Suggested Topics within your search.
Suggested Topics within your search.
- Health 8
- Constitutional court 7
- Court of Appeal 6
- Supreme court 6
- Judgement and orders 5
- Law reports, digests, etc 5
- Physical fitness 5
- Research 5
- methods 5
- Consumers 4
- Conversation analysis 4
- High court 4
- Judgements and orders 4
- Court of appeal 3
- Economic aspects 3
- History and criticism 3
- Mathematics 3
- Agriculture 2
- Anesthesia 2
- Anesthetics 2
- Biochemistry 2
- Chemistry 2
- Chemistry, Clinical 2
- Commercial law 2
- Court Bulletin 2
- Drug Dosage Calculations 2
- English language 2
- French language 2
- Health and Fitness 2
- Information technology 2
-
18661
Defect modeling in semiconductors: the role of first principles simulations and machine learning
Published 2025-01-01“…DFT has been instrumental in accurately calculating defect formation energies, charge transition levels, and other defect-related properties such as carrier recombination rates and lifetimes, and ion migration barriers. …”
Get full text
Article -
18662
Influence of aluminium distribution on the diffusion mechanisms and pairing of [Cu(NH3)2]+ complexes in Cu-CHA
Published 2025-01-01“…Performing unbiased and constrained molecular dynamics simulations, we obtain unique information inaccessible to first-principle calculations and experiments. The free energy barrier for $${[{{{\rm{Cu}}}}{({{{{\rm{NH}}}}}_{3})}_{2}]}^{+}$$ [ Cu ( NH 3 ) 2 ] + diffusion between CHA-cages depends sensitively on both the local and distant Al-distribution. …”
Get full text
Article -
18663
A Predictive Model of Mining Collapse Extent and Its Application
Published 2019-01-01“…The slipping line angle increases along with uniform force Q and is inversely proportional to the bending stiffness. Meanwhile, the calculation formula for the maximum subsidence of ore body was deduced. (2) Numerical results can be used to determine the basic form of the collapse area, and a “U-shaped” collapse area formed when a plastic area passed completely through, resulting in the overall destruction. (3) The grouting reinforcement program includes “determining the instability region ⟶ roadway temporary support ⟶ improve the water environment and surrounding rock bearing capacity ⟶ mining planning” which were determined on the basis of prediction. (4) The hierarchical structure of the rock body and filling were improved combined with the Delphi method, and the grouting effect evaluation model was constructed and verified using the improved FD-AHP method; the evaluation value indicating that the grouting reinforcement improved the bearing capacity of ore body and filling body in collapse area. …”
Get full text
Article -
18664
Model analysis of a simple aquatic ecosystems with sublethal toxic effects
Published 2008-09-01“…A numerical continuation technique to calculate the boundaries of these regions will be given.…”
Get full text
Article -
18665
Multiobjective Optimization Design and Performance Prediction of Centrifugal Pump Based on Orthogonal Test
Published 2018-01-01“…The weight of each test factor on the optimization index was calculated by weight matrix, and a set of optimal schemes was obtained. …”
Get full text
Article -
18666
Awareness of anaphylaxis among public in Al-Ahsa City of Saudi Arabia: A cross-sectional study.
Published 2024-01-01“…Descriptive statistics were calculated, and associations were tested. We analyzed the data using SPSS software.…”
Get full text
Article -
18667
The Impacts of Blue Stain Degradation on the Industrial Processing Properties of logs
Published 2018-12-01“…In this study, the size of the blue stain degradation was evaluated by calculating the total volume of the log. On the other hand, comparisons regarding blue stain degradation have been carried out between the managements that conduct productions intended for the construction and woodworking sectors. …”
Get full text
Article -
18668
Demographic and clinical characteristics and effectiveness of treatment of patients with combined ocular pathologies by vitrectomy due to retinal detachment
Published 2024-10-01“…The collected data were grouped by variants of features, the specific weight of each group and subgroup in the aggregate was calculated. The obtained data showed that in 197 (34.9±2.2%) patients with retinal detachment against the background of combined pathologies who underwent vitrectomy, the gender difference was not significant. …”
Get full text
Article -
18669
Can the monocyte/HDL ratio predict ear effusion in adenoid vegetation patients?
