Showing 21,861 - 21,880 results of 22,513 for search '"mathematics"', query time: 0.09s Refine Results
  1. 21861

    THE METHOD OF CALCULATION AND ANALYSIS OF HEAT TRANSFER COEFFICIENT OF BIMETALLIC FINNED TUBES OF AIR COOLING UNITS WITH IRREGULAR EXTERNAL CONTAMINATION by V. V. Dudarev, S. O. Filatаu, T. B. Karlovich

    Published 2017-05-01
    “…The suggested method is based on a mathematical model developed with the use of the method of electrothermal analogy, whereby the heat flow through the wall of the finned tube is considered as divided into two components, viz. through the annular layer of outside contamination adjacent to the base of the ribs, and through the remaining part of the external ribbed surface covered with a thin layer of pollution. …”
    Get full text
    Article
  2. 21862
  3. 21863

    An Overview of Experiments and Numerical Simulations on Airflow and Aerosols Deposition in Human Airways and the Role of Bioaerosol Motion in COVID-19 Transmission by Justus Kavita Mutuku, Wen-Che Hou, Wei-Hsin Chen

    Published 2020-05-01
    “…A brief introduction of the application of one-dimensional and two-dimensional mathematical models to investigate airflow and particle motion in the lungs are further discussed. …”
    Get full text
    Article
  4. 21864

    THE DEMAND FOR VIDEO CONTENT AMONG STUDENT YOUTH IN MODERN SOCIETY by Ekaterina V. Baranova, Yulia R. Guro-Frolova, Elena G. Sokolova

    Published 2024-12-01
    “…The research is based on statistical and mathematical methods of data collecting and processing. …”
    Get full text
    Article
  5. 21865

    Evaluation of Biocoagulant “Opuntia ficus-indica and Chitosan” to Improve the Removal of Contaminants in Dairy Effluents through Electrocoagulation by Naysha Y. M. Elguera, Stephanie E. S. Pulcha, Edgar M. M. Ballon, Miriam R. F. Castro, Lilia M. M. Ramos, Victor L. A. Tohalino, Pavel K. D. Sarmiento, Vitor C. Almeida, Hugo G. J. Pacheco

    Published 2024-01-01
    “…Additionally, using the Box–Behnken mathematical model for the removal of TB and COD, the effects and interactions of the factors and experimental design levels (considering control formulations using triplicates) were evaluated. …”
    Get full text
    Article
  6. 21866

    Assessing Gender Dimorphism Indicators in Anthropometric Characteristics and Features of the Bony Pelvis of Female Representatives of Pair and Group Types in Sports Acrobatics by Nataliia Veronika Bachynska, Eduard Doroshenko, Andrii Svatiev, Victor Bohuslavskyi

    Published 2025-01-01
    “…The research methods employed included the measurements of body length (cm), body weight (kg), shoulder width (cm), determination of body mass index (conventional unit); pelvimetry was performed to detect the transverse and longitudinal dimensions of the bony pelvis, as well as the degree of maturity of the pelvic bones using the index of pelvic bone (IPB). The methods of mathematical statistics were used to gain a comprehensive understanding of the data. …”
    Get full text
    Article
  7. 21867

    Design and analysis of intelligent service chain system for network security resource pool by Zenan WANG, Jiahao LI, Chaohong TAN, Dechang PI

