Showing 1,981 - 2,000 results of 120,517 for search '"Methodism"', query time: 0.14s Refine Results
  1. 1981

    On the Subject, Purpose and Method of Religious Education as a Practical Metaphysics by Süleyman Gümüş

    Published 2024-10-01
    “…Practical metaphysics employs the dialectical method in terms of human relation to truth, archaeology and genealogy for the analysis of subjectivity and forms of subjectivation, and any proper method for its pedagogical dimension.…”
    Get full text
    Article
  2. 1982

    ORIGINAL DHI METHOD FOR ASSESSING EPIDEMIC HAZARDS IN TRANSPORTATION SERVICES by Rafał BURDZIK

    Published 2023-12-01
    “…In the author's opinion, numerous and very serious problems in the transport sector and transport services are in this case the result of a lack of a methodical approach to the problem of epidemic threats, including infection in a global epidemic. …”
    Article
  3. 1983
  4. 1984

    Bidirectional measurement differential positioning method for LEO communication satellites by WANG Xinyang, ZHAO Yafei, LI Jinkang, PENG Mugen

    Published 2024-04-01
    “…In scenarios such as direct-to-handset satellite, terminal designs were often configured to communicate with only one satellite, making the exploration of single-satellite positioning methods of urgent significance. Addressing the challenges of poor positioning accuracy, difficulty in clock synchronization, and slow convergence speed associated with previous single-satellite continuous observation, a bidirectional measurement differential positioning method was proposed in the context of low-orbit constellations. …”
    Get full text
    Article
  5. 1985

    The impact of collaborative and cooperative methods on staff’s knowledge in complaint handling by Tita Hariyanti, Ninik Pujaning Dyah, Sabrina Aulia Rahma, Silvy Rahmah Yanthy, Tjatur Budi Winarko

    Published 2023-09-01
    Subjects: “…collaborative methods, cooperative methods, knowledge change, complaint handling…”
    Get full text
    Article
  6. 1986
  7. 1987
  8. 1988
  9. 1989

    Multi-adversarial domain adaptation method based on feature correction by Yong ZHANG, Haoshuang LIU, Qi ZHANG, Wenzhe LIU

    Published 2024-01-01
    “…Domain adaptation can transfer labeled source domain information to an unlabeled but related target domain by aligning the distribution of source domain and target domain.However, most existing methods only align the low-level feature distributions of the source and target domains, failing to capture fine-grained information within the samples.To address this limitation, a feature correction-based multi-adversarial domain adaptation method was proposed.An attention mechanism to highlight transferable regions was introduced in this method and a feature correction module was deployed to align the high-level feature distributions between the two domains, further reducing domain discrepancies.Additionally, to prevent individual classifiers from overfitting their own noisy pseudo-labels,dual classifier co-training was proposed and the feature aggregation property of graph neural networks was utilized to generate more accurate source domain labels.Extensive experiments on three benchmark datasets for transfer learning demonstrate the effectiveness of the proposed method.…”
    Get full text
    Article
  10. 1990

    Method of Secure Domain Creation for Multiple Points in Home Networking by Zhiyong Ma

    Published 2015-11-01
    “…To simplify the process of multiple-point connection in home networking,new designs for user operation process,end point structure,state machine,and system process were presented.Analysis shows that the method proposed needs less operations and less time,lowers the faulty probability,and cuts down the service costs as well.…”
    Get full text
    Article
  11. 1991

    Teacher performance analysis using analytic network process method by Zuraidah, Nurul Hudha Purnomo

    Published 2024-06-01
    “…Dengan lima kriteria utama sebagai prioritas dalam penilaian kinerjanya yaitu melaksanakan pembelajaran dengan runtut dengan bobot sebesar 0.1730, menyampaikan materi pembelajaran dengan jelas dengan bobot sebesar 0.1510, menunjukan penguasaan materi pembelajaran dengan bobot sebesar 0.1240, menunjukan sikap terbuka terhadap respon siswa dengan bobot sebesar 0.1170 dan menguasai kelas dengan bobot sebesar 0.1100   Analytic Network Processis one method that can be used to select the best alternative from several alternatives.Taking The sample in this research was carried out by providing a questionnaire for all 12th grade science students. …”
    Get full text
    Article
  12. 1992

