Suggested Topics within your search.
Suggested Topics within your search.
- Mathematics 20
- Calculus 6
- Engineering mathematics 6
- Mathematical analysis 5
- Mathematical statistics 5
- Business mathematics 4
- Engineering 3
- MATHEMATICS / Mathematical Analysis 3
- Mathematical models 3
- Algebra, Abstract 2
- Application software 2
- Computer-assisted instruction 2
- Data processing 2
- Differential equations 2
- Education, Elementary 2
- Educational technology 2
- Functional differential equations 2
- Geometry, Analytic 2
- History 2
- Internet in education 2
- Number theory 2
- Numerical analysis 2
- Probabilities 2
- Problems, exercises, etc 2
- Study and teaching 2
- mathematics 2
- Analysis 1
- Anesthesia 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
-
21861
THE METHOD OF CALCULATION AND ANALYSIS OF HEAT TRANSFER COEFFICIENT OF BIMETALLIC FINNED TUBES OF AIR COOLING UNITS WITH IRREGULAR EXTERNAL CONTAMINATION
Published 2017-05-01“…The suggested method is based on a mathematical model developed with the use of the method of electrothermal analogy, whereby the heat flow through the wall of the finned tube is considered as divided into two components, viz. through the annular layer of outside contamination adjacent to the base of the ribs, and through the remaining part of the external ribbed surface covered with a thin layer of pollution. …”
Get full text
Article -
21862
Integrated transmission expansion planning incorporating fault current limiting devices and thyristor-controlled series compensation using meta-heuristic optimization techniques
Published 2024-06-01“…The optimization of TEP is a complex challenge, necessitating the application of mathematical programming techniques and meta-heuristics. …”
Get full text
Article -
21863
An Overview of Experiments and Numerical Simulations on Airflow and Aerosols Deposition in Human Airways and the Role of Bioaerosol Motion in COVID-19 Transmission
Published 2020-05-01“…A brief introduction of the application of one-dimensional and two-dimensional mathematical models to investigate airflow and particle motion in the lungs are further discussed. …”
Get full text
Article -
21864
THE DEMAND FOR VIDEO CONTENT AMONG STUDENT YOUTH IN MODERN SOCIETY
Published 2024-12-01“…The research is based on statistical and mathematical methods of data collecting and processing. …”
Get full text
Article -
21865
Evaluation of Biocoagulant “Opuntia ficus-indica and Chitosan” to Improve the Removal of Contaminants in Dairy Effluents through Electrocoagulation
Published 2024-01-01“…Additionally, using the Box–Behnken mathematical model for the removal of TB and COD, the effects and interactions of the factors and experimental design levels (considering control formulations using triplicates) were evaluated. …”
Get full text
Article -
21866
Assessing Gender Dimorphism Indicators in Anthropometric Characteristics and Features of the Bony Pelvis of Female Representatives of Pair and Group Types in Sports Acrobatics
Published 2025-01-01“…The research methods employed included the measurements of body length (cm), body weight (kg), shoulder width (cm), determination of body mass index (conventional unit); pelvimetry was performed to detect the transverse and longitudinal dimensions of the bony pelvis, as well as the degree of maturity of the pelvic bones using the index of pelvic bone (IPB). The methods of mathematical statistics were used to gain a comprehensive understanding of the data. …”
Get full text
Article -
21867
Design and analysis of intelligent service chain system for network security resource pool
Published 2022-08-01“…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
Get full text
Article -
21868
An intuitionistic fuzzy extension to RAMS-RATMI methods for optimizing electrical discharge machining processes
Published 2025-03-01“…Multi-Criteria Decision-Making (MCDM) approaches have emerged as competent mathematical tools capable of handling multiple input factors and their interactions with numerous conflicting responses to figure out the ideal EDM process parameter values. …”
Get full text
Article -
21869
Variable power functional dilution adjustment of spot urine
Published 2025-01-01“…Based on extensive urinary total weight arsenic data (n = 5,553), the mathematical derivation of these coefficients is detailed in this paper and forms the foundation of the corrective V-PFCRC formulas. …”
Get full text
Article -
21870
Applying fractional calculus to malware spread: A fractal-based approach to threat analysis.