    Published 2022-08-01
    “…The traditional network security architecture ensures network security by directing traffic through hardware based network security function devices.Since the architecture consists of fixed hardware devices, it leads to a single form of network security area deployment and poor scalability.Besides, the architecture cannot be flexibly adjusted when facing network security events, making it difficult to meet the security needs of future networks.The intelligent service chain system for network security resource pool was based on software-defined network and network function virtualization technologies, which can effectively solve the above problems.Network security functions of virtual form were added based on network function virtualization technology, combined with the existing hardware network elements to build a network security resource pool.In addition, the switching equipment connected to the network security elements can be flexibly controlled based on software-defined network technology.Then a dynamically adjustable network security service chain was built.Network security events were detected based on security log detection and a expert library consisting of security rules.This enabled dynamic and intelligent regulation of the service chain by means of centralized control in the face of network security events.The deployment process of the service chain was mathematically modeled and a heuristic algorithm was designed to realize the optimal deployment of the service chain.By building a prototype system and conducting experiments, the results show that the designed system can detect security events in seconds and automatically adjust the security service chain in minutes when facing security events, and the designed heuristic algorithm can reduce the occupation of virtual resources by 65%.The proposed system is expected to be applied to the network security area at the exit of the campus and data center network, simplifying the operation and maintenance of this area and improving the deployment flexibility of this area.…”
    Get full text
    Article
  8. 21868

    An intuitionistic fuzzy extension to RAMS-RATMI methods for optimizing electrical discharge machining processes by Srinjoy Chatterjee, Shankar Chakraborty

    Published 2025-03-01
    “…Multi-Criteria Decision-Making (MCDM) approaches have emerged as competent mathematical tools capable of handling multiple input factors and their interactions with numerous conflicting responses to figure out the ideal EDM process parameter values. …”
    Get full text
    Article
  9. 21869

    Variable power functional dilution adjustment of spot urine by Thomas Clemens Carmine

    Published 2025-01-01
    “…Based on extensive urinary total weight arsenic data (n = 5,553), the mathematical derivation of these coefficients is detailed in this paper and forms the foundation of the corrective V-PFCRC formulas. …”
    Get full text
    Article
  10. 21870

    Applying fractional calculus to malware spread: A fractal-based approach to threat analysis. by Nausheen Razi, Muhammad Bilal Riaz, Ambreen Bano, Tayyab Kamran, Umar Ishtiaq, Anum Shafiq

    Published 2025-01-01
    “…Software varies due to types of malware and is developed on structure of malware with a deep insight on behavior of nodes. We selected a mathematical malware propagation model having variable infection rate. …”
    Get full text
    Article
  11. 21871

    Recalculating national occurrence of microplastics in China’s freshwater by Dongyu Xu, Bo Gao

    Published 2025-01-01
    “…In this paper, we developed a mathematical method to align the abundance of microplastics into the same size range. …”
    Get full text
    Article
  12. 21872

    Development and Validation of 3D Finite Element Models for Prediction of Orthodontic Tooth Movement by Udomsak Likitmongkolsakul, Pruittikorn Smithmaitrie, Bancha Samruajbenjakun, Juthatip Aksornmuang

    Published 2018-01-01
    “…Data from the first patient were used to analyze the tooth movement pattern and develop a mathematical formula for the second patient. Calculated orthodontic tooth movement of the second patient was compared to the clinical outcome. …”
    Get full text
    Article
  13. 21873

    The effectiveness of using some criteria for determining adaptability on the example of winter rye cultivars by I. V. Safonova, N. I. Aniskov

    Published 2023-07-01
    “…Therefore, measuring the level of adaptability for yields in different mathematical quantities using a variety of methods is an urgent need.   …”
    Get full text
    Article
  14. 21874

    GIS BASED DECISION SUPPORT SYSTEM FOR SEISMIC RISK IN BUCHAREST. CASE STUDY – THE HISTORICAL CENTRE by DIANA GHEORGHE, IULIANA ARMAS

    Published 2015-09-01
    “…A limitation of this method is that, regardless of the mathematical results, the final decision has to be made by the decision maker. …”
    Get full text
    Article
  15. 21875

    Experimental dataset of a model-scale ship in calm water and wavesUniversity of Southampton Institutional Repository by Saeed Hosseinzadeh, Stephen Turnock, Haesol Lee, Rodolfo Olvera

    Published 2025-02-01
    “…This comprehensive series of experiments offers a benchmark for future research endeavours, providing a foundation for refining subsequent experiments, validating numerical methods, and enhancing mathematical models.…”
    Get full text
    Article
  16. 21876

    Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition by Xiaomeng LI, Daidou GUO, Xunfang ZHUO, Heng YAO, Chuan QIN

    Published 2023-06-01
    “…Financial security, an important part of national security, is critical for the stable and healthy development of the economy.Digital image watermarking technology plays a crucial role in the field of financial information security, and the anti-screen watermarking algorithm has become a new research focus of digital image watermarking technology.The common way to achieve an invisible watermark in existing watermarking schemes is to modify the carrier image, which is not suitable for all types of images.To solve this problem, an end-to-end robust watermarking scheme based on deep learning was proposed.The algorithm achieved both visual quality and robustness of the watermark image.A random binary string served as the input of the encoder network in the proposed end-to-end network architecture.The encoder can generate the watermark information overlay, which can be attached to any carrier image after training.The ability to resist screen shooting noise was learned by the model through mathematical methods incorporated in the network to simulate the distortion generated during screen shooting.The visual quality of the watermark image was further improved by adding the image JND loss based on just perceptible difference.Moreover, an embedding hyperparameter was introduced in the training phase to balance the visual quality and robustness of the watermarked image adaptively.A watermark model suitable for different scenarios can be obtained by changing the size of the embedding hyperparameter.The visual quality and robustness performance of the proposed scheme and the current state-of-the-art algorithms were evaluated to verify the effectiveness of the proposed scheme.The results show that the watermark image generated by the proposed scheme has better visual quality and can accurately restore the embedded watermark information in robustness experiments under different distances, angles, lighting conditions, display devices, and shooting devices.…”
    Get full text
    Article
  17. 21877

    Experimental Research on Fracture Characteristics of Reactive Powder Concrete in Different Volume Content of Steel Fiber by Wenzhen Wang, Haixiao Lin, Xiaogang Wu, Yuyao Zhao, Ziyu Hu, Pengshuai Wang, Menglong Zhou

    Published 2022-01-01
    “…The fracture characteristics of reactive powder concrete in different volume content of steel fiber are researched in this paper, combining with the photoelastic coating method and the mathematical analytical software MATLAB. More precisely, the wholly integrated initiation, stable propagation, and final failure stages of precast cracks in three-point bending specimens of reactive powder concrete in different volume content of steel fiber are directly recorded and systematically analyzed. …”
    Get full text
    Article
  18. 21878

    Semiactive Vibration Control for Horizontal Axis Washing Machine by Barış Can Yalçın, Haluk Erol

    Published 2015-01-01
    “…A motion (gyroscope and accelerometer) sensor is installed on the top-front panel of the washing machine because a mathematical model of a horizontal axis washing machine suggests that the walking behavior starts around this location under some assumptions, and therefore, calculating the vibrations occurring there is crucial. …”
    Get full text
    Article
  19. 21879

    Measurement and Numerical Simulation of Ground and Subgrade Vibrations of Beijing Urban Rail Line 13 by Futong Wang, Leilei Yan, Qi Jiang, Xiaxin Tao

    Published 2020-01-01
    “…In this paper, we investigate the vibration of the ground and the subgrade next to the Beijing Urban Rail Line 13 by a field measurement combined with a mathematical model. The duration of ground vibration is divided into two parts: the train passing time and the Doppler effect-related tailing part. …”
    Get full text
    Article
  20. 21880

    The rationale, design of the Assisted reproductive technology cohort nested in a pre-pregnancy family cohort (APP-Cohort) by Wei Xiong, Qinghan Liang, Xiaojie Han, Qiaolu Cheng, Qihang Liu, Xifang Zuo, Huiyu Wang, Huijing He, Guangliang Shan

    Published 2025-12-01
    “…By utilizing practical experience and advanced mathematical analysis of the extensive data, the APP-Cohort study will provide valuable insights to promote the administration and success rate of ART in China.…”
    Get full text
    Article