Showing 781 - 800 results of 69,792 for search 'model analysis (method OR methods)', query time: 0.43s Refine Results
  1. 781
  2. 782
  3. 783
  4. 784

    Entropy in the Assessment of the Labour Market Situation in the Context of the Survival Analysis Methods by Beata Bieszk-Stolorz

    Published 2025-06-01
    “…., the link between entropy and the methods of survival analysis. These methods are also used in assessing the duration of any socio-economic phenomenon. …”
    Get full text
    Article
  5. 785
  6. 786

    The teams’ formation in sport aerobics on the basis of application of multidimensional analysis methods by Zh.L. Kozina, T.V. Shepelenko, Miroslawa Cieslicka, Katarzyna Prusik, Radoslaw Muszkieta, A.V. Osiptsov, V.M. Kostiukevych, T.A. Bazilyuk, I.N. Sobko, O.A. Ryepko, S.B. Polishchuk, A.S. Ilnickaya

    Published 2017-12-01
    “…The purpose of the research is to develop the principles of team’s formation in sport aerobics with application of factorial and cluster analysismethods. Material: in a research girls (n=24) from the sport aerobics national team (Kharkiv, Ukraine) participated. …”
    Get full text
    Article
  7. 787
  8. 788
  9. 789

    Nonlinear Pushover Analysis of Retrofitted Transmission Towers Under Static Wind Loads by Quang-Viet Vu, Hyeok-Ju Lee, Jae-Min Kim

    Published 2025-02-01
    “…The nonlinear pushover analysis employs advanced finite element modeling to simulate the nonlinear inelastic behavior of towers under incremental static wind loads until failure. …”
    Get full text
    Article
  10. 790

    An analytical optimal calibration framework of bonded particle model for rock strength envelop modelling by Xiaoxiong Zhou, Hongyi Xu, Qiuming Gong, Yanan Ma, Weiqiang Xie

    Published 2025-05-01
    “…Abstract When employing bonded discrete element models (DEMs) to model rocks, a fundamental problem is how to determine the micro parameters to accurately simulate the rock strength characteristics. …”
    Get full text
    Article
  11. 791

    Jacobian-Free Newton Krylov Methods for Steady and Transient Neutron Transport Models by ZHANG Yangyi, ZHANG Tiancheng, ZHOU Xiafeng

    Published 2024-06-01
    “…Therefore, the efficient and robust acceleration method of 3D large-scale pin-by-pin neutron transport models is a primary objective of high-resolution reactor calculations. …”
    Article
  12. 792

    Study on the Temperature Model of Dry Dual Clutch based on Lumped Parameter Method by Zhou Yunshan, Li Chenglin

    Published 2016-01-01
    “…A thermodynamic analysis on the simplified model of the clutch system is carried out by employing lumped parameters method. …”
    Get full text
    Article
  13. 793
  14. 794
  15. 795

    Exploring the Potential of Electroencephalography Signal–Based Image Generation Using Diffusion Models: Integrative Framework Combining Mixed Methods and Multimodal Analysis by Chi-Sheng Chen, Shao-Hsuan Chang, Che-Wei Liu, Tung-Ming Pan

    Published 2025-06-01
    “…To achieve more meaningful EEG-to-image generation, we developed a novel framework, Neural-Cognitive Multimodal EEG-Informed Image (NECOMIMI), which was specifically designed to generate images directly from EEG signals. MethodsWe developed a 2-stage NECOMIMI method, which integrated the novel Neural Encoding Representation Vectorizer (NERV) EEG encoder that we designed with a diffusion-based generative model. …”
    Get full text
    Article
  16. 796

    Research on the evaluation method for the outflow uniformity of liquid distributor by TAN Hu, ZHU Xiaolei, LU Xiaofeng

    Published 2025-03-01
    “…This article established a simplified finite element analysis method based on the species transport model and verified the applicability for the structure of a two-stage liquid distributor. …”
    Get full text
    Article
  17. 797
  18. 798
  19. 799

    Detection of Anomalies in Data Streams Using the LSTM-CNN Model by Agnieszka Duraj, Piotr S. Szczepaniak, Artur Sadok

    Published 2025-03-01
    “…This paper presents a comparative analysis of selected deep learning methods applied to anomaly detection in data streams. …”
    Get full text
    Article
  20. 800