Results 21 to 30 of about 662,855 (289)

Cranking Capability Estimation Algorithm Based on Modeling and Online Update of Model Parameters for Li-Ion SLI Batteries

open access: yesEnergies, 2019
The terminal voltage of a starting−lighting−ignition (SLI) battery can decrease to a value lower than the allowable voltage range because of the high discharge current required to crank the engine of a vehicle.
Tae-Won Noh   +2 more
doaj   +1 more source

An Extension of the Well-Posedness Concept for Fractional Differential Equations of Caputo's Type [PDF]

open access: yes, 2013
It is well known that, under standard assumptions, initial value problems for fractional ordinary differential equations involving Caputo-type derivatives are well posed in the sense that a unique solution exists and that this solution continuously ...
Diethelm, Kai
core   +1 more source

Inequalities for terminal value problems for differential equations

open access: yesTamkang Journal of Mathematics, 2002
The aim of the present paper is to establish some new integral inequalities which provide explicit bounds on unknown functions. The inequalities given here can be used as handy tools in the study of terminal value problems for certain differential equations.
Pachpatte, S. B., Pachpatte, B. G.
openaire   +3 more sources

Lightning strike accident analysis and modification measures for incoming lines of power grid in a mining area

open access: yesGong-kuang zidonghua, 2019
In view of the accident of main transformer being broken due to tower at incoming lines of Tunlan substation caused by lightning strike, the problems of lightning protection measures of the incoming lines were analyzed and researched.
PAN Huan, SHEN Jing, CHEN Jinlin
doaj   +1 more source

Monte Carlo computation of optimal portfolios in complete markets [PDF]

open access: yes, 2003
We introduce a method that relies exclusively on Monte Carlo simulation in order to compute numerically optimal portfolio values for utility maximization problems.
Cvitanić, Jakša   +2 more
core   +1 more source

DECREASING OF MECHANISMS DYNAMIC LOADING AT THE TRANSIENT STATE

open access: yesNauka ta progres transportu, 2015
Purpose. It is necessary to select modes of motion to reduce the dynamic loads in the mechanisms. This choice should be made on optimization basis. The purpose of research is to study methods of synthesis regimes of mechanisms and machines motion that ...
V. S. Loveikin, Yu. O. Romasevich
doaj   +1 more source

Small target area extraction and semantic recognition method of electrical secondary drawings based on deep learning

open access: yesZhejiang dianli, 2023
Image text recognition and deep learning technology are gradually applied in the field of engineering drawing recognition. The electrical secondary drawing takes the terminal block drawing as an example, which has problems such as small target detection ...
CHU Xueru   +5 more
doaj   +1 more source

EVALUASI INFRASTRUKTUR TERMINAL BULUPITU PURWOKERTO

open access: yesTeras Jurnal: Jurnal Teknik Sipil, 2022
Abstrak  Terminal yang tidak dikelola dengan baik dapat menimbulkan permasalahan di masyarakat. Renovasi terminal perlu dilakukan untuk meningkatkan jumlah pengguna angkutan umum. Penelitian ini bertujuan untuk mengidentifikasi kondisi eksisting Terminal
Nurul Hidayati   +3 more
doaj   +1 more source

A comparison principle for terminal value problems in ordinary differential equations [PDF]

open access: yesTransactions of the American Mathematical Society, 1972
A comparison principle for a terminal value problem of an ordinary differential equation is formulated. Basic related topics such as the existence of maximal and minimal solutions of terminal value problems are investigated. The close relationship between the existence of the extremal solutions of a terminal value problem and the concept of asymptotic ...
openaire   +2 more sources

Industrial Internet of Things Threshold Signcryption Scheme Based on SM Algorithm [PDF]

open access: yesJisuanji gongcheng
The communication between the Supervisory Control And Data Acquisition (SCADA) system and terminal devices in the Industrial Internet of Things (IIoT) is vulnerable to tampering, eavesdropping, forgery, and other attacks.
LI Siqi, TIAN Youliang, PENG Changgen
doaj   +1 more source

Home - About - Disclaimer - Privacy