Showing 381 - 400 results of 703 for search 'semi system optimization', query time: 0.12s Refine Results
  1. 381

    Improvement of pinch technology for the possibility of integration of non-stationary thermal processes, taken into account of their localization by D. S. Agapov, A. P. Kartoshkin, A. A. Kalutik, A. V. Kondrashov

    Published 2024-01-01
    “…The  proposed  conversion device  expands  the  capabilities  of  pinch  technology,  and  the  introduced  criteria  will  make  it possible to synthesize or design a system based on new target indicators. The program created during  the  work  allows  for  the  synthesis  of  a  heat  exchange  network  in  automatic  and  semi-automatic  modes.  …”
    Get full text
    Article
  2. 382

    Algorithms for Load Balancing in Next-Generation Mobile Networks: A Systematic Literature Review by Juan Ochoa-Aldeán, Carlos Silva-Cárdenas, Renato Torres, Jorge Ivan Gonzalez, Sergio Fortes

    Published 2025-06-01
    “…Background: Machine learning methods are increasingly being used in mobile network optimization systems, especially next-generation mobile networks. …”
    Get full text
    Article
  3. 383

    Multi-Intelligent Reflecting Surfaces and Artificial Noise-Assisted Cell-Free Massive MIMO Against Simultaneous Jamming and Eavesdropping by Huazhi Hu, Wei Xie, Kui Xu, Xiaochen Xia, Na Li, Huaiwu Wu

    Published 2024-11-01
    “…First, an access point (AP) selection strategy based on user location information is designed, which aims to determine the set of APs serving users. Then, a joint optimization framework based on the block coordinate descent (BCD) algorithm is constructed, and a non-convex optimization solution based on the univariate function optimization and semi-definite relaxation (SDR) is proposed with the aim of maximising the minimum achievable secrecy rate for users. …”
    Get full text
    Article
  4. 384

    Production line performance analysis within a MTS/MTO manufacturing framework: a queueing theory approach by Iman Ghalehkhondabi, Gursel Suer

    Published 2018-07-01
    “…We can calculate the total cost of the system and find the optimal machine for the buffer of semi-finished products. 2- We use both MTS and MTO for completing the semi-finished products. …”
    Get full text
    Article
  5. 385

    The Rise of Influencer Practices Among Psychologists: From Therapy Rooms to Instagram Reels by Burçin Sarı

    Published 2025-06-01
    “…Using a multi-method approach, we observed 100 Turkish psychologists’ Instagram practices over 6 months and conducted 20 semi-structured interviews. Findings reveal that Instagram has become an unexpected intermediary in the labor market for psychologists, intensifying to fulfill the three pillars of influencer creep: self-branding, optimization, and authenticity. …”
    Get full text
    Article
  6. 386

    Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm by Saite CHEN, Weihai LI, Yuanzhi YAO, Nenghai YU

    Published 2023-06-01
    “…The use of location-based service brings convenience to people’s daily lives, but it also raises concerns about users’ location privacy.In the k-nearest neighbor query problem, constructing K-anonymizing spatial regions is a method used to protects users’ location privacy, but it results in a large waste of communication overhead.The SpaceTwist scheme is an alternative method that uses an anchor point instead of the real location to complete the k-nearest neighbor query,which is simple to implement and has less waste of communication overhead.However,it cannot guarantee K-anonymous security, and the specific selection method of the anchor point is not provided.To address these shortcomings in SpaceTwist, some schemes calculate the user’s K-anonymity group by introducing a trusted anonymous server or using the way of user collaboration, and then enhance the end condition of the query algorithm to achieve K-anonymity security.Other schemes propose the anchor point optimization method based on the approximate distribution of interest points, which can further reduce the average communication overhead.A lightweight K-anonymity incremental nearest neighbor (LKINN) location privacy protection algorithm was proposed to improve SpaceTwist.LKINN used convex hull mathematical tool to calculate the key points of K-anonymity group, and proposed an anchor selection method based on it, achieving K-anonymity security with low computational and communication costs.LKINN was based on a hybrid location privacy protection architecture, making only semi-trusted security assumptions for all members of the system, which had lax security assumptions compared to some existing research schemes.Simulation results show that LKINN can prevent semi-trusted users from stealing the location privacy of normal users and has smaller query response time and communication overhead compare to some existing schemes.…”
    Get full text
    Article
  7. 387

    Design and test of a waveguide filter for reflected electromagnetic waves by C. Fransoo, M. Nishiura, S. Kubo

    Published 2025-05-01
    “…A high power gyrotron system is used for plasma production and sustainment by electron cyclotron resonance heating (ECRH) in fusion reactors. …”
    Get full text
    Article
  8. 388

    Exploring challenges and coping strategies in providing care for older adults with dementia: a qualitative study conducted in China by Yanan Cheng, Meijiazi Yang, Sha Ma

