Showing 2,081 - 2,100 results of 120,517 for search '"Methodism"', query time: 0.19s Refine Results
  1. 2081

    Monitoring Method and North Florida Phenology of Pecan Nut Casebearer by Russell F. Mizell

    Published 2004-07-01
    “…ENY707/IN173: Monitoring Method and North Florida Phenology of Pecan Nut Casebearer (ufl.edu) …”
    Get full text
    Article
  2. 2082

    RESEARCH ON TEST METHOD OF FUSELAGE PANEL SUBJECTED TO SHEAR LOAD by ZANG WeiFeng, SU ShaoPu, ZHANG HaiYing, DONG DengKe

    Published 2017-01-01
    “…The test method of fuselage panel subjected to shear load is an important technique for aircraft structure strength research. …”
    Get full text
    Article
  3. 2083

    Matrix Laplace Transform Method and It Applications on Spring-Mass Systems by Syamsul Arifin

    Published 2020-06-01
    “…That are elimination method and matrix method. Whereas to solve nonhomogenous systems, used undetermined coefficient method and variation of parameter method, that through some difficulties and complex procceses. …”
    Get full text
    Article
  4. 2084

    STUDY ON CALCULATION METHOD OF STRESS SEPARATION BY OBLIQUE INCIDENCE TECHNIQUE by LIU XiaoMeng, DAI ShuGuang

    Published 2016-01-01
    “…Using oblique incidence method one can obtain the three plane stress components. …”
    Get full text
    Article
  5. 2085
  6. 2086
  7. 2087

    A Higher Order Iterative Method for Computing the Drazin Inverse by F. Soleymani, Predrag S. Stanimirović

    Published 2013-01-01
    “…A method with high convergence rate for finding approximate inverses of nonsingular matrices is suggested and established analytically. …”
    Get full text
    Article
  8. 2088

    A Methodical Approach to Design and Valuation of Weather Derivatives in Agriculture by Jindrich Spicka, Jiri Hnilica

    Published 2013-01-01
    “…This paper first offers an overview of data sources and then methods of design and valuation of weather derivatives at the regional level. …”
    Get full text
    Article
  9. 2089

    Genetic Programming Method for Satellite System Topology and Parameter Optimization by Jinhui Li, Yunfeng Dong, Ming Xu, Hongjue Li

    Published 2020-01-01
    “…In this paper, a genetic programming method for satellite system design is proposed to simultaneously optimize the topology and parameters of a satellite system. …”
    Get full text
    Article
  10. 2090
  11. 2091

    Modeling of Globoidal Cam Planetary Mechanism by Simulating Motion Method by Liu Beibei, Cao Jujiang, Zhang Yanhua

    Published 2018-01-01
    “…Aiming at the problem of modeling difficult of complex meshing surfaces of globoidal cam planetary mechanism,a method of 3D modeling by using simulated motion method is proposed in order to facilitate the modeling of the mechanism. …”
    Get full text
    Article
  12. 2092

    Research on HMM based link prediction method in heterogeneous network by Rong QIAN, Jianting XU, Kejun ZHANG, Hongyu DONG, Fangyuan XING

    Published 2022-05-01
    “…In order to solve the problem that incomplete mining of structural information and semantic information in heterogeneous networks, a link prediction method combining meta-path-based analysis and hidden Markov model was proposed for link prediction of heterogeneous network.Considering that clustering could effectively capture the structural information of heterogeneous network, the k-means algorithm was improved to obtain the initial clustering center method based on the minimum distance mean square error, and it was applied to the hidden Markov model, first-order cluster hidden markov model (C-HMM<sup>(1)</sup>) link prediction method, and a link prediction method for heterogeneous network with second-order cluster hidden Markov model (C-HMM<sup>(2)</sup>) were designed.Further, considering the feature information of the data, a link prediction method called ME-HMM that combined the maximum entropy model and the second-order Markov model was proposed.The experimental results show that the ME-HMM has higher link prediction accuracy than the C-HMM, and the ME-HMM method has better performance than the C-HMM method because it fully considers the feature information of the data.…”
    Get full text
    Article
  13. 2093

    Evaluation method of penetrating jamming effectiveness for cognitive communication protection by Zhiguo SUN, Shuo XIAO, Yijie WU, Shiming LI, Zhenduo WANG

    Published 2023-11-01
    “…In order to support the implementation of “multidimensional orthogonal configured communication protection between communication modules as well as parameters and interference” in cognitive communication countermeasures scenarios, jamming effectiveness requires module level responsiveness.A penetrating jamming effectiveness evaluation method was proposed.Firstly, the core parameters of each signal processing module were selected as evaluation parameters.Secondly, analytic hierarchy process (AHP) and entropy weight method (EWM) were used to determine the weight of indicators.The coordination problem in AHP was solved through expert weight allocation, and the weight allocation problem in EWM was solved through non-uniform mapping.Finally, the subjective and objective weights were weighed through game theory, and the jamming effectiveness was judged by the technique for order preference by similarity to ideal solution (TOPSIS).By conducting evaluation experiments on the jamming performance of the Link16 data link, taking into account multiple aspects such as jamming types, number of jamming frequencies, jamming duration, and system types.Experiment results demonstrate that the penetration-based jamming performance evaluation method not only provides a more intuitive representation of the relationship between evaluation results and metric parameters, but also possesses excellent jamming discrimination capability.…”
    Get full text
    Article
  14. 2094

    Effect of Extraction Methods on Physicochemical and Functional Properties of Nannochloropsis Proteins by Suyan HUANG, Rong CAO, Nan LIU, Yong SUN, Deqing ZHOU, Shanshan WANG

    Published 2025-01-01
    “…Nannochloropsis freeze-thawed extraction protein (NFP), Nannochloropsis enzyme-assisted extraction protein (NEP) and Nannochloropsis alkali extraction protein (NAP) were extracted from the Nannochloropsis powder by using freeze-thawed salt precipitation method, enzyme-assisted extraction method and alkali dissolution acid precipitation method, respectively. …”
    Get full text
    Article
  15. 2095

    A New Aerodynamic Optimization Method with the Consideration of Dynamic Stability by Mi Baigang, Wang Xiangyu

    Published 2021-01-01
    “…Finally, a new aerodynamic optimization method can be built. We take NACA0012 as an example to validate this method. …”
    Get full text
    Article
  16. 2096

    Real-time detection method of smoke based on Wi-Fi by Zhefu WU, Wanli TANG, Cheng CHEN, Luping FANG

    Published 2019-06-01
    “…Fire-related smoke real-time detection method is one of the important means to ensure public safety.A fire smoke detection method based on channel state information of Wi-Fi network was proposed to avoid the high cost of existing fire sensor system or the blind spot of video detection.The method need not require a dedicated fire smoke monitoring device.By studying the influence of fire smoke on wireless transmission signals,the smoke characteristic parameters in the channel state information were extracted and classified by machine learning,thereby realizing the real-time monitoring of environmental fire.The experimental results show that the accuracy of environmental smoke detection based on Wi-Fi channel status information can reach 98.06%.…”
    Get full text
    Article
  17. 2097

    Unmanned roller lateral positioning method for asphalt road construction by Pengju Yue, Xiaohua Xia, Yongbiao Hu, Xuebin Wang, Pengcheng He, Xufang Qin

    Published 2025-01-01
    “…The results indicate that the method excels in extracting the asphalt road boundary. …”
    Get full text
    Article
  18. 2098

    The Cardinal Spline Methods for the Numerical Solution of Nonlinear Integral Equations by Xiaoyan Liu, Jin Xie, Zhi Liu, Jiahuan Huang

    Published 2020-01-01
    “…The sufficient condition for the existence of the inverse matrix is examined, and the convergence rate is analyzed. We compare our method with other methods proposed in recent papers and demonstrated the advantage of our method with several examples.…”
    Get full text
    Article
  19. 2099

    Convergence and Stability in Collocation Methods of Equation u′(t)=au(t)+bu([t]) by Han Yan, Shufang Ma, Yanbin Liu, Hongquan Sun

    Published 2012-01-01
    “…This paper is concerned with the convergence, global superconvergence, local superconvergence, and stability of collocation methods for u′(t)=au(t)+bu([t]). The optimal convergence order and superconvergence order are obtained, and the stability regions for the collocation methods are determined. …”
    Get full text
    Article
  20. 2100

    Game theory based forwarding control method for social network by Fangfang SHAN, Hui LI, Hui ZHU

    Published 2018-03-01
    “…With the rapid development of mobile communication and internet technology,the social network has become one of the mainstream social means used in people’s daily social life.To maintain and strengthen relationships with friends,users may share personal behavior and feelings through social networks.Forwarding these contents may result in privacy leakage.To help publishers make proper data forwarding decision,the benefits of both sides of the forwarding operation were analyzed,and a game theory based forwarding control method for social network was proposed which could effectively prevent dishonest data forwarding operation.By analyzing the benefits of both sides of forwarding operation and considering historical information,the probability of dishonest data forwarding operation was calculated and it was compared with the threshold set by publisher to make the forwarding decision.The procedure and framework of the game theory based forwarding control method was introduced.The benefits of both sides were defined and analyzed.The game play scenario was presented.Some results of experiments are shown to support that the method is effective and it can protect the security of content in social network.…”
    Get full text
    Article