Search alternatives:
method » methods (Expand Search)
Showing 3,861 - 3,880 results of 18,707 for search 'optimal different method', query time: 0.29s Refine Results
  1. 3861

    Load Model Construction and Parameter Identification Method of Inverter-Interfaced Distributed Generator by Jie LI, Jie WANG, Wenteng LIANG, Lushan SHI, Bolun WANG, Yufeng XIONG, Liangju ZHANG, Xia ZHOU

    Published 2024-11-01
    “…However, current research focuses mainly on analyzing and modeling the characteristics of a single type of distributed generation, and there is limited research on general models that can uniformly describe DGs with certain similarities. [Method] This article constructed an inverter-interfaced distributed generator (IIDG) model and employed a novel optimization algorithm. …”
    Get full text
    Article
  2. 3862
  3. 3863

    Visual Active SLAM Method Considering Measurement and State Uncertainty for Space Exploration by Yao Zhao, Zhi Xiong, Jingqi Wang, Lin Zhang, Pascual Campoy

    Published 2025-07-01
    “…Simulations and field tests in different challenging scenarios are conducted to verify the effectiveness of the proposed method.…”
    Get full text
    Article
  4. 3864

    Structural changes in the micromycete complex of soil in wheat agrocenoses depending on tillage methods by A. V. Ponomarev, E. Yu. Gyrnets, V. M. Dubyaga

    Published 2025-05-01
    “…The work has been done to identify the correlation between the applied agrotechnical methods and the formation of soil fungal communities, which is important for optimizing strategies to manage the phytosanitary state of agroecosystems. …”
    Get full text
    Article
  5. 3865

    Flowsheets for hydroxyacetone–phenol binary mixture separation: The use of special distillation methods by I. S. Gaganov, E. V. Rytova, A. K. Frolkova

    Published 2023-11-01
    “…To study the possibility of hydroxyacetone–phenol binary mixture (a constituent of a mixture of phenol production by the cumene method) separation in flowsheets based on the use of distillation special methods. …”
    Get full text
    Article
  6. 3866

    Image Processing Method Based on Chaotic Encryption and Wavelet Transform for Planar Design by Yiying Liu, Young Chun Ko

    Published 2021-01-01
    “…Firstly, the traditional Mallat algorithm is optimized; since the mean value of the transform coefficients generated after the wavelet transform of the image is used as the initial value of the chaotic system to iterate, when the image is modified, then the mean value of the wavelet coefficients will also change, and the final iteration comes out as two different sequences using the property that the chaotic system is extremely sensitive to the initial conditions, so the algorithm has a certain sensitivity to tampering and localization effect. …”
    Get full text
    Article
  7. 3867

    Methods of security situation prediction for industrial internet fused attention mechanism and BSRU by Xiangdong HU, Zhengguo TIAN

    Published 2022-02-01
    “…The security situation prediction plays an important role in balanced and reliable work for industrial internet.In the face of massive, high-dimensional and time-series data generated in the industrial production process, traditional prediction models are difficult to accurately and efficiently predict the network security situation.Therefore, the methods of security situation prediction for industrial internet fused attention mechanism and bi-directional simple recurrent unit (BSRU) were proposed to meet the real-time and accuracy requirements of industrial production.Each security element was analyzed and processed, so that it could reflect the current network state and facilitate the calculation of the situation value.One-dimensional convolutional network was used to extract the spatial dimension features between each security element and preserve the temporal correlation between features.The BSRU network was used to extract the time dimension features between the data information and reduced the loss of historical information.Meanwhile, with the powerful parallel capability of SRU network, the training time of model was reduced.Attention mechanism was introduced to optimize the correlation weight of BSRU hidden state to highlight strong correlation factors, reduced the influence of weak correlation factors, and realized the prediction of industrial internet security situation combining attention mechanism and BSRU.The comparative experimental results show that the model reduces the training time and training error by 13.1% and 28.5% than the model using bidirectional long short-term memory network and bidirectional gated recurrent unit.Compared with the convolutional and BSRU network fusion model without attention mechanism, the prediction error is reduced by 28.8% despite the training time increased by 2%.The prediction effect under different prediction time is better than other models.Compared with other prediction network models, this model achieves the optimization of time performance and uses the attention mechanism to improve the prediction accuracy of the model under the premise of increasing a small amount of time cost.The proposed model can well fit the trend of network security situation, meanwhile, it has some advantages in multistep prediction.…”
    Get full text
    Article
  8. 3868

    The Main Trends in Improving the Activities of a Higher Educational Institution in the Context of Digital Transformation by I. E Zhukovskaya

    Published 2021-07-01
    “…In this publication, an analysis of literary and Internet sources on the problem of optimizing educational, pedagogic and scientific activities in a higher educational institution is carried out on the basis of improving the digital infrastructure, as well as the methods and forms of education. …”
    Get full text
    Article
  9. 3869

    Extraction Method of Coronary Artery Blood Vessel Centerline in CT Coronary Angiography by Xiaodong Sheng, Tao Fan, Xiaoqi Jin, Jing Jin, Zhixian Chen, Guanqun Zheng, Min Lu, Zongcheng Zhu

    Published 2019-01-01
    “…Aiming at the problem that the traditional coronary artery centerline extraction method is computationally intensive and requires a large number of manual interventions, a fully automatic coronary artery centerline tracking extraction method is proposed. …”
    Get full text
    Article
  10. 3870

