Showing 581 - 600 results of 6,053 for search 'model composition methods', query time: 0.17s Refine Results
  1. 581

    Adsorption isotherms for tetracycline removal from water using carbon-mineral composites determined by inverse liquid chromatography by Piotr M. Słomkiewicz, Sabina Dołęgowska, Dariusz Wideł, Katarzyna Piekacz

    Published 2025-04-01
    “…The adsorption equilibrium equations indicated that the n-center adsorption model without dissociation model provided the best fit for tetracycline adsorption on the three studied carbon-mineral composites, suggesting a similar adsorption mechanism for the tested materials. …”
    Get full text
    Article
  2. 582

    A Hybrid Approach for Reachability Analysis of Complex Software Systems Using Fuzzy Adaptive Particle Swarm Optimization Algorithm and Rule Composition by Nahid Salimi, Seyfollah Soleimani, Vahid Rafe, Davood Khodadad

    Published 2025-06-01
    “…Additionally, the proposed hybrid algorithm was applied to models generated through rule composition to assess the impact of rule composition on execution time and the number of explored states. …”
    Get full text
    Article
  3. 583

    Middle School Classroom Furniture Evaluation Model Based on Combinatorial Weighting of Game Theory by Yu Liang, Yihui Yan, Huiyuan Guan

    Published 2025-04-01
    “…To address this, this study focuses on the “demand-configuration” contradiction and constructs a composite evaluation model integrating the “game theory combined weighting method - fuzzy comprehensive evaluation method - quadrant diagram model”. …”
    Get full text
    Article
  4. 584

    Cyber security entity recognition method based on residual dilation convolution neural network by Bo XIE, Guowei SHEN, Chun GUO, Yan ZHOU, Miao YU

    Published 2020-10-01
    “…In recent years,cybersecurity threats have increased,and data-driven security intelligence analysis has become a hot research topic in the field of cybersecurity.In particular,the artificial intelligence technology represented by the knowledge graph can provide support for complex cyberattack detection and unknown cyberattack detection in multi-source heterogeneous threat intelligence data.Cybersecurity entity recognition is the basis for the construction of threat intelligence knowledge graphs.The composition of security entities in open network text data is very complex,which makes traditional deep learning methods difficult to identify accurately.Based on the pre-training language model of BERT (pre-training of deep bidirectional transformers),a cybersecurity entity recognition model BERT-RDCNN-CRF based on residual dilation convolutional neural network and conditional random field was proposed.The BERT model was used to train the character-level feature vector representation.Combining the residual convolution and the dilation neural network model to effectively extract the important features of the security entity,and finally obtain the BIO annotation of each character through CRF.Experiments on the large-scale cybersecurity entity annotation dataset constructed show that the proposed method achieves better results than the LSTM-CRF model,the BiLSTM-CRF model and the traditional entity recognition model.…”
    Get full text
    Article
  5. 585
  6. 586

    Numerical Cohesive Zone Modeling (CZM) of Self-Anchoring AM Metal-CFRP joints by Fikret Enes Altunok Politecnico di Torino, Italy, Giorgio De Pasquale

    Published 2024-04-01
    “…This assessment employs the cohesive zone modeling (CZM) method to simulate joint specimens, followed by comparative analyses to quantify the strengths of the joints…”
    Get full text
    Article
  7. 587

    Event Knowledge in Compositional Distributional Semantics by Ludovica Pannitto, Alessandro Lenci

    Published 2019-06-01
    “…The great majority of compositional models in distributional semantics present methods to compose vectors or tensors in a representation of the sentence. …”
    Get full text
    Article
  8. 588
  9. 589

    The problem of mathematical finite element modeling of inhomogeneous deformable solids using scanning by V. L. Duong

    Published 2019-10-01
    “…The results obtained in this way are used to construct finite element models and analyze their stress-strain state.Materials and Methods. …”
    Get full text
    Article
  10. 590

    Impact of the Contamination Method on the Disinfection of N95 Respirators: Drops versus Aerosols by Mirna Alameddine, Oluchi Okoro, Loïc Wingert, Geneviève Marchand, Benoit Barbeau

    Published 2023-09-01
    “…Inactivation was greater in coupons contaminated using artificial saliva, followed by phosphate buffer solution, and finally artificial saliva with mucin which also presented the highest fraction of resistant spores, based on kinetic modeling. Disinfection was determined sensitive to the method of contamination (p < 0.001). …”
    Get full text
    Article
  11. 591

