Search alternatives:
method » methods (Expand Search)
Showing 581 - 600 results of 6,053 for search 'model composition method', query time: 0.24s Refine Results
  1. 581
  2. 582

    Development and Validation of a Risk Prediction Model Based on Inflammatory and Nutritional Composite Indicators for Posthepatectomy Liver Failure Following Radical Resection of He... by Li J, Chen M, Cai W, Yin D

    Published 2025-04-01
    “…A comparison was made of the predictive efficacy of the nomogram prediction model and the associated composite liver function score. …”
    Get full text
    Article
  3. 583

    Research on the evaluation model of ecological environment change and its internal driving mechanisms by Rui Xu, Junfeng Deng, Youshan He, Guochen Sui, Xunchang Li, Wei Yang

    Published 2024-12-01
    “…To achieve this, the paper not only analyzes the multifaceted social, economic, and natural aspects of the composite ecosystem but also develops an ecological environment change evaluation model employing the topological hierarchy-entropy weight method. …”
    Get full text
    Article
  4. 584
  5. 585

    Experimental Investigation on Static Performance of Novel Precast Concrete Composite Slab–Composite Shear Wall Connections by Xiaozhen Shang, Ming Zheng, Yutao Guo, Liangdong Zhuang, Huqing Liang

    Published 2025-06-01
    “…The connection zones between precast concrete composite slabs and composite walls commonly experience severe reinforcement conflicts due to protruding rebars, significantly reducing construction efficiency. …”
    Get full text
    Article
  6. 586

    A Hybrid Approach for Reachability Analysis of Complex Software Systems Using Fuzzy Adaptive Particle Swarm Optimization Algorithm and Rule Composition by Nahid Salimi, Seyfollah Soleimani, Vahid Rafe, Davood Khodadad

    Published 2025-06-01
    “…Additionally, the proposed hybrid algorithm was applied to models generated through rule composition to assess the impact of rule composition on execution time and the number of explored states. …”
    Get full text
    Article
  7. 587
  8. 588
  9. 589

    Investigation of the pharmacological activity of the tetrapeptide HAEЕ, zinc, and human serum albumin in a transgenic mouse model with tau protein overexpression (P301S) by Veronika S. Shmigerova, Yulia V. Stepenko, Alexandra A. Kurbatova, Nikita S. Zhunusov, Nikita S. Lyapkalov, Maria S. Sviridova, Tatyana V. Avtina, Arkadiy V. Nesterov, Alexander A. Popov, Natalia I. Nesterova, Mariia Iu. Goltsova, Tatiana G. Pokrovskaya

    Published 2025-03-01
    “…Conclusion: The pharmaceutical composition HAEE-Zn-HSA at a dosage of 75 mg/kg, using a model of homozygous mice from a transgenic line with overexpression of human mutant tau protein P301S, demonstrated high levels of adaptive and exploratory activity and improved motor function.…”
    Get full text
    Article
  10. 590

    Numerical Cohesive Zone Modeling (CZM) of Self-Anchoring AM Metal-CFRP joints by Fikret Enes Altunok Politecnico di Torino, Italy, Giorgio De Pasquale

    Published 2024-04-01
    “…This assessment employs the cohesive zone modeling (CZM) method to simulate joint specimens, followed by comparative analyses to quantify the strengths of the joints…”
    Get full text
    Article
  11. 591
  12. 592
  13. 593

    Cyber security entity recognition method based on residual dilation convolution neural network by Bo XIE, Guowei SHEN, Chun GUO, Yan ZHOU, Miao YU