    Published 2025-02-01
    “…Given the growing population of older adults in China and the fact that most individuals with dementia are cared for by family members, it is recommended to establish a multifaceted support system involving collaboration among government, social organizations, and volunteers within both urban and rural communities.ConclusionThe gradual expansion of coverage of long-term care insurance, the proactive inclusion of dementia treatment drugs into the essential medication list, and optimization of a diversified dementia care system ought to be a matter of significant concern.…”
    Get full text
    Article
  9. 389
  10. 390

    Transmit Power-Efficient Beamforming Design for Integrated Sensing and Backscatter Communication by Shayan Zargari, Diluka Galappaththige, Chintha Tellambura

    Published 2025-01-01
    “…Closed-form solutions are provided for the sensing combiners, while semi-definite relaxation is applied to the BS communication beamformer and sensing signal, and slack optimization is used for the tags’ reflection coefficients. …”
    Get full text
    Article
  11. 391

    Lessons learned from setting up a hospital-based national registry for venous thromboembolic disorders in India by Sumit Aggarwal, Peteneinuo Rulu, Heena Tabassum

    Published 2024-11-01
    “…This study focused on 10 questions related to technological infrastructure, resource optimization, data collection and management, coordination and collaboration, regulatory compliance, and political influences and were documented using a semi-structured questionnaire and telephonic interviews. …”
    Get full text
    Article
  12. 392

    Analysis of the efficiency and effectiveness of technology transformation through the introduction of ADC in the Emergency Department: a Taiwanese case study by Valerio Brescia, Yafang Tsai, Sue-Ting Chung, Cheng-Chieh Lin, Federico Chmet, Ginevra Degregori, Ying-Chun Lai

    Published 2025-07-01
    “…Despite these benefits, ongoing training and system optimization are necessary to address remaining challenges and enhance overall performance.…”
    Get full text
    Article
  13. 393

    Simulation for non-homogeneous transport equation by Nyström method by Luana Lazzari, Esequia Sauter, Fábio Souto De Azevedo

    Published 2021-02-01
    “…In this work we solve numerically the one-dimensional transport equation with semi-reflective boundary conditions and non-homogeneous domain. …”
    Get full text
    Article
  14. 394

    An integrated ecosystem monitoring technology for coal mining subsidence areas and its application in the Shendong mining area by Yang CHENG, Wei LIU, Na ZHANG, Guanjie LI, Kai LIU, Chengye ZHANG, Jun LI

    Published 2024-12-01
    “…BackgroundThe ecosystem monitoring of arid and semi-arid coal mining subsidence areas acts as a significant prerequisite for regional ecosystem conservation and management, holding critical significance for accelerating green mine construction. …”
    Get full text
    Article
  15. 395

    Performance evaluation and analysis for hydraulic active suspension using the collaborative control method by Qihui Ling, Xin Chen, Liyong Niu, Yong Guo, Shengzhao Chen

    Published 2025-06-01
    “…Therefore, a novel controller is presented to achieve system-level optimal performances by using the collaborative control method. …”
    Get full text
    Article
  16. 396

    Research on Habitat and Species Diversity of Spontaneous Plants in the Dujiangyan Canal Corridors by Rui HAN, Qingjuan YANG

    Published 2025-04-01
    “…ObjectiveThe canal system is crucial for altering the hydrological processes in agricultural irrigation areas and serves as a vital ecological network within these areas. …”
    Get full text
    Article
  17. 397

    Method of Helicopter Turboshaft Engines’ Protection During Surge in Starting Mode by Denys Baranovskyi, Serhii Vladov, Maryna Bulakh, Victoria Vysotska, Viktor Vasylenko, Jan Czyżewski

    Published 2025-01-01
    “…The backpropagation algorithm with hyperparameter optimization via Bayesian optimization was used to train the network. …”
    Get full text
    Article
  18. 398

    Modified Solution–Diffusion Model Incorporating Rotational Kinetic Energy in Pressure Retarded Osmosis by Daniel Ruiz-Navas, Edgar Quiñones-Bolaños, Mostafa H. Sharqawy

    Published 2025-01-01
    “…Analytical models facilitate the analysis of the relationships between system parameters and thus facilitate the optimization of components. …”
    Get full text
    Article
  19. 399
  20. 400

    Longitudinal evaluation examining implementation and sustainment of an opioid overdose education and naloxone distribution among veterans who are unstably housed by Sarah J. Javier, Amanda M. Midboe, Taryn Perez, Angela M. Kyrish, Madeleine Golding, Hannah Cheng, Kenneth Bruemmer, Danica Bogicevic

    Published 2025-08-01
    “…Methods We used a multi-methods study design comprised of qualitative interviews and completion of a three-item survey. Semi-structured interviews were completed with Department of Housing and Urban Development-VA Supportive Housing (HUD-VASH) staff, site leaders, and site prescribers at four VA healthcare systems in the Western United States. …”
    Get full text
    Article