Published 2025-01-01“…Monocyte counts, HDL-C levels, and MHR values were calculated for both groups. Results The mean age of Group 1 was 6.95 ± 2.77 years, while Group 2 had a mean age of 6.61 ± 2.98 years. …”
Get full text
Article -
18670
Prevalence of Cardiovascular Disease Risk Factors in the Women Population Covered by Health Centers in Ardabil
Published 2022-01-01“…In the first stage, health centers in Ardabil were divided into five geographical areas, and the population covered by each of the five areas was calculated. In the second stage, the number of samples was allocated as a quota in the regions, and in the third stage, in proportion to the population covered by each center in Ardabil, the samples were selected. …”
Get full text
Article -
18671
Anomaly Detection for Time Series with Difference Rate Sample Entropy and Generative Adversarial Networks
Published 2021-01-01“…Because the difference rate entropy feature of abnormal data was much larger than that of normal mode, this paper improved the calculation method of the abnormal score by giving different weights to the detection points to enhance the detection rate. …”
Get full text
Article -
18672
Estimating the Climate-Controlled Soil Parameters and the Distorted Mound Shape for Analysis of Stiffened Rafts on Expansive Soils
Published 2024-01-01“…The proposed method is explained through its application to calculate the climate-controlled parameters for expansive soils in different locations throughout Saudi Arabia. …”
Get full text
Article -
18673
Research on IoT security situation awareness method based on evidence theory
Published 2022-04-01“…The security problem of IoT became more and more serious with its rapid development.Considering that the current IoT security situation awareness system lacks generality and excessively relies on expert knowledge, a IoT security situation awareness method based on improved D-S evidence theory was proposed in this paper.Fuzzy Gaussian membership function was used to calculate the vulnerability information membership matrix, which was normalized as evidence distribution matrix.The improved Topsis method was used to measure the evidence credibility.In order to fully restrain the credibility of conflicting evidence and improve the credibility of mutually supporting evidence, local credibility between two evidence was aggregated and the expected positive and negative solution vectors were improved according to the situation assessment scenario.And the weighted average method was used for vulnerability information fusion, to obtain the result of situational assessment.The result of situational awareness was fused with the time discount and high-risk vulnerability information discount evidence theory.At the same time, the IoT vulnerability information at different moments was considered comprehensively, the evidence was adaptively and dynamically weighted with the ratio information of high-risk vulnerability.The experimental results show that in the fusion of different numbers of evidence bodies and four common conflicting evidence, the improved Topsis method has higher fusion probability on credible proposition.In the aspect of situation assessment, the risk degree of current system is accurately assessed.And in the aspect of situational awareness, this discount evidence theory can predict the probability of high risk and critical risk, which is more effective than the traditional D-S evidence theory.According to this theory, a IoT security situational awareness method process was proposed, which would be used to guide engineering practice.In the future, the relationship between vulnerabilities can be considered and richer information between vulnerabilities can be extracted for vulnerability exploiting, so that the result of situation assessment is more accurate and reasonable.On the other hand, for situational awareness, game theory can be adopted in the process of dynamic game between the attacker and defender.…”
Get full text
Article -
18674
Machine learning for classifying chronic kidney disease and predicting creatinine levels using at-home measurements
Published 2025-02-01“…Using 10-fold cross-validation, we calculate metrics such as accuracy, true positive rate (TPR), true negative rate (TNR), and mean squared error. …”
Get full text
Article -
18675
Current Trends in the Development of Reporting in the Sphere of Investments in Human Capital
Published 2024-08-01“…By developing a separate calculation methodology based on traditional reports on added value, it is proposed to create one’s own alternative human capital accounting system. …”
Get full text
Article -
18676
Dynamic Spatiotemporal Causality Analysis for Network Traffic Flow Based on Transfer Entropy and Sliding Window Approach
Published 2021-01-01“…A combination of Gaussian kernel density estimation and sliding window approach is proposed to calculate the transfer entropy and construct dynamic spatiotemporal causality graphs based on the causality significance test. …”
Get full text
Article -
18677
An arbitrary segmentation method for loss allocation in power grids with distributed generation
Published 2025-03-01“…Initially, a theoretical approach for calculating network loss improvement in power grids with distributed generations is proposed, utilizing bus voltage equations and the PQ-PV subnetwork disassembly method to mitigate the impact of bidirectional power flow problem. …”
Get full text
Article -
18678
Improved dielectric performance of graphene oxide reinforced plasticized starch.
Published 2024-01-01“…From the complex impedance study, the changes in various impedances with low to high-frequency ranges have been calculated and explained in the equivalent circuit diagram. …”
Get full text
Article -
18679
The global health and economic burden of chikungunya from 2011 to 2020: a model-driven analysis on the impact of an emerging vector-borne disease
Published 2024-12-01“…This study aims to provide a comprehensive overview of the chikungunya burden worldwide.Methods We analysed the global burden of chikungunya between 2011 and 2020 and calculated disability-adjusted life years (DALYs) and direct and indirect costs using a data-driven simulation model. …”
Get full text
Article -
18680
Projection and prediction of the annual and seasonal future reference evapotranspiration time scales in the West of Iran under RCP emission scenarios
Published 2019-06-01“…The FAO-Penman-Montieth method was applied to calculating reference evapotranspiration and the CanESM2 general circulation model and SDSM downscaling method were used to simulating future climate conditions under the climatic scenarios. …”
Get full text
Article