    Resource Optimization Method Based on Spatio-Temporal Modeling in a Complex Cluster Environment for Electric Vehicle Charging Scenarios by Hongwei Wang, Wei Liu, Chenghui Wang, Kao Guo, Zihao Wang

    Published 2025-05-01
    “…Meanwhile, a composite self-organizing mechanism integrating a trust model is put forward. …”
    Get full text
    Article
  12. 592

    Designing a Model of Maintenance and Sustainability of Expert Human Resources in the Government Organization Province with a Meta-combination Method by Majedreza Dahmardehkemmak, Vahid Pourshahabi, Amin Reza Kamalian, Habibollah Salarzehi

    Published 2025-03-01
    “…It has already been proven, therefore, this research, which aimed to design a model for the maintenance and sustainability of expert human resources in the government organization was carried out with a meta-composite methodConclusionIt was found that contextual, behavioral and structural dimensions as three important categories and components of service compensation system, performance evaluation system, criticism and suggestions system, organizational culture, providing realistic information, learning and growth, leadership and management style and effective communication, security and The security environment, technical, communication and informational infrastructures are considered to have the greatest importance and importance in drawing a strategic map for the maintenance and sustainability of expert human resources in the country's organizations. …”
    Get full text
    Article
  13. 593

    Red, green, and blue model assessment and AQbD approach to HPTLC method for concomitant analysis of metformin, pioglitazone, and teneligliptin by Pintu Prajapati, Pooja Patel, Dhrumi Naik, Anzarul Haque, Shailesh Shah

    Published 2024-11-01
    “…Critical method parameters and response variables were modeled using the response surface modeling approach, which relies on the central composite design. …”
    Get full text
    Article
  14. 594

    Prediction of the digestibility and digestible energy content of hay for horses using an enzymatic degradability method by D. Andueza, W. Martin-Rosset

    Published 2025-08-01
    “…The proposed models represent an alternative approach to the existing models for predicting the nutritive value and DE content of hay from their chemical composition.…”
    Get full text
    Article
  15. 595

    Additive manufacturing of metal matrix composites by Mohan Sai Kiran Kumar Yadav Nartu, Priyanshi Agrawal

    Published 2025-04-01
    “…A detailed comparison of microstructural evolution and process parameter optimization, including feedstock preparation methods and the role of machine learning and modeling among the different AM processes, is also presented. …”
    Get full text
    Article
  16. 596

    Conceptual and mathematical models, methods, and technologies for the study of the digital transformation of economic and social systems: a literature review and research agenda (P... by A. S. Geyda, T. N. Gurieva, V. N. Naumov

    Published 2021-12-01
    “…We could do such a study by evaluating the activity results, analyzing them using mathematical models, and then synthesizing the activity with mathematical methods based on the analysis of the effects of using information technologies. …”
    Get full text
    Article
  17. 597
  18. 598

    Thermal interface composite polymer materials by Oleksandr Listratenko, Yuriy Shepetov, Oleksandr Kravchenko, Illia Borshchov, Bohdan Podlesnyi

    Published 2025-03-01
    “…The methods employed include numerical modeling of thermal conductivity using the COMSOL Multiphysics software suite and experimental studies of thermal conductivity by the steady-state heat flow method. …”
    Get full text
    Article
  19. 599

    Effect of the Protein Composition of Whole Nutrition Food for Special Medical Purposes on in Vitro Digestion Properties and Cell Calcium Transport Promotion by Weirong GUAN, Gengjie CUI, Shulin ZHENG, Na DONG, Yiming DING, Shengkai FANG, Hongyan LI, Jing WANG

    Published 2025-08-01
    “…In vitro digestion study was conducted following the international INFOGEST method and the samples were subsequently analyzed for free α-amino acid content, degree of hydrolysis, peptide sequences, and amino acid composition. …”
    Get full text
    Article
  20. 600

    Design variations in Moroccan calligraphy composition by Ahmed Rahman Guma, Kifah Guma Hafez

    Published 2024-05-01
    “…The third chapter included the research procedures, and relied on the descriptive approach (method of analysis Content) The research community reached (51) samples of Moroccan script, and the research sample was intentionally selected with (5) models. …”
    Get full text
    Article