ARTÍCULO
TITULO

Methodology and computer package for generation rescheduling

Gan    
D    
Qu    
Z    
Cai    
H    
Wang    
X    

Resumen

No disponible

 Artículos similares

       
 
Pengyu Wei, Chuntong Li, Ze Jiang and Deyu Wang    
Digital twins, an innovative technology propelled by data and models, play a seminal role in the digital transformation and intelligent upgrade of ships. This study introduces a digital twin methodology for the real-time monitoring of ship structure defo... ver más

 
Irina Nizovtseva, Vladimir Palmin, Ivan Simkin, Ilya Starodumov, Pavel Mikushin, Alexander Nozik, Timur Hamitov, Sergey Ivanov, Sergey Vikharev, Alexei Zinovev, Vladislav Svitich, Matvey Mogilev, Margarita Nikishina, Simon Kraev, Stanislav Yurchenko, Timofey Mityashin, Dmitrii Chernushkin, Anna Kalyuzhnaya and Felix Blyakhman    
Development of energy-efficient and high-performance bioreactors requires progress in methods for assessing the key parameters of the biosynthesis process. With a wide variety of approaches and methods for determining the phase contact area in gas?liquid... ver más
Revista: Algorithms

 
Jose Antonio Carballo, Javier Bonilla, Jesús Fernández-Reche, Bijan Nouri, Antonio Avila-Marin, Yann Fabel and Diego-César Alarcón-Padilla    
Due to the need to know the availability of solar resources for the solar renewable technologies in advance, this paper presents a new methodology based on computer vision and the object detection technique that uses convolutional neural networks (Effici... ver más
Revista: Algorithms

 
Aleksandr Romanov, Anna Kurtukova, Anastasia Fedotova and Alexander Shelupanov    
This article is part of a series aimed at determining the authorship of source codes. Analyzing binary code is a crucial aspect of cybersecurity, software development, and computer forensics, particularly in identifying malware authors. Any program is ma... ver más
Revista: Information

 
Mauricio Diéguez, Carlos Cares, Cristina Cachero and Jorge Hochstetter    
As cyber-attacks grow worldwide, companies have begun to realize the importance of being protected against malicious actions that seek to violate their systems and access their information assets. Faced with this scenario, organizations must carry out co... ver más
Revista: Applied Sciences