-
2861
Electrochemical Remediation of Marine Sediments Spiked With Hg and PAHs: Comparison of the Enhancing Agents’ Nature
Published 2025-01-01“…Real marine sediments dredged from Capo Granitola (CG) (Sicily, Italy) artificially contaminated were treated via an electrokinetic (EK) process. Mercury (Hg) and phenanthrene (PHE) or a mixture of PAHs (to simulate a more complex site) were selected as models of heavy metals and organic hazardous compounds, respectively. …”
Get full text
Article -
2862
Relativistic backward-wave oscillators of O-type with sheet electronic beams
Published 2019-06-01“…The analysis of interaction processes has been carried out. To increase the power of the generators proposed two-section scheme. …”
Get full text
Article -
2863
Governing Complexity for Sustainable Development
Published 2023-06-01“…Of the considered components of this model, the respondents most often singled out the effective organization of managing complex processes and multi-level relationships between the components of the system, strict adherence to the rules, and transparency and conscientiousness in the performance of duties. …”
Get full text
Article -
2864
UKRAINIAN ENTREPRENEURSHIP IN POLAND: CHALLENGES AND OPPORTUNITIES
Published 2025-01-01“…During this stage, the business model is reformatted, and the company aims to reach the break-even point. …”
Get full text
Article -
2865
The Effectiveness of Trauma-Aware Parenting Intervention on Relationship between Attachment and Emotional Disturbance in Adoptive Families
Published 2024-08-01“…Through these factors, the child gradually internalizes models of himself and others, which are called internal active models in the attachment perspective (Mohan, 2023). …”
Get full text
Article -
2866
NUMERICAL CONTROL MILLING PARAMETER OPTIMIZATION ON THE BASIS OF IMPROVED GENETIC ALGORITHM
Published 2022-01-01“…Numerical control machining is widely used in traditional manufacturing industry and national defense strategic industry, and optimization of milling parameters is closely related to processing efficiency, quality and cost. Firstly, a constrained multi-objective optimization function is constructed as a parameter optimization model. …”
Get full text
Article -
2867
Multitier ensemble classifiers for malicious network traffic detection
Published 2018-10-01“…A malicious network traffic detection method based on multi-level distributed ensemble classifier was proposed for the problem that the attack model was not trained accurately due to the lack of some samples of attack steps for detecting attack in the current network big data environment,as well as the deficiency of the existing ensemble classifier in the construction of multilevel classifier.The dataset was first preprocessed and aggregated into different clusters,then noise processing on each cluster was performed,and then a multi-level distributed ensemble classifier,MLDE,was built to detect network malicious traffic.In the MLDE ensemble framework the base classifier was used at the bottom,while the non-bottom different ensemble classifiers were used.The framework was simple to be built.In the framework,big data sets were concurrently processed,and the size of ensemble classifier was adjusted according to the size of data sets.The experimental results show that the AUC value can reach 0.999 when MLDE base users random forest was used in the first layer,bagging was used in the second layer and AdaBoost classifier was used in the third layer.…”
Get full text
Article -
2868
Multitier ensemble classifiers for malicious network traffic detection
Published 2018-10-01“…A malicious network traffic detection method based on multi-level distributed ensemble classifier was proposed for the problem that the attack model was not trained accurately due to the lack of some samples of attack steps for detecting attack in the current network big data environment,as well as the deficiency of the existing ensemble classifier in the construction of multilevel classifier.The dataset was first preprocessed and aggregated into different clusters,then noise processing on each cluster was performed,and then a multi-level distributed ensemble classifier,MLDE,was built to detect network malicious traffic.In the MLDE ensemble framework the base classifier was used at the bottom,while the non-bottom different ensemble classifiers were used.The framework was simple to be built.In the framework,big data sets were concurrently processed,and the size of ensemble classifier was adjusted according to the size of data sets.The experimental results show that the AUC value can reach 0.999 when MLDE base users random forest was used in the first layer,bagging was used in the second layer and AdaBoost classifier was used in the third layer.…”
Get full text
Article -
2869
Collaborative Control of the Frequency and Opening of Electronic Expansion Valve in Variable Refrigerant Flow Refrigeration System
Published 2019-01-01“…By changing the compressor frequency and opening of the electronic expansion valve, a curve fitting model under a separate control of the two processes was established. …”
Get full text
Article -
2870
-
2871
An amplification mechanism for weak ELF magnetic fields quantum-bio effects in cancer cells
Published 2025-01-01“…Abstract Observing quantum mechanical characteristics in biological processes is a surprising and important discovery. …”
Get full text
Article -
2872
Improving the Memory through Singing Method of Children Ages 5 - 6 Years in Kindergarten Insan Pandhega
Published 2019-11-01“…This study was successful if the memory of children who reached the criteria of developing well and developing very well reached more than 75%. …”
Article -
2873
Invasive urodynamic investigations in the management of women with refractory overactive bladder symptoms: FUTURE, a superiority RCT and economic evaluation
Published 2025-07-01“…To estimate longer-term economic differences, a hybrid model with a decision tree describing short-term events and Markov processes describing long-term events was developed using external evidence that captures clinical and patient events beyond the end of the trial. …”
Get full text
Article -
2874
Digitalization as a Factor for Development of the Target Arctic Subspaces
Published 2025-03-01“…Based on the analysis of the collected and summarized materials, seven models of motivational extensions were constructed for each of the identified Arctic subspaces, summarizing information about the goal-setting of each subspace. …”
Get full text
Article -
2875
Experimental and simulation study on micro damage of HTPB propellant under multi angle tensile shear loading
Published 2025-07-01“…When the side length of RVE reaches and exceeds 600 μm, the porosity tends to stabilize. …”
Get full text
Article -
2876
CSI-based symmetric encryption end-to-end communication system
Published 2025-08-01“…The proposed system employed convolutional neural networks to construct the transmitter, receiver, and key generator, optimizing the encoding and decoding process in an end-to-end manner. At the same time, it leveraged the reciprocity, random time-variability, and spatial uniqueness of wireless channels to measure the CSI and generate keys from legitimate users, encrypting the original information. …”
Get full text
Article -
2877
Decarbonization of the Romanian Economy: An ARDL and KRLS Approach of Ecological Footprint
Published 2022-08-01“…The mechanisms developed at the European level through the Green Deal, to achieve the assumed decarbonization process, are facing major challenges to reach climate neutrality of the EU in a clean and circular economy by 2050. …”
Get full text
Article -
2878
RCS Special Analysis Method for Non-Cooperative Aircraft Based on Inverse Reconfiguration Coupled with Aerodynamic Optimization
Published 2025-06-01“…This approach integrates data fusion techniques to facilitate an initial shape reconstruction, followed by an iterative optimization process that utilizes computational fluid dynamics (CFD) to enhance the shape, accounting for the aerodynamic performance. …”
Get full text
Article -
2879
Investigating Cyclic and Pushover Performance of Different Metallic Yielding Dampers
Published 2023-08-01“…In this research, different types of metallic dampers are compared using finite element simulation which is performed by means of ABAQUS package. Modeling process is described and verified by comparing the results to a previously published experimental paper on the subject. …”
Get full text
Article -
2880
Forming a dualistic system in the Habsburg Empire: prerequisites and peculiarities of building new relations between Austria and Hungary
Published 2024-11-01“…The war only accelerated this process and contributed to the formation of the dualistic system. …”
Get full text
Article