Showing 2,861 - 2,880 results of 3,292 for search 'reaching process model', query time: 0.18s Refine Results
  1. 2861

    Electrochemical Remediation of Marine Sediments Spiked With Hg and PAHs: Comparison of the Enhancing Agents’ Nature by Federica Proietto, Claudia Prestigiacomo, Fabio D’Agostino, Maria Bonsignore, Mario Sprovieri, Alessandro Galia, Onofrio Scialdone

    Published 2025-01-01
    “…Real marine sediments dredged from Capo Granitola (CG) (Sicily, Italy) artificially contaminated were treated via an electrokinetic (EK) process. Mercury (Hg) and phenanthrene (PHE) or a mixture of PAHs (to simulate a more complex site) were selected as models of heavy metals and organic hazardous compounds, respectively. …”
    Get full text
    Article
  2. 2862

    Relativistic backward-wave oscillators of O-type with sheet electronic beams by A. V. Aksenchyk, I. F. Kirinovich

    Published 2019-06-01
    “…The analysis of interaction processes has been carried out. To increase the power of the generators proposed two-section scheme. …”
    Get full text
    Article
  3. 2863

    Governing Complexity for Sustainable Development by Fara Adilah Firdaus Mohd Rom, Osamu Soda

    Published 2023-06-01
    “…Of the considered components of this model, the respondents most often singled out the effective organization of managing complex processes and multi-level relationships between the components of the system, strict adherence to the rules, and transparency and conscientiousness in the performance of duties. …”
    Get full text
    Article
  4. 2864

    UKRAINIAN ENTREPRENEURSHIP IN POLAND: CHALLENGES AND OPPORTUNITIES by Valentyna Smachylo, Olha Rudachenko, Oleh Kulinich, Dmytro Simonov

    Published 2025-01-01
    “…During this stage, the business model is reformatted, and the company aims to reach the break-even point. …”
    Get full text
    Article
  5. 2865

    The Effectiveness of Trauma-Aware Parenting Intervention on Relationship between Attachment and Emotional Disturbance in Adoptive Families by Mehrana Mehrana, Mansoureh Bahramipour Isfahani

    Published 2024-08-01
    “…Through these factors, the child gradually internalizes models of himself and others, which are called internal active models in the attachment perspective (Mohan, 2023). …”
    Get full text
    Article
  6. 2866

    NUMERICAL CONTROL MILLING PARAMETER OPTIMIZATION ON THE BASIS OF IMPROVED GENETIC ALGORITHM by YAN ShengLi, FU Hui, LI Hao

    Published 2022-01-01
    “…Numerical control machining is widely used in traditional manufacturing industry and national defense strategic industry, and optimization of milling parameters is closely related to processing efficiency, quality and cost. Firstly, a constrained multi-objective optimization function is constructed as a parameter optimization model. …”
    Get full text
    Article
  7. 2867

    Multitier ensemble classifiers for malicious network traffic detection by Jie WANG, Lili YANG, Min YANG

    Published 2018-10-01
    “…A malicious network traffic detection method based on multi-level distributed ensemble classifier was proposed for the problem that the attack model was not trained accurately due to the lack of some samples of attack steps for detecting attack in the current network big data environment,as well as the deficiency of the existing ensemble classifier in the construction of multilevel classifier.The dataset was first preprocessed and aggregated into different clusters,then noise processing on each cluster was performed,and then a multi-level distributed ensemble classifier,MLDE,was built to detect network malicious traffic.In the MLDE ensemble framework the base classifier was used at the bottom,while the non-bottom different ensemble classifiers were used.The framework was simple to be built.In the framework,big data sets were concurrently processed,and the size of ensemble classifier was adjusted according to the size of data sets.The experimental results show that the AUC value can reach 0.999 when MLDE base users random forest was used in the first layer,bagging was used in the second layer and AdaBoost classifier was used in the third layer.…”
    Get full text
    Article
  8. 2868

    Multitier ensemble classifiers for malicious network traffic detection by Jie WANG, Lili YANG, Min YANG

    Published 2018-10-01
    “…A malicious network traffic detection method based on multi-level distributed ensemble classifier was proposed for the problem that the attack model was not trained accurately due to the lack of some samples of attack steps for detecting attack in the current network big data environment,as well as the deficiency of the existing ensemble classifier in the construction of multilevel classifier.The dataset was first preprocessed and aggregated into different clusters,then noise processing on each cluster was performed,and then a multi-level distributed ensemble classifier,MLDE,was built to detect network malicious traffic.In the MLDE ensemble framework the base classifier was used at the bottom,while the non-bottom different ensemble classifiers were used.The framework was simple to be built.In the framework,big data sets were concurrently processed,and the size of ensemble classifier was adjusted according to the size of data sets.The experimental results show that the AUC value can reach 0.999 when MLDE base users random forest was used in the first layer,bagging was used in the second layer and AdaBoost classifier was used in the third layer.…”
    Get full text
    Article
  9. 2869

