Suggested Topics within your search.
Suggested Topics within your search.
- Economic policy 3
- Mathematical models 3
- Application software 2
- Computer-assisted instruction 2
- Economic development 2
- Education, Elementary 2
- Educational technology 2
- English language 2
- Information technology 2
- Internet in education 2
- Internet in public administration 2
- Management 2
- Public administration 2
- Regression analysis 2
- Research 2
- School management and organization 2
- methods 2
- Academic writing 1
- Agriculture 1
- Anxiety Disorders 1
- Bibliotheken 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Building 1
- Building information modeling 1
- Business Planning 1
- Business and Management 1
- Calculus 1
-
1101
Gompertz model with delays and treatment: Mathematical analysis
Published 2013-03-01Subjects: Get full text
Article -
1102
APPLYING THE AUTOENCODER MODEL FOR URL PHISHING DETECTION
Published 2024-12-01“…This paper proposes an improved two-stage deep learning model using an Autoencoder network for phishing URL detection. …”
Get full text
Article -
1103
Elastic-viscoplastic deformation models of salt rocks
Published 2024-08-01Subjects: Get full text
Article -
1104
Models, measurement and inference in epithelial tissue dynamics
Published 2015-07-01Subjects: Get full text
Article -
1105
Sustainability models in Zone 3 manufacturing SMEs
Published 2025-01-01“… In this research, the objective was to determine the optimal financial sustainability model for manufacturing SMEs in zone 3 for the years 2017 - 2020. …”
Get full text
Article -
1106
Modeling of spatio-temporal of albedo over Iran
Published 2017-12-01Subjects: Get full text
Article -
1107
Models for Natural Killer Cell Repertoire Formation
Published 2003-01-01“…In this study we implement both models in computer simulations, and compare simulation results to experimental data, in order to evaluate the relative plausibility of the two models.…”
Get full text
Article -
1108
The Model of Disengagement of Talent with Meta-synthesis Method
Published 2024-11-01“…Consequently, the current research was undertaken with the aim of identifying and modeling the antecedents and consequences of talent disengagement in organizations. …”
Get full text
Article -
1109
-
1110
PHYSICAL MODEL OF THE COMPOUND FOR THE UNIFIED AGGLUTINANT SANDS
Published 2004-02-01Get full text
Article -
1111
Developmental Defects in Trisomy 21 and Mouse Models
Published 2006-01-01“…This review focuses on the developmental defects of murine models of a prototype human aneuploidy: trisomy 21 (Down syndrome, DS, T21). …”
Get full text
Article -
1112
Thermodynamic modeling of the Fe-Mg-Si system
Published 2007-01-01“…A thermo dynamic modeling for the Fe-Mg-Si system is conducted. All of the experimental phase diagram and thermodynamic data available from the literature are critically reviewed and assessed using thermo dynamic models for the Gibbs energies of individual phases. …”
Get full text
Article -
1113
TEXTS OF DIFFERENT EMOTIONAL CLASSES AND THEIR TOPIC MODELING
Published 2024-11-01Subjects: Get full text
Article -
1114
The Sunk Cost and the Real Option Pricing Model
Published 2021-01-01“…Although the academic literature on real options has grown enormously over the past three decades, hitherto an accurate real option pricing model has not been developed for investment decision analyses. …”
Get full text
Article -
1115
Analysis of software defined security model and architecture
Published 2017-06-01“…Currently,most enterprises have deployed information security defense system based on policy access control.With cloud computing environment deployment and network attacking technology development,security has been regarded as one of the greatest problems in the cloud computing environment.The advanced persistent attacks including of bypassing the traditional firewall easily,breaking through the black and white list and feature matching of the security defense mechanism have included to the traditional security system new challenges.The problem in the traditional tightly coupled security defense system of combining the virtual with the true for construction of network environments was described,and a software defined security model and framework was provided.The decoupling scheme of access patterns and deployment position in combining the virtual with the true for construction of network environments was realized,which provided a beneficial exploration in the field of the adaptive active safety for enterprise cloud computing environment.…”
Get full text
Article -
1116
Viscosity model for fully liquid silicate melt
Published 2012-01-01“…A model for estimating the viscosity of silicate melt as derived in our previous paper is extended to the system containing MgO, CaO, SrO, BaO, Li2O, Na2O, K2O, which can express the nonlinear variation of activation energy of viscosity with the composition. …”
Get full text
Article -
1117
A mathematical model of the Purkinje-Muscle Junctions
Published 2011-07-01“…This paper is devoted to the construction of a mathematical model of the His-Purkinje tree and the Purkinje-Muscle Junctions (PMJ). …”
Get full text
Article -
1118
-
1119
Development of Asthma Mouse Model By Dermal Sensitization
Published 2024-12-01Subjects: Get full text
Article -
1120
Study on the Modeling of Vehicle Self- excited Shimmy
Published 2015-01-01“…Aiming at the current situation of existing vehicle dynamics model does not have the ability to accurate simulate the dynamic process of vehicle shimmy,a vehicle model is developed for simulation of the dynamics process of vehicle self- excited shimmy. …”
Get full text
Article