    Properties and Applications of the Modified Kies–Lomax Distribution with Estimation Methods by Abdelaziz Alsubie

    Published 2021-01-01
    “…We explore their performances using detailed simulation results, and the partial and overall ranks are provided for the measures of absolute biases, mean square errors, and mean relative errors to determine the best estimation method. The results show that the maximum product of spacings and maximum likelihood approaches are recommended to estimate the MKL parameters. …”
    Get full text
    Article
  13. 1993

    New Measure and Calculation Method for Gear Pair Normal Backlash by Song Shusen, Yang Lianbo, Xie Songsong, Yang Xiao, Wang Xin, Tang Haichuan

    Published 2020-06-01
    “…Calculated the gear pair normal backlash constant <italic>c</italic> according to definition and calculation method of gear pair normal backlash from GB/Z 18620.2—2008 at a given work center distance. …”
    Get full text
    Article
  14. 1994

    New Catalytic Method for the Synthesis of 2,7-Dicycloalkyl-hexaazaperhydropyrenes by Elena Rakhimova, Victor Kirsanov, Radik Zainullin, Askhat Ibragimov, Usein Dzhemilev

    Published 2016-01-01
    “…An efficient method for the synthesis of 2,7-dicycloalkyl-2,3a,5a,7,8a,10a-hexaazaperhydropyrenes by the NiCl2·6H2O-catalyzed ring transformation reaction of 1,3,5-tricycloalkyl-1,3,5-triazines with 1,4,5,8-tetraazadecalin has been successfully developed.…”
    Get full text
    Article
  15. 1995

    Novel continuous identity authentication method based on mouse behavior by Cong YI, Jun HU

    Published 2022-10-01
    “…With the rapid development of Internet technologies, security issues have always been the hot topics.Continuous identity authentication based on mouse behavior plays a crucial role in protecting computer systems, but there are still some problems to be solved.Aiming at the problems of low authentication accuracy and long authentication latency in mouse behavior authentication method, a new continuous identity authentication method based on mouse behavior was proposed.The method divided the user’s mouse event sequence into corresponding mouse behaviors according to different types, and mined mouse behavior characteristics from various aspects based on mouse behaviors.Thereby, the differences in mouse behavior of different users can be better represented, and the authentication accuracy can be improved.Besides, the importance of mouse behavior features was obtained by the ReliefF algorithm, and on this basis, the irrelevant or redundant features of mouse behavior were removed by combining the neighborhood rough set to reduce model complexity and modeling time.Moreover binary classification was adopted.The algorithm performed the training of the authentication model.During identity authentication, the authentication model was used to obtain a classification score based on the mouse behavior collected each time, and then the user’s trust value was updated in combination with the trust model.When the user’s trust value fell below the threshold of the trust model, it might be judged as illegal user.The authentication effect of the proposed method was simulated on the Balabit and DFL datasets.The results show that, compared with the methods in other literatures, this method not only improves the authentication accuracy and reduces the authentication latency, but also has a certain robustness to the illegal intrusion of external users.…”
    Get full text
    Article
  16. 1996
  17. 1997

    Optimization Model and Method of Variable Speed Limit for Urban Expressway by Shubin Li, Tao Wang, Hualing Ren, Baiying Shi, Xiangke Kong

    Published 2021-01-01
    “…The urban expressway network is the main part of the urban traffic network carrying most of the city’s traffic pressure for its continuity and rapidity, but the control method of the traffic flow was too simple to other control methods in application in addition to the ramp control and the fixed speed control. …”
    Get full text
    Article
  18. 1998

    Method of structural reliability analysis based on boundary distribution functions by S. A. Solovev, A. A. Soloveva

    Published 2023-10-01
    “…The research is aimed at the development of methods for assessing and analyzing the structural reliability of elements of building structures in practical tasks when statistical data about random variables may be incomplete or limited. …”
    Get full text
    Article
  19. 1999
  20. 2000

    Analysis method on the properties of social networks of internet nuisance communities by WANG Bo, GUO Jie, QIU Weidong, HUANG Zheng

    Published 2024-06-01
    “…Given the characteristics of these organizations, which include being distant from domestic supervision and possessing strong concealment and camouflage abilities, a social network characteristic analysis method was proposed for Internet public hazards organizations. …”
    Get full text
    Article