    Collaborative Control of the Frequency and Opening of Electronic Expansion Valve in Variable Refrigerant Flow Refrigeration System by He Jun, Tao Leren, Hu Pengrong

    Published 2019-01-01
    “…By changing the compressor frequency and opening of the electronic expansion valve, a curve fitting model under a separate control of the two processes was established. …”
    Get full text
    Article
  10. 2870
  11. 2871
  12. 2872

    Improving the Memory through Singing Method of Children Ages 5 - 6 Years in Kindergarten Insan Pandhega by Meta Br Ginting

    Published 2019-11-01
    “…This study was successful if the memory of children who reached the criteria of developing well and developing very well reached more than 75%. …”
    Article
  13. 2873

    Invasive urodynamic investigations in the management of women with refractory overactive bladder symptoms: FUTURE, a superiority RCT and economic evaluation by Mohamed Abdel-Fattah, Christopher Chapple, Suzanne Breeman, David Cooper, Helen Bell-Gorrod, Preksha Kuppanda, Karen Guerrero, Simon Dixon, Nikki Cotterill, Karen Ward, Hashim Hashim, Ash Monga, Karen Brown, Marcus Drake, Andrew Gammie, Alyaa Mostafa, Rebecca Bruce, Victoria Bell, Christine Kennedy, Suzanne Evans, Graeme MacLennan, John Norrie

    Published 2025-07-01
    “…To estimate longer-term economic differences, a hybrid model with a decision tree describing short-term events and Markov processes describing long-term events was developed using external evidence that captures clinical and patient events beyond the end of the trial. …”
    Get full text
    Article
  14. 2874

    Digitalization as a Factor for Development of the Target Arctic Subspaces by Alexey M. Fadeev, Igor V. Ilin, Anastasia I. Levina, Alissa S. Dubgorn, Polina A. Rukina

    Published 2025-03-01
    “…Based on the analysis of the collected and summarized materials, seven models of motivational extensions were constructed for each of the identified Arctic subspaces, summarizing information about the goal-setting of each subspace. …”
    Get full text
    Article
  15. 2875

    Experimental and simulation study on micro damage of HTPB propellant under multi angle tensile shear loading by Wang Jiaxiang, Qiang Hongfu, Pei Shudi, Li Shiqi

    Published 2025-07-01
    “…When the side length of RVE reaches and exceeds 600 μm, the porosity tends to stabilize. …”
    Get full text
    Article
  16. 2876

    CSI-based symmetric encryption end-to-end communication system by Yongli AN, Zongrui LI, Haifei BAI, Xueyu MI

    Published 2025-08-01
    “…The proposed system employed convolutional neural networks to construct the transmitter, receiver, and key generator, optimizing the encoding and decoding process in an end-to-end manner. At the same time, it leveraged the reciprocity, random time-variability, and spatial uniqueness of wireless channels to measure the CSI and generate keys from legitimate users, encrypting the original information. …”
    Get full text
    Article
  17. 2877

    Decarbonization of the Romanian Economy: An ARDL and KRLS Approach of Ecological Footprint by Dan Ioan Topor, Andreea Marin-Pantelescu, Adela Socol, Oana Raluca Ivan

    Published 2022-08-01
    “…The mechanisms developed at the European level through the Green Deal, to achieve the assumed decarbonization process, are facing major challenges to reach climate neutrality of the EU in a clean and circular economy by 2050. …”
    Get full text
    Article
  18. 2878

    RCS Special Analysis Method for Non-Cooperative Aircraft Based on Inverse Reconfiguration Coupled with Aerodynamic Optimization by Guoxu Feng, Chuan Wei, Jie Huang, Juyi Long, Yang Bai

    Published 2025-06-01
    “…This approach integrates data fusion techniques to facilitate an initial shape reconstruction, followed by an iterative optimization process that utilizes computational fluid dynamics (CFD) to enhance the shape, accounting for the aerodynamic performance. …”
    Get full text
    Article
  19. 2879

    Investigating Cyclic and Pushover Performance of Different Metallic Yielding Dampers by Ali Mohammad Rousta, Sohrab Shoja, Masoud Amin Safaei Ardakani

    Published 2023-08-01
    “…In this research, different types of metallic dampers are compared using finite element simulation which is performed by means of ABAQUS package. Modeling process is described and verified by comparing the results to a previously published experimental paper on the subject. …”
    Get full text
    Article
  20. 2880

    Forming a dualistic system in the Habsburg Empire: prerequisites and peculiarities of building new relations between Austria and Hungary by B. A. Vinogradnyi

    Published 2024-11-01
    “…The war only accelerated this process and contributed to the formation of the dualistic system. …”
    Get full text
    Article