-
581
Adsorption isotherms for tetracycline removal from water using carbon-mineral composites determined by inverse liquid chromatography
Published 2025-04-01“…The adsorption equilibrium equations indicated that the n-center adsorption model without dissociation model provided the best fit for tetracycline adsorption on the three studied carbon-mineral composites, suggesting a similar adsorption mechanism for the tested materials. …”
Get full text
Article -
582
A Hybrid Approach for Reachability Analysis of Complex Software Systems Using Fuzzy Adaptive Particle Swarm Optimization Algorithm and Rule Composition
Published 2025-06-01“…Additionally, the proposed hybrid algorithm was applied to models generated through rule composition to assess the impact of rule composition on execution time and the number of explored states. …”
Get full text
Article -
583
Middle School Classroom Furniture Evaluation Model Based on Combinatorial Weighting of Game Theory
Published 2025-04-01“…To address this, this study focuses on the “demand-configuration” contradiction and constructs a composite evaluation model integrating the “game theory combined weighting method - fuzzy comprehensive evaluation method - quadrant diagram model”. …”
Get full text
Article -
584
Cyber security entity recognition method based on residual dilation convolution neural network
Published 2020-10-01“…In recent years,cybersecurity threats have increased,and data-driven security intelligence analysis has become a hot research topic in the field of cybersecurity.In particular,the artificial intelligence technology represented by the knowledge graph can provide support for complex cyberattack detection and unknown cyberattack detection in multi-source heterogeneous threat intelligence data.Cybersecurity entity recognition is the basis for the construction of threat intelligence knowledge graphs.The composition of security entities in open network text data is very complex,which makes traditional deep learning methods difficult to identify accurately.Based on the pre-training language model of BERT (pre-training of deep bidirectional transformers),a cybersecurity entity recognition model BERT-RDCNN-CRF based on residual dilation convolutional neural network and conditional random field was proposed.The BERT model was used to train the character-level feature vector representation.Combining the residual convolution and the dilation neural network model to effectively extract the important features of the security entity,and finally obtain the BIO annotation of each character through CRF.Experiments on the large-scale cybersecurity entity annotation dataset constructed show that the proposed method achieves better results than the LSTM-CRF model,the BiLSTM-CRF model and the traditional entity recognition model.…”
Get full text
Article -
585
-
586
Numerical Cohesive Zone Modeling (CZM) of Self-Anchoring AM Metal-CFRP joints
Published 2024-04-01“…This assessment employs the cohesive zone modeling (CZM) method to simulate joint specimens, followed by comparative analyses to quantify the strengths of the joints…”
Get full text
Article -
587
Event Knowledge in Compositional Distributional Semantics
Published 2019-06-01“…The great majority of compositional models in distributional semantics present methods to compose vectors or tensors in a representation of the sentence. …”
Get full text
Article -
588
Comparison of the Methods for Predicting the Critical Temperature and Critical Pressure of Petroleum Fractions and Individual Hydrocarbons
Published 2025-05-01“…Consequently, effective methods for predicting critical temperature and pressure must account for a wide range of compositional scenarios. …”
Get full text
Article -
589
The problem of mathematical finite element modeling of inhomogeneous deformable solids using scanning
Published 2019-10-01“…The results obtained in this way are used to construct finite element models and analyze their stress-strain state.Materials and Methods. …”
Get full text
Article -
590
Impact of the Contamination Method on the Disinfection of N95 Respirators: Drops versus Aerosols
Published 2023-09-01“…Inactivation was greater in coupons contaminated using artificial saliva, followed by phosphate buffer solution, and finally artificial saliva with mucin which also presented the highest fraction of resistant spores, based on kinetic modeling. Disinfection was determined sensitive to the method of contamination (p < 0.001). …”
Get full text
Article -
591
Resource Optimization Method Based on Spatio-Temporal Modeling in a Complex Cluster Environment for Electric Vehicle Charging Scenarios
Published 2025-05-01“…Meanwhile, a composite self-organizing mechanism integrating a trust model is put forward. …”
Get full text
Article -
592
Designing a Model of Maintenance and Sustainability of Expert Human Resources in the Government Organization Province with a Meta-combination Method
Published 2025-03-01“…It has already been proven, therefore, this research, which aimed to design a model for the maintenance and sustainability of expert human resources in the government organization was carried out with a meta-composite methodConclusionIt was found that contextual, behavioral and structural dimensions as three important categories and components of service compensation system, performance evaluation system, criticism and suggestions system, organizational culture, providing realistic information, learning and growth, leadership and management style and effective communication, security and The security environment, technical, communication and informational infrastructures are considered to have the greatest importance and importance in drawing a strategic map for the maintenance and sustainability of expert human resources in the country's organizations. …”
Get full text
Article -
593
Red, green, and blue model assessment and AQbD approach to HPTLC method for concomitant analysis of metformin, pioglitazone, and teneligliptin
Published 2024-11-01“…Critical method parameters and response variables were modeled using the response surface modeling approach, which relies on the central composite design. …”
Get full text
Article -
594
Prediction of the digestibility and digestible energy content of hay for horses using an enzymatic degradability method
Published 2025-08-01“…The proposed models represent an alternative approach to the existing models for predicting the nutritive value and DE content of hay from their chemical composition.…”
Get full text
Article -
595
Additive manufacturing of metal matrix composites
Published 2025-04-01“…A detailed comparison of microstructural evolution and process parameter optimization, including feedstock preparation methods and the role of machine learning and modeling among the different AM processes, is also presented. …”
Get full text
Article -
596
Conceptual and mathematical models, methods, and technologies for the study of the digital transformation of economic and social systems: a literature review and research agenda (P...
Published 2021-12-01“…We could do such a study by evaluating the activity results, analyzing them using mathematical models, and then synthesizing the activity with mathematical methods based on the analysis of the effects of using information technologies. …”
Get full text
Article -
597
-
598
Thermal interface composite polymer materials
Published 2025-03-01“…The methods employed include numerical modeling of thermal conductivity using the COMSOL Multiphysics software suite and experimental studies of thermal conductivity by the steady-state heat flow method. …”
Get full text
Article -
599
Effect of the Protein Composition of Whole Nutrition Food for Special Medical Purposes on in Vitro Digestion Properties and Cell Calcium Transport Promotion
Published 2025-08-01“…In vitro digestion study was conducted following the international INFOGEST method and the samples were subsequently analyzed for free α-amino acid content, degree of hydrolysis, peptide sequences, and amino acid composition. …”
Get full text
Article -
600
Design variations in Moroccan calligraphy composition
Published 2024-05-01“…The third chapter included the research procedures, and relied on the descriptive approach (method of analysis Content) The research community reached (51) samples of Moroccan script, and the research sample was intentionally selected with (5) models. …”
Get full text
Article