Search alternatives:
unstructures » structures (Expand Search)
structured » structures (Expand Search), structural (Expand Search)
Showing 501 - 520 results of 53,535 for search '(unstructures OR (structured OR structure)) data', query time: 0.42s Refine Results
  1. 501

    Long-Term Structural Health Monitoring System for a High-Speed Railway Bridge Structure by You-Liang Ding, Gao-Xin Wang, Peng Sun, Lai-Yi Wu, Qing Yue

    Published 2015-01-01
    “…The SHM system includes various sensors as well as corresponding data acquisition and transmission equipment for automatic data collection. …”
    Get full text
    Article
  2. 502

    LONG-LIVED STRUCTURAL ENSEMBLES OF THE EAST EUROPEAN PLATFORM. Article 2. THE STRUCTURE OF THE TOP OF THE BASEMENT by S. Y. Kolodyazhny

    Published 2018-06-01
    “…Using an «iris diaphragm» model and the reconstructions with reversing plate rotation makes possible to explain the main patterns of the long-lived vortex structure of the EEP.…”
    Get full text
    Article
  3. 503

    THE COMPARISON BETWEEN STRUCTURAL PARTICLE “地” IN MANDARIN AND STRUCTURAL PARTICLE “DENGAN” ATAU “SECARA” IN INDONESIAN by Elvira Septevany, Liu Dandan, Qin Weifen, Lu Xing

    Published 2021-03-01
    “…In order to compare these two words, the writer uses contrastive analysis which is a study to identify the differences and similarities between Indonesian and Mandarin structural particle. The data collection technique was done by using purposive sampling technique. …”
    Get full text
    Article
  4. 504

    Investigation on Structural Performance of Integral Steel Wall Plate Structure in Cable–Pylon Anchorage Zone by Chen Liang, Yuqing Liu, Yimin Liu, Chi Lu

    Published 2025-08-01
    “…The results were compared with experimental data of a conventional type of anchorage zone. Then, finite element models of anchorages with steel anchor boxes were established based on the geometries of an as-built bridge, and the performance of the IWP structure was compared with conventional details. …”
    Get full text
    Article
  5. 505

    Structure–property models of organic compounds based on molecular graphs with elements of the spatial structures of the molecules by N. A. Shulaeva, M. I. Skvortsova, N. A. Mikhailova

    Published 2021-01-01
    “…Owing to its high efficiency, the structure–property models obtained by this approach can be employed to calculate the properties of chemical compounds for which experimental data are unavailable.…”
    Get full text
    Article
  6. 506

    Coal structure identification method based on three-terminal tuple chart in complex structure area by Jianghai ZOU, Gang XIANG, Yinlan FU, Yongyu YANG, Hengyi ZHAO, Jian ZHENG

    Published 2025-07-01
    “…When the logging curve data of compensated density, resistivity, and natural gamma are selected as the three-terminal points of the three-terminal tuple chart, different coal body structure types are well distinguished on the three-terminal tuple chart. …”
    Get full text
    Article
  7. 507
  8. 508
  9. 509
  10. 510
  11. 511
  12. 512

    D3GNN: Double dual dynamic graph neural network for multisource remote sensing data classification by Teng Yang, Song Xiao, Jiahui Qu

    Published 2025-05-01
    “…Nevertheless, GNN faces challenges as the manually defined static graph structure might not accurately capture the complexity of the data. …”
    Get full text
    Article
  13. 513
  14. 514

    DETERMINANTS OF STRUCTURAL DIMENSION OF DAILY BEHAVIOUR IN A TRADITIONAL AFRICAN CITY: A CASE STUDY OF ILORIN, NIGERIA by Moses Olutoyin ADEDOKUN

    Published 2013-10-01
    “…Descriptive statistics were used to summarize the data while Principal Component Analysis was used to test the research hypotheses. …”
    Get full text
    Article
  15. 515

    A Black Box Doubly Fed Wind Turbine Electromechanical Transient Structured Model Fault Ride-Through Control Identification Method Based on Measured Data by Xu Zhang, Shenbing Ma, Jun Ye, Lintao Gao, Hui Huang, Qiman Xie, Liming Bo, Qun Wang

    Published 2025-06-01
    “…Firstly, according to the domestic and international new energy turbine fault ride-through standards, the fault ride-through segmentation control characteristics are summarized, and a general structured model for fault ride-through segmentation control of doubly fed wind turbines is constructed; Secondly, based on the measured hardware-in-the-loop data of the doubly fed wind turbine black box controller, the method of data segmentation preprocessing and structured model identification of the doubly fed wind turbine is proposed by utilizing statistical modal features and genetic Newton’s algorithm, and a set of generalized software simulation platforms for parameter identification is developed by combining Matlab and BPA; lastly, using the measured data of the doubly fed wind turbine in the black box and the software platform, the validity and accuracy of the proposed parameter identification method and software are tested in the simulation. …”
    Get full text
    Article
  16. 516
  17. 517

    Quantitative analysis of EXAFS data sets using deep reinforcement learning by Eun-Suk Jeong, In-Hui Hwang, Sang-Wook Han

    Published 2025-05-01
    “…The deep RL method effectively determined the local structural properties of PtOx and Zn-O complexes by fitting a series of EXAFS data sets to theoretical EXAFS calculations without imposing specific constraints. …”
    Get full text
    Article
  18. 518
  19. 519
  20. 520

    Multi-View Cluster Structure Guided One-Class BLS-Autoencoder for Intrusion Detection by Qifan Yang, Yu-Ang Chen, Yifan Shi

    Published 2025-07-01
    “…Specifically, a multi-view co-association matrix optimization objective function with doubly-stochastic constraints is first designed to capture the cross-view cluster structure. Then, a multi-view cluster structure guided one-class BLS-autoencoder (MOCBLSAEs) is proposed, which learns the discriminative patterns of normal traffic data by preserving the cross-view clustering structure while minimizing the intra-view sample reconstruction errors, thereby enabling the identification of unknown intrusion data. …”
    Get full text
    Article