Published 2025-01-01“…Software varies due to types of malware and is developed on structure of malware with a deep insight on behavior of nodes. We selected a mathematical malware propagation model having variable infection rate. …”
Get full text
Article -
21871
Recalculating national occurrence of microplastics in China’s freshwater
Published 2025-01-01“…In this paper, we developed a mathematical method to align the abundance of microplastics into the same size range. …”
Get full text
Article -
21872
Development and Validation of 3D Finite Element Models for Prediction of Orthodontic Tooth Movement
Published 2018-01-01“…Data from the first patient were used to analyze the tooth movement pattern and develop a mathematical formula for the second patient. Calculated orthodontic tooth movement of the second patient was compared to the clinical outcome. …”
Get full text
Article -
21873
The effectiveness of using some criteria for determining adaptability on the example of winter rye cultivars
Published 2023-07-01“…Therefore, measuring the level of adaptability for yields in different mathematical quantities using a variety of methods is an urgent need. …”
Get full text
Article -
21874
GIS BASED DECISION SUPPORT SYSTEM FOR SEISMIC RISK IN BUCHAREST. CASE STUDY – THE HISTORICAL CENTRE
Published 2015-09-01“…A limitation of this method is that, regardless of the mathematical results, the final decision has to be made by the decision maker. …”
Get full text
Article -
21875
Experimental dataset of a model-scale ship in calm water and wavesUniversity of Southampton Institutional Repository
Published 2025-02-01“…This comprehensive series of experiments offers a benchmark for future research endeavours, providing a foundation for refining subsequent experiments, validating numerical methods, and enhancing mathematical models.…”
Get full text
Article -
21876
Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition
Published 2023-06-01“…Financial security, an important part of national security, is critical for the stable and healthy development of the economy.Digital image watermarking technology plays a crucial role in the field of financial information security, and the anti-screen watermarking algorithm has become a new research focus of digital image watermarking technology.The common way to achieve an invisible watermark in existing watermarking schemes is to modify the carrier image, which is not suitable for all types of images.To solve this problem, an end-to-end robust watermarking scheme based on deep learning was proposed.The algorithm achieved both visual quality and robustness of the watermark image.A random binary string served as the input of the encoder network in the proposed end-to-end network architecture.The encoder can generate the watermark information overlay, which can be attached to any carrier image after training.The ability to resist screen shooting noise was learned by the model through mathematical methods incorporated in the network to simulate the distortion generated during screen shooting.The visual quality of the watermark image was further improved by adding the image JND loss based on just perceptible difference.Moreover, an embedding hyperparameter was introduced in the training phase to balance the visual quality and robustness of the watermarked image adaptively.A watermark model suitable for different scenarios can be obtained by changing the size of the embedding hyperparameter.The visual quality and robustness performance of the proposed scheme and the current state-of-the-art algorithms were evaluated to verify the effectiveness of the proposed scheme.The results show that the watermark image generated by the proposed scheme has better visual quality and can accurately restore the embedded watermark information in robustness experiments under different distances, angles, lighting conditions, display devices, and shooting devices.…”
Get full text
Article -
21877
Experimental Research on Fracture Characteristics of Reactive Powder Concrete in Different Volume Content of Steel Fiber
Published 2022-01-01“…The fracture characteristics of reactive powder concrete in different volume content of steel fiber are researched in this paper, combining with the photoelastic coating method and the mathematical analytical software MATLAB. More precisely, the wholly integrated initiation, stable propagation, and final failure stages of precast cracks in three-point bending specimens of reactive powder concrete in different volume content of steel fiber are directly recorded and systematically analyzed. …”
Get full text
Article -
21878
Semiactive Vibration Control for Horizontal Axis Washing Machine
Published 2015-01-01“…A motion (gyroscope and accelerometer) sensor is installed on the top-front panel of the washing machine because a mathematical model of a horizontal axis washing machine suggests that the walking behavior starts around this location under some assumptions, and therefore, calculating the vibrations occurring there is crucial. …”
Get full text
Article -
21879
Measurement and Numerical Simulation of Ground and Subgrade Vibrations of Beijing Urban Rail Line 13
Published 2020-01-01“…In this paper, we investigate the vibration of the ground and the subgrade next to the Beijing Urban Rail Line 13 by a field measurement combined with a mathematical model. The duration of ground vibration is divided into two parts: the train passing time and the Doppler effect-related tailing part. …”
Get full text
Article -
21880
The rationale, design of the Assisted reproductive technology cohort nested in a pre-pregnancy family cohort (APP-Cohort)
Published 2025-12-01“…By utilizing practical experience and advanced mathematical analysis of the extensive data, the APP-Cohort study will provide valuable insights to promote the administration and success rate of ART in China.…”
Get full text
Article