro Kawaguchi, Seiji Hashimoto, Wei Jiang

    Published 2025-06-01
    “…Effective communication among distributed energy sources (DESs) is essential for optimizing energy allocation across power sources, loads, and storage devices in integrated renewable energy and energy management systems. …”
    Get full text
    Article
  18. 2498

    Epidemic Outbreak of Catheter-Associated Bloodstream Infections among Patients Receiving Renal Replacement Therapy by D. V. Kvashnina, O. V. Kovalishena, O. M. Sutyrina, I. V. Solov’yeva, I. V. Belova, A. G. Tochilina, I. Yu. Shirokova

    Published 2019-05-01
    “…Background:  Hemodialysis is the most common method of renal replacement therapy (RRT), however, its use is associated with risk of catheter-associated bloodstream infections (CABSI). …”
    Get full text
    Article
  19. 2499

    Research on Urban Rainfall Runoff Pollution Prediction Model Based on Feature Fusion by Junping Yao, Tianle Sun

    Published 2020-01-01
    “…In this paper, a rainfall runoff pollution prediction method based on grey neural network algorithm is proposed in consideration of the current situation that the accuracy of research results related to rainfall runoff pollution prediction needs to be improved. …”
    Get full text
    Article
  20. 2500

    Carotid Endarterectomy and Stenting of the Internal Carotid Artery in Patients with Occlusion of the Contralateral Carotid Artery by N. S. Gorshkov, V. E. Ryabukhin, A. S. Koblik, L. S. Kokov

    Published 2025-01-01
    “…We aimed to determine which approach is the optimal revascularization strategy for those patients.THE AIM OF STUDY To review the current scientific literature reflecting the outcomes of patients with CCO and to determine whether the presence of CCO plays a prognostic role in perioperative outcomes in patients undergoing carotid revascularization with endarterectomy or stenting.MATERIAL AND METHODS Literature sources from Pubmed and MEDLINE, Scopus and Cochrane information aggregators on this topic published in Russian and English between 2003 and 2023 were selected for analysis. …”
    Get full text
    Article