Showing 2,001 - 2,020 results of 120,517 for search '"Methodism"', query time: 0.14s Refine Results
  1. 2001

    Method of node distribution for heterogeneous WMSN based on load balancing by Yong-hong ZHU, En-jie DING

    Published 2015-10-01
    “…Multiple hop transmission in wireless sensor networks(WSN)would bring the energy hole problem near the sink.It proved that the energy hole problem would appear in any position in heterogeneous wireless multimedia sensor networks and propose a method of the node distribution based on load balancing to solve the problem.The energy consumption was analyzed on the basis of considering the data compression ratio and the energy consumed for data transmission and processing.It proved that in heterogeneous WMSN the energy consumption of data processing would affect the node distribution and define a word that profit of data processing.The simulation results show that the energy utilization rate and the survival time of the network can be effectively improved by using the method proposed.…”
    Get full text
    Article
  2. 2002

    Selectable Implant Removal Methods due to Mechanical and Biological Failures by Jong-Bin Lee

    Published 2017-01-01
    “…The 70-year-old male and 66-year-old female who had discomfort on posterior implants region came to Department of Periodontology. Conventional method using trephine bur and the new, nontraumatic method using a fixture removal kit were used for implant removal, respectively. …”
    Get full text
    Article
  3. 2003

    Convergence Rates of Gradient Methods for Convex Optimization in the Space of Measures by Chizat, Lénaïc

    Published 2023-01-01
    “…We study the convergence rate of Bregman gradient methods for convex optimization in the space of measures on a $d$-dimensional manifold. …”
    Get full text
    Article
  4. 2004

    Compression strategies selection method based on classification of HBase data by Hai-yan WANG, Cai-hang FU

    Published 2016-04-01
    Subjects: “…compression strategies selection method…”
    Get full text
    Article
  5. 2005
  6. 2006

    Research on Face Recognition Method by Autoassociative Memory Based on RNNs by Qi Han, Zhengyang Wu, Shiqin Deng, Ziqiang Qiao, Junjian Huang, Junjie Zhou, Jin Liu

    Published 2018-01-01
    “…Finally, simulation results on two experiments show the feasibility and performance of the proposed face recognition method.…”
    Get full text
    Article
  7. 2007

    Automatic exploitation generation method of write-what-where vulnerability by Huafeng HUANG, Purui SU, Yi YANG, Xiangkun JIA

    Published 2022-01-01
    “…To solve the problem that the current vulnerability automatic exploitation generation methods cannot automatically generate control-flow-hijacking exploitation from write-what-where, a method of automatic exploitation generation for write-what-where was proposed.First, the write-what-where vulnerability was detected based on the memory address control strength dynamic taint analysis method.Then, the vulnerability exploitation elements were searched based on the vulnerability exploitation modes, and the exploitation of write-what-where vulnerability was generated automatically by constraint solving.The experimental results show that the proposed method can effectively detect write-what-where vulnerability, search exploitation elements, and automatically generate the control-flow-hijacking exploitation from write-what-where.…”
    Get full text
    Article
  8. 2008

    STUDY OF TOWING DELTA PLATE BEARING STRESS CALCULATION METHODS by LIN FengMei, GU YuJiong

    Published 2018-01-01
    “…When the gap of pin and hole△R = 0,the average bearing stress formula can be adopted; when the ratio of gap between the hole and pin to radius of the pin λ≥0. 02,in order to save cost for FEA analysis the Hertz formula can be adopted if no other more accurate calculation methods are available The computing error between the Hertz formula and FEA is less than 10%.…”
    Get full text
    Article
  9. 2009

    Backdoor defense method in federated learning based on contrastive training by Jiale ZHANG, Chengcheng ZHU, Xiang CHENG, Xiaobing SUN, Bing CHEN

