Results 121 to 130 of about 163,972 (287)

Predicting solar cell efficiencies using historical data from a manufacturing process

open access: yesThe Canadian Journal of Chemical Engineering, EarlyView.
Abstract The solar cell manufacturing data of a passivated emitter and rear cell solar cell manufacturing plant was studied to assess the effects of tool usage and the processing time spent on each tool on the solar cell efficiency. Since manufacturing processes involve several steps with multiple tools, tracing their quality parameters back to the ...
Sushmita Mittra, Vinay Prasad
wiley   +1 more source

Improved malicious node detection method for detecting a bait in an extensive network for getting the maximum throughput

open access: yesIET Communications, EarlyView., 2022
Abstract Mobile Ad‐hoc Network (MANET) is an ad hoc Wireless subset with a unique dynamic geometry of the system and movable nodes. The MANETs are auto‐organized networks that permit mobility without infrastructure. Specific protocols for MANET routing are provided with these attributes.
Shalini Goel   +5 more
wiley   +1 more source

Playing with fire? A mean‐field game analysis of fire sales and systemic risk under regulatory capital constraints

open access: yesCanadian Journal of Statistics, EarlyView.
Abstract We analyze the effect of regulatory capital constraints on financial stability in a large homogeneous banking system using a mean‐field game (MFG) model. Each bank holds cash and a tradable risky asset. Banks choose absolutely continuous trading rates in order to maximize expected terminal equity, with trades subject to transaction costs ...
Rüdiger Frey, Theresa Traxler
wiley   +1 more source

Patterns and Drivers of Spanish Corporate Commitment to the UN Global Compact: A Quantitative Approach

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT This paper presents a quantitative assessment of Spanish companies' commitment to the United Nations Global Compact (UNGC) and the Sustainable Development Goals (SDGs). Analyzing over 1000 participating firms, we identify prioritization patterns and examine structural factors influencing SDG adherence.
Juan Laborda, Juan Pérez
wiley   +1 more source

Joint power control and user grouping mechanism for efficient uplink non‐orthogonal multiple access‐based 5G communication: Utilising the Lèvy‐flight firefly algorithm

open access: yesIET Networks, EarlyView., 2023
We utilise a metaheuristic optimisation method, inspired by nature, called the Lévy‐flight firefly algorithm (LFA), to tackle the power regulation and user grouping in the NOMA systems. Abstract The non‐orthogonal multiple access strategies have shown promise to boost fifth generation and sixth generation wireless networks' spectral efficiency and ...
Zaid Albataineh   +4 more
wiley   +1 more source

Temporal mortality-colonization dynamic can influence the coexistence and persistence patterns of cooperators and defectors in an evolutionary game model [PDF]

open access: yesComputational Ecology and Software, 2014
In the present report, the coexistence and persistence time patterns of Prisoners' Dilemma game players were explored in 2D spatial grid systems by considering the impacts of the mortality-colonization temporal dynamic specifically.
YouHua Chen, XueKe Lu, YouFang Chen
doaj  

Habit Formation and the Evolution of Social Communication Networks [PDF]

open access: yes
Stochastic learning theory;game theory;network formation;social communication;replicator ...
Droste, E.J.R.
core   +1 more source

A perspective review of applications of the computed tomography (CT) scan imaging technique for microscopic reservoir rock characterization

open access: yesDeep Underground Science and Engineering, EarlyView.
In this review, the application of micro‐CT and medical‐CT scanning in the oil and gas industry has been thoroughly discussed. Recent improvements in DRP and modern imaging techniques in the oil and gas industry have been modeled using both experimental and simulation work.
Achinta Bera   +2 more
wiley   +1 more source

Detection and mitigation of false data injection attack in DC–DC synchronous boost converter: A real‐time implementation using shallow neural network model

open access: yesIET Power Electronics, EarlyView., 2023
This article proposes a neural network‐based cyber attack detection and mitigation scheme to detect and mitigate false data injection attacks on the sensors. Neural networks are used for the prediction of duty; a combination of a data sampler and a binary attack detector detects the presence of an attack.
Venkata Siva Prasad Machina   +4 more
wiley   +1 more source

Rockburst prediction based on data preprocessing and hyperband‐RNN‐DNN

open access: yesDeep Underground Science and Engineering, EarlyView.
A data preprocessing workflow is proposed to address challenges in rockburst data analysis. Coupled algorithms preprocess the data set, and hyperband optimization is used to enhance RNN performance. Results show that preprocessing improves accuracy, while dense layers enhance model stability and prediction performance.
Yong Fan   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy