Results 21 to 30 of about 336,781 (326)

PREDICTIVE MODELLING OF SELECT CRYPTOCURRENCIES AND IDENTIFYING THE BEST SUITABLE MODEL - WITH REFERENCE TO ARIMA AND ANNS [PDF]

open access: yesAnalele Universităţii Constantin Brâncuşi din Târgu Jiu : Seria Economie, 2022
In the 4 th Industrial revolution, cryptocurrencies emerged as a technology-based financial asset. The digital currency market is the repercussion of the financial crisis of 2008, thus creating disruption in the whole financial market.
PROF. REEPU   +4 more
doaj  

On the computation of moist-air specific thermal enthalpy [PDF]

open access: yes, 2014
The specific thermal enthalpy of a moist-air parcel is defined analytically following a method in which specific moist entropy is derived from the Third Law of thermodynamics.
Ambaum   +48 more
core   +3 more sources

Algoritma Backpropagation Neural Network dalam Memprediksi Harga Komoditi Tanaman Karet

open access: yesIlkom Jurnal Ilmiah, 2020
Rubber plantation sector is one of the leading commodities in East Kalimantan Province contributing greatly to non-oil and gas exports. Currently, the price of rubber in the world is increasingly competitive.
Julius Rinaldi Simanungkalit   +4 more
doaj   +1 more source

Adaptive computation of multiscale entropy and its application in EEG signals for monitoring depth of anesthesia during surgery [PDF]

open access: yes, 2012
Entropy as an estimate of complexity of the electroencephalogram is an effective parameter for monitoring the depth of anesthesia (DOA) during surgery.
Cheng-Wei Lu   +10 more
core   +2 more sources

Forecasting Blood Demand Using the Support Vektor Regression Method (Case Study: Blood Transfusion Unit-PMI Central Lombok)

open access: yesJISA (Jurnal Informatika dan Sains), 2023
Blood is an important component produced by the human body. Blood is also a very vital part of human survival. When blood levels in the human body are less than they should be, the way to overcome this is by donating blood or blood transfusion.
Yati Apriati   +4 more
doaj   +1 more source

Application of the International Financial Reporting Standard for small and medium-sized entities in European countries [PDF]

open access: yesEkonomski Pogledi, 2023
The paper is focused on researching the International Financial Reporting Standard (IFRS) for small and medium-sized entities (SMEs) in European countries and the frequency of adoption and application of this standard.
Dragičević Predrag
doaj   +1 more source

On the influence of detection tests on deterministic parameters estimation [PDF]

open access: yes, 2006
In non-linear estimation problems three distinct regions of operation can be observed. In the asymptotic region, the Mean Square Error (MSE) of Maximum Likelihood Estimators (MLE) is small and, in many cases,close to the Cramer-Rao bound (CRB).
Chaumette, Eric   +3 more
core   +2 more sources

On MSE-Optimal Circular Crossover Designs [PDF]

open access: yesJournal of Statistical Theory and Practice, 2021
AbstractIn crossover designs, each subject receives a series of treatments, one after the other inpconsecutive periods. There is concern that the measurement of a subject at a given period might be influenced not only by the direct effect of the current treatment but also by a carryover effect of the treatment applied in the preceding period. Sometimes,
C. Neumann, J. Kunert
openaire   +3 more sources

Agglomeration behaviour of steel plants solid waste and its effect on sintering performance

open access: yesJournal of Materials Research and Technology, 2017
Recycling has been the fascinating topic among the researchers for all times. The present study shows the recycling of steel plant's solid wastes as blast furnace flue dust and sludge towards agglomeration and their use in the production of sinter. These
Prince Kumar Singh   +3 more
doaj   +1 more source

A Coding-Based Steganography Using Multiple Frequency Domains [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2009
:In this paper, a new technique for hiding text in a bitmap images will be present. The technique based on using an index of the dictionary representing the characters of the secret messages instead of the characters themselves.
Omed Salim Khalind   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy