Showing 2,061 - 2,080 results of 120,517 for search '"Methodism"', query time: 0.15s Refine Results
  1. 2061
  2. 2062

    The Fruit Recognition and Evaluation Method Based on Multi-Model Collaboration by Mingzheng Huang, Dejin Chen, Dewang Feng

    Published 2025-01-01
    “…The experimental results show that the proposed method can be applied to the maturity assessment of apples and tomatoes, as well as to the non-destructive testing of apples.…”
    Get full text
    Article
  3. 2063

    Study on Performance Evaluation of Service Supply Chain by Extension Method by Jun Cheng, Qiaoning Yang, Lin Lu

    Published 2021-01-01
    “…The result turns out to be good, which is consistent with the actual situation, indicating that the evaluation system and method are effective and reliable.…”
    Get full text
    Article
  4. 2064
  5. 2065
  6. 2066

    Novel DOA estimation method for coherent wideband LFM signals by Peng,LIUKai-hua LUO, Jie-xiao YU, Yong-tao MA

    Published 2012-03-01
    “…A novel direction of arrival (DOA) estimation method for coherent wideband linear frequency modulation (LFM) signals was proposed.Based on the dechirping property of LFM signal in fractional Fourier domain,a new array data model was constructed,then the matrix reconstruction and MUSIC algorithm were used to estimate the DOA of coherent LFM signals.If there were multiple groups of coherent LFM signals incident,separated them in different energy-concentrated domains first,then carried the DOA estimation on each of the groups.Owing to fully excavating the time-frequency information included in observed signals,this method has good resolution ability and anti-noise performance,and the number of DOA that can be resolved is also increased.In addition,this method has no array redundancy and aperture loss,and can be applied to arbitrary array manifold.Simulation results show that this method can obtain nearly 8dB signal-to-noise ratio gain compared with the conventional method.…”
    Get full text
    Article
  7. 2067

    Synthetic–schematic representation of the model of clinical diagnostic-therapeutic method by Luis Alberto Corona Martínez

    Published 2007-04-01
    “…The use of a systemic approach in the theoretical analysis of the clinical method has allowed the elaboration of an schematic and synthetic representation of the new model of clinical diagnostic- therapeutic method developed from the conception of the medical assistance as a taking decisions process. …”
    Get full text
    Article
  8. 2068
  9. 2069

    Enumeration of Antibacterial Activity of Few Medicinal Plants by Bioassay Method by B. Uma Reddy

    Published 2010-01-01
    “…(Asclepiadaceae) were evaluated for antibacterial activity using broth dilution bioassay method. It is clear from the results that, the extracts of these plants acts as a good source of antibiotics against various bacterial pathogens tested and exhibited broad spectrum of antibacterial activity. …”
    Get full text
    Article
  10. 2070
  11. 2071

    Boundary integral equation methods for Lipschitz domains in linear elasticity by Le Louër, Frédérique

    Published 2024-05-01
    “…A review of stable boundary integral equation methods for solving the Navier equation with either Dirichlet or Neumann boundary conditions in the exterior of a Lipschitz domain is presented. …”
    Get full text
    Article
  12. 2072

    Crossover Method for Interactive Genetic Algorithms to Estimate Multimodal Preferences by Misato Tanaka, Yasunari Sasaki, Mitsunori Miki, Tomoyuki Hiroyasu

    Published 2013-01-01
    “…The proposed method estimates the locations of the optimum area by a clustering method and then searches for the maximum values of the area by a probabilistic model. …”
    Get full text
    Article
  13. 2073
  14. 2074
  15. 2075

    Deepfake detection method based on patch-wise lighting inconsistency by Wenxuan WU, Wenbo ZHOU, Weiming ZHANG, Nenghai YU

    Published 2023-02-01
    “…The rapid development and widespread dissemination of deepfake techniques has caused increased concern.The malicious application of deepfake techniques also poses a potential threat to the society.Therefore, how to detect deepfake content has become a popular research topic.Most of the previous deepfake detection algorithms focused on capturing subtle forgery traces at pixel level and have achieved some results.However, most of the deepfake algorithms ignore the lighting information before and after generation, resulting in some lighting inconsistency between the original face and the forged face, which provided the possibility of using lighting inconsistency to detect deepfake.A corresponding algorithm was designed from two perspectives: introducing lighting inconsistency information and designing a network structure module for a specific task.For the introduction of lighting task, a new network structure was derived by designing the corresponding channel fusion method to provide more lighting inconsistency information to the network feature extraction layer.In order to ensure the portability of the network structure, the process of feature channel fusion was placed before the network extraction information, so that the proposed method can be fully planted to common deepfake detection networks.For the design of the network structure, a deepfake detection method was proposed for lighting inconsistency based on patch-similarity from two perspectives: network structure and loss function design.For the network structure, based on the characteristic of inconsistency between the forged image tampering region and the background region, the extracted features were chunked in the network feature layer and the feature layer similarity matrix was obtained by comparing the patch-wise cosine similarity to make the network focus more on the lighting inconsistency.On this basis, based on the feature layer similarity matching scheme, an independent ground truth and loss function was designed for this task in a targeted manner by comparing the input image with the untampered image of this image for patch-wise authenticity.It is demonstrated experimentally that the accuracy of the proposed method is significantly improved for deepfake detection compared with the baseline method.…”
    Get full text
    Article
  16. 2076

    The Integrative approach in transactional analysis as a theory and method in psychotherapy by Adam Bekier

    Published 2024-12-01
    “… The aim of this article is to analyze the integrative approach in transactional analysis (TA) as both a theory and method in psychotherapy. The contemporary integrative approach in TA expands traditional theoretical frameworks by incorporating elements from other schools of psychotherapy. …”
    Get full text
    Article
  17. 2077

    Monitoring Method for Road Waterlogging Based on Improved YOLOv8 by ZHANG Zheng, ZUO Xiangyang, LONG Yan, HUANG Haocheng, HE Lixin, LEI Xiaohui, WANG Mengqian

    Published 2024-10-01
    “…Therefore, this article proposed a real-time monitoring method for road waterlogging based on improved YOLOv8. …”
    Get full text
    Article
  18. 2078

    Application Layer Protocol Identification Method Based on ResNet by Zhijian Fang, Xiang Gao, Huaxiong Zhang, Jingpeng Tang, Qiang Gao

    Published 2025-01-01
    “…We propose a data protocol identification method based on a Residual Network (ResNet) to address this issue. …”
    Get full text
    Article
  19. 2079
  20. 2080