    Practical and cost-effective method for the isolation of pollen grains from various sources by Ozge S. Kuddar, Benjamin J. Callahan, Christopher Bernhardt, Kelly A. Meiklejohn

    Published 2025-06-01
    “…Mock standards, with known concentrations and varied characteristics, when analyzed alongside unknown samples, can provide evaluation, optimization, and validation of scientific methods. Due to the scarcity of commercially available pollen grains, this study introduces a practical and cost-effective method for isolating pollen grains from various sources to be used in a mock pollen standard. …”
    Get full text
    Article
  11. 3871

    Evaluation of Two Irrigation Scheduling Methods and Nitrogen Rates on Corn Production in Alabama by Jose Franco Da Cunha Leme Filho, Brenda V. Ortiz, Kipling S. Balkcom, Damianos Damianidis, Thorsten J. Knappenberger, Mark Dougherty

    Published 2020-01-01
    “…The different amounts of irrigation applied associated with the two irrigation scheduling methods did not impact grain yield, aboveground biomass, and NUE. …”
    Get full text
    Article
  12. 3872

    Review of selected methods for estimating risk from occupational exposure to carcinogenic substances by Małgorzata Kupczewska-Dobecka, Anna Nowak, Joanna Jurewicz

    Published 2025-02-01
    “…The decision to select these specific methods was driven by their representativeness of different approaches to risk assessment, allowing for a comprehensive analysis and comparison of their strengths and weaknesses. …”
    Get full text
    Article
  13. 3873

    Assessing the Influence of Selected Permeabilization Methods on Lymphocyte Single-Cell Multi-Omics by Shifan Ding, Na Lu, Hassan Abolhassani

    Published 2025-02-01
    “…If the measurement of combined surface and intracellular markers is required to be achieved, the modified fixation and permeabilization method is recommended because of a lower transcriptomic loss and more precise proteomic fingerprint detected. (4) Conclusions: The findings of this study support the potential possibility for integrating intracellular proteomics, which needs to be optimized and tested with newly designed oligonucleotide-tagged antibodies targeting intracellular proteins.…”
    Get full text
    Article
  14. 3874
  15. 3875

    Assessing different patterns of laser welding with Nickel-Chromium (Ni-Cr) alloy for structures applicable to fixed prosthesis by Jarbas Eduardo Martins, Fábio V.R. Bastos Neto, Danilo Antônio Duarte, Ângela Toshie Araki

    Published 2017-06-01
    “…Nowadays, the laser welding process shows a great advantage in comparison to other methods. The aim of this study was to evaluate the optimal laser welds point that is more appropriate to Ni-Cr prosthetic framework. …”
    Get full text
    Article
  16. 3876

    Comprehensive Review of Meta-Learning Methods for Cold-Start Issue in Recommendation Systems by Jamallah M. Zawia, Maizatul Akmar Binti Ismail, Mohammad Imran, Buce Trias Hanggara, Diva Kurnianingtyas, Silvi Asna, Quang Tran Minh

    Published 2025-01-01
    “…The results demonstrate the application of model-independent meta-learning (MAML) and other techniques such as optimization-based methods, few-shot learning frameworks, and gradient-based meta-learning methods to solve the cold start problem. …”
    Get full text
    Article
  17. 3877

    An In-Depth Comparative Study of Quantum-Classical Encoding Methods for Network Intrusion Detection by Adam Kadi, Aymene Selamnia, Zakaria Abou El Houda, Hajar Moudoud, Bouziane Brik, Lyes Khoukhi

    Published 2025-01-01
    “…Our obtained results show notable differences in classification accuracy, underscoring the importance of encoding choice in optimizing QML-based IDS. …”
    Get full text
    Article
  18. 3878

    A comprehensive review of data analytics and storage methods in geothermal energy operations by Ali Basem, Ahmed Kateb Jumaah Al-Nussairi, Dana Mohammad Khidhir, Narinderjit Singh Sawaran Singh, Mohammadreza Baghoolizadeh, Mohammad Ali Fazilati, Soheil Salahshour, S. Mohammad Sajadi, Ali Mohammadi Hasanabad

    Published 2025-09-01
    “…Geothermal energy storage (GES) systems are thoroughly examined in this research, with a focus on methods like borehole thermal energy storage (BTES), underground thermal energy storage (UTES), and aquifer thermal energy storage (ATES). …”
    Get full text
    Article
  19. 3879

    Radiation dosimetry performance appraisal of the optimal concentration of nitro blue tetrazolium dye in PVA composite film at low X-ray doses by Reham Albejadi, Saleh Alashrah, Yassine El-Ghoul, Zabih Ullah, Saleh A. Almatroodi

    Published 2025-01-01
    “…To meet this requirement, a composite film has been developed using polyvinyl alcohol (PVA) polymer and nitro blue tetrazolium (NBT) dye to measure low radiation doses effectively. Methods: Various concentrations of NBT dye (ranging from 0.75 to 15 g/L) were tested to determine the optimal concentration for maximum efficiency. …”
    Get full text
    Article
  20. 3880

    The use of machine learning methods in the development of nasal dosage forms with cerebroprotective action by B. S. Burlaka, I. F. Bielenichev

    Published 2021-07-01
    “…The resulting dataset comprises 1185 lines. The methods employed were a set of methods for binary classification of machine learning (pycaret.org) using the programming language Python 3.8 (python.org) in the package management environment Miniconda (conda.io). …”
    Get full text
    Article