    Published 2024-03-01
    “…In response to the inadequacy of existing defense methods for backdoor attacks in federated learning to effectively remove embedded backdoor features from models, while simultaneously reducing the accuracy of the primary task, a federated learning backdoor defense method called ContraFL was proposed, which utilized contrastive training to disrupt the clustering process of backdoor samples in the feature space, thereby rendering the global model classifications in federated learning independent of the backdoor trigger features.Specifically, on the server side, a trigger generation algorithm was developed to construct a generator pool to restore potential backdoor triggers in the training samples of the global model.Consequently, the trigger generator pool was distributed to the participants by the server, where each participant added the generated backdoor triggers to their local samples to achieve backdoor data augmentation.Experimental results demonstrate that ContraFL effectively defends against various backdoor attacks in federated learning, outperforming existing defense methods.…”
    Get full text
    Article
  10. 2010
  11. 2011

    Research of the Method of Determining k Value in VMD based on Kurtosis by Wu Wenxuan, Wang Zhijian, Zhang Jiping, Ma Weijin, Wang Junyuan

    Published 2018-01-01
    “…The feasibility of the method is verified by the actual fault signal,a new thinking of the research for VMD is proposed.…”
    Get full text
    Article
  12. 2012

    Fuzzy Filtering Method for Color Videos Corrupted by Additive Noise by Volodymyr I. Ponomaryov, Hector Montenegro-Monroy, Luis Nino-de-Rivera, Heydy Castillejos

    Published 2014-01-01
    “…A novel method for the denoising of color videos corrupted by additive noise is presented in this paper. …”
    Get full text
    Article
  13. 2013
  14. 2014

    Multi-version consolidation method for block-level backup data by WANG Shu-peng 1, WU Guang-jun1, WU Zhi-gang3, YUN Xiao-chun1

    Published 2011-01-01
    “…Historical version backup data query efficiency was dependent on the version chain length in a multi-version backup data storage system.A novel block-level backup data multi-version consolidation method was presented for this problem.Any version of a historical full system snapshot could be generated within the incremental backup data version sequence.Theoretical analysis showed that it could increase the target snapshot version query efficiency significantly in the version chain.A variable-length block version merging algorithm was presented to decrease the computing complex-ity in the process of snapshot version merging,according to the block-level backup data distribution features.Finally,the concrete applications and performance analysis for block-level version consolidation method was also introduced.The simulated experiments results expose that the version consolidation method can eliminate redundant version of backup data with the same version chain length,and it can increase full system recovery efficiency than traditional methods sig-nificantly.…”
    Get full text
    Article
  15. 2015

    THE INFERENCE METHOD OF WHEEL LOAD BASED ON THE ACCELERATION OF AXLE HEAD by ZHENG SongLin, GUO ZhengXiang, FENG JinZhi, FANG Jin, SHEN YongFeng

    Published 2016-01-01
    “…A new load spectrum measuring method which can instead of the six-component measuring wheel was carried out in this paper. …”
    Get full text
    Article
  16. 2016
  17. 2017
  18. 2018

    SAT-based lazy formal analysis method for security protocols by Chun-xiang GU, Huan-xiao WANG, Yong-hui ZHENG, Dan XIN, Nan LIU

    Published 2014-11-01
    “…A SAT-based security protocol formalization analysis method named SAT-LMC is proposed.The method introduces optimized the initial state and transformational rules with “lazy” idea.The efficiency of detection is significantly improved.Moreover,by adding support for strong type flaw attack defect,the attack detection becomes more comprehensive.A security protocol analysis tool is implemented based on the method; a type flaw attack is detected for protocol Otway-Rees.For OAuth2.0 protocol,analysis shows that there is a kind of man-in-the-middle attack of the authorization code in some application scenarios.…”
    Get full text
    Article
  19. 2019

    Implementation of the Spectral Method for Determining of Measuring Instruments' Dynamic Characteristics by A. F. Sabitov, I. A. Safina

    Published 2020-06-01
    “…The spectral method for establishing dynamic response of measuring instruments basically requires determining the amplitude spectrum of the signal in its informative part that includes the amplitude spectrum at zero frequency. …”
    Get full text
    Article
  20. 2020

    Noether Symmetry Method for Hamiltonian Mechanics Involving Generalized Operators by Chuan-Jing Song, Yao Cheng

    Published 2021-01-01
    “…And finally, two applications are presented to illustrate the methods and results.…”
    Get full text
    Article