Showing 201 - 220 results of 120,517 for search '"Methodism"', query time: 0.17s Refine Results
  1. 201

    The Method of Lines for Ternary Diffusion Problems by Henryk Leszczyński, Milena Matusik

    Published 2014-01-01
    “…The method of lines (MOL) for diffusion equations with Neumann boundary conditions is considered. …”
    Get full text
    Article
  2. 202

    An efficient method to generate elliptic curves by ZHOU Chang-ying1, Kwok-Yan-Lam1, ZHOU Zheng-ou2

    Published 2001-01-01
    “…In this paper, an efficient method to generate elliptic curves for public key cryptosystems based on discrete logarithm problem is presented. …”
    Get full text
    Article
  3. 203

    Asymptotic Methods for Solitary Solutions and Compactons by Ji-Huan He

    Published 2012-01-01
    “…Particular attention is paid throughout the paper to giving an intuitive grasp for the variational approach, the Hamiltonian approach, the variational iteration method, the homotopy perturbation method, the parameter-expansion method, the Yang-Laplace transform, the Yang-Fourier transform, and ancient Chinese mathematics. …”
    Get full text
    Article
  4. 204

    A method of summability of Lagrange interpolation by Detlef H. Mache

    Published 1994-01-01
    “…Therefore we improve with the linear summation method Ln* a result presented in [12] and we also point out a solution for a problem of P.L.Butzer in the proceedings of the Budapest conference in 1980.…”
    Get full text
    Article
  5. 205

    Scientific School “Interactive Methods of Management” by V. N. Knyazev

    Published 2016-03-01
    Subjects: “…interactive methods…”
    Get full text
    Article
  6. 206

    Methods of Changing or Correcting the Date of Birth by Reza Valavioun, Hamid farhami

    Published 2024-06-01
    “…Legal conditions are possible through three references and five methods. One method is to act through the commission to determine the age of the subject of the single article of the law on preserving the validity of registered documents, etc. …”
    Get full text
    Article
  7. 207

    An Adjustment Method for the Customized Trains of the Railway by Xiaojuan Li, Jiana Shi, Li Yang, Hongwei Wang, Miao Yan

    Published 2020-01-01
    “…In order to establish a comprehensive method for the CT operation plan, the paper proposes an intention survey method to obtain the passenger travel wishes data. …”
    Get full text
    Article
  8. 208

    KPDR : An Effective Method of Privacy Protection by Zihao Shen, Wei Zhen, Pengfei Li, Hui Wang, Kun Liu, Peiqian Liu

    Published 2021-01-01
    “…To solve the problem of user privacy disclosure caused by attacks on anonymous areas in spatial generalization privacy protection methods, a K and P Dirichlet Retrieval (KPDR) method based on k-anonymity mechanism is proposed. …”
    Get full text
    Article
  9. 209
  10. 210

    METHODICAL PROBLEM IN THE RESEARCHES OF EDUCATIONAL HISTORY by Hüseyin ŞİMŞEK

    Published 2009-05-01
    “…Method, is a way that must be pursued for scientific researches. …”
    Get full text
    Article
  11. 211

    Methods of Bank Valuation in the Age of Globalization by A. Karminsky, E. Frolova

    Published 2015-06-01
    “…For strategic management residual income-oