Showing 441 - 460 results of 78,466 for search '"model"', query time: 0.10s Refine Results
  1. 441
  2. 442

    -Advanced Models for Tsunami and Rogue Waves by D. W. Pravica, N. Randriampiry, M. J. Spurr

    Published 2012-01-01
    “…A wavelet , that satisfies the q-advanced differential equation for , is used to model N-wave oscillations observed in tsunamis. Although q-advanced ODEs may seem nonphysical, we present an application that model tsunamis, in particular the Japanese tsunami of March 11, 2011, by utilizing a one-dimensional wave equation that is forced by . …”
    Get full text
    Article
  3. 443

    A model for asymmetrical cell division by Ali Ashher Zaidi, Bruce Van Brunt, Graeme Charles Wake

    Published 2014-12-01
    “…We present a model that describes the growth, division and death of a cell population structured by size. …”
    Get full text
    Article
  4. 444

    Criticism of the Classical Theory of Macroeconomic Modeling by K. K. Kumehov

    Published 2015-10-01
    Subjects: “…macroeconomic model…”
    Get full text
    Article
  5. 445
  6. 446

    Hybrid Models for Weather Parameter Forecasting by Rashmi Bhardwaj, Varsha Duhoon

    Published 2021-01-01
    “…The objective of the paper is to compare hybrid conjunction models with conventional models for the reduction of errors in weather forecasting. …”
    Get full text
    Article
  7. 447
  8. 448

    Transformasi Ontologi ke Model Dimensional by Parmonangan R. Togatorop, Christina Simanjuntak, Christine Nababan, Genii Silitonga

    Published 2022-02-01
    “…Data warehouse  adalah salah satu komponen penting untuk analisis bisnis yang efektif. Salah satu model pada data warehouse adalah dimensional model yang banyak digunakan karena performa permrosesan yang lebih cepat dari model lain. …”
    Get full text
    Article
  9. 449

    Econometric modelling of the Lithuanian economic indicators by Žilvinas Kalinauskas

    Published 1999-12-01
    “… The paper is devoted to model relations between Lithuanian indicators of production, foreign trade, income and prices and to present short-term forecasts. …”
    Get full text
    Article
  10. 450

    Evaluation of seismic mitigation of embankment model by Abdoullah Namdar

    Published 2009-04-01
    “…Conducting experiment on embankment model by shaking table could be an accurate method to evaluate the behavior of embankment or any structures under seismic loading. …”
    Get full text
    Article
  11. 451

    Models for estimating the efficiencies of forest enterprises by Janina Kaminskienė, Eligijus Laurinavičius

    Published 2004-12-01
    “… A data envelopment analysis (DEA) application in evaluating the efficiency is presented. The models for estimating productive and resource efficiencies of forest enterprises are used. …”
    Get full text
    Article
  12. 452
  13. 453

    Simulacra of emptiness. The model as habitable space by Elena Mucelli

    Published 2020-06-01
    Subjects: “…model…”
    Get full text
    Article
  14. 454
  15. 455

    A Generalized Solow-Swan Model by Donghan Cai, Hui Ye, Longfei Gu

    Published 2014-01-01
    “…We set up a generalized Solow-Swan model to study the exogenous impact of population, saving rate, technological change, and labor participation rate on economic growth. …”
    Get full text
    Article
  16. 456

    Pathophysiological Models of Hypersomnolence Associated With Depression by Christophe Moderie, Diane B. Boivin

    Published 2025-03-01
    “…In this review, we aimed to summarize the different pathophysiological models of hypersomnolence in depression to discuss their impact on nosology and to foster the development of better tailored diagnostics and treatments. …”
    Get full text
    Article
  17. 457
  18. 458

    Android collusion attack detection model by Hongyu YANG, Zaiming WANG

    Published 2018-06-01
    “…In order to solve the problem of poor efficiency and low accuracy of Android collusion detection,an Android collusion attack model based on component communication was proposed.Firstly,the feature vector set was extracted from the known applications and the feature vector set was generated.Secondly,the security policy rule set was generated through training and classifying the privilege feature set.Then,the component communication finite state machine according to the component and communication mode feature vector set was generated,and security policy rule set was optimized.Finally,a new state machine was generated by extracting the unknown application’s feature vector set,and the optimized security policy rule set was matched to detect privilege collusion attacks.The experimental results show that the proposed model has better detective efficiency and higher accuracy.…”
    Get full text
    Article
  19. 459

    An Investigation into the Modeling Methodology of the Coil Spring by Liangcheng Dai, Maoru Chi, Hongxing Gao, Jianfeng Sun

    Published 2020-01-01
    “…The frequency-sweep method is applied to obtain the dynamic response of the proposed models of coil spring, and the accuracy of the models’ results has been compared and verified by the laboratory test. …”
    Get full text
    Article
  20. 460