    Published 2020-10-01
    “…In recent years,cybersecurity threats have increased,and data-driven security intelligence analysis has become a hot research topic in the field of cybersecurity.In particular,the artificial intelligence technology represented by the knowledge graph can provide support for complex cyberattack detection and unknown cyberattack detection in multi-source heterogeneous threat intelligence data.Cybersecurity entity recognition is the basis for the construction of threat intelligence knowledge graphs.The composition of security entities in open network text data is very complex,which makes traditional deep learning methods difficult to identify accurately.Based on the pre-training language model of BERT (pre-training of deep bidirectional transformers),a cybersecurity entity recognition model BERT-RDCNN-CRF based on residual dilation convolutional neural network and conditional random field was proposed.The BERT model was used to train the character-level feature vector representation.Combining the residual convolution and the dilation neural network model to effectively extract the important features of the security entity,and finally obtain the BIO annotation of each character through CRF.Experiments on the large-scale cybersecurity entity annotation dataset constructed show that the proposed method achieves better results than the LSTM-CRF model,the BiLSTM-CRF model and the traditional entity recognition model.…”
    Get full text
    Article
  14. 594

    Numerical Analysis and Experimental Verification of Optical Fiber Composite Overhead Ground Wire (OPGW) Direct Current (DC) Ice Melting Dynamic Process Considering Gap Convection H... by Shuang Wang, Long Cheng, Bo Tang, Wangsheng Xu, Zheng Wang

    Published 2025-04-01
    “…To this end, a finite element model of the DC ice melting process of OPGW was established by introducing the mushy zone constant to consider the influence of the convective heat transfer in the gap, and at the same time, the apparent heat capacity method was used to simulate the changes of the physical property parameters of the melted ice layer. …”
    Get full text
    Article
  15. 595

    Impact of the Contamination Method on the Disinfection of N95 Respirators: Drops versus Aerosols by Mirna Alameddine, Oluchi Okoro, Loïc Wingert, Geneviève Marchand, Benoit Barbeau

    Published 2023-09-01
    “…Inactivation was greater in coupons contaminated using artificial saliva, followed by phosphate buffer solution, and finally artificial saliva with mucin which also presented the highest fraction of resistant spores, based on kinetic modeling. Disinfection was determined sensitive to the method of contamination (p < 0.001). …”
    Get full text
    Article
  16. 596

    Resource Optimization Method Based on Spatio-Temporal Modeling in a Complex Cluster Environment for Electric Vehicle Charging Scenarios by Hongwei Wang, Wei Liu, Chenghui Wang, Kao Guo, Zihao Wang

    Published 2025-05-01
    “…Meanwhile, a composite self-organizing mechanism integrating a trust model is put forward. …”
    Get full text
    Article
  17. 597

    Designing a Model of Maintenance and Sustainability of Expert Human Resources in the Government Organization Province with a Meta-combination Method by Majedreza Dahmardehkemmak, Vahid Pourshahabi, Amin Reza Kamalian, Habibollah Salarzehi

    Published 2025-03-01
    “…It has already been proven, therefore, this research, which aimed to design a model for the maintenance and sustainability of expert human resources in the government organization was carried out with a meta-composite methodConclusionIt was found that contextual, behavioral and structural dimensions as three important categories and components of service compensation system, performance evaluation system, criticism and suggestions system, organizational culture, providing realistic information, learning and growth, leadership and management style and effective communication, security and The security environment, technical, communication and informational infrastructures are considered to have the greatest importance and importance in drawing a strategic map for the maintenance and sustainability of expert human resources in the country's organizations. …”
    Get full text
    Article
  18. 598

    Red, green, and blue model assessment and AQbD approach to HPTLC method for concomitant analysis of metformin, pioglitazone, and teneligliptin by Pintu Prajapati, Pooja Patel, Dhrumi Naik, Anzarul Haque, Shailesh Shah

    Published 2024-11-01
    “…Critical method parameters and response variables were modeled using the response surface modeling approach, which relies on the central composite design. …”
    Get full text
    Article
  19. 599

    Event Knowledge in Compositional Distributional Semantics by Ludovica Pannitto, Alessandro Lenci

    Published 2019-06-01
    “…The great majority of compositional models in distributional semantics present methods to compose vectors or tensors in a representation of the sentence. …”
    Get full text
    Article
  20. 600

    Prediction of the digestibility and digestible energy content of hay for horses using an enzymatic degradability method by D. Andueza, W. Martin-Rosset

    Published 2025-08-01
    “…The proposed models represent an alternative approach to the existing models for predicting the nutritive value and DE content of hay from their chemical composition.…”
    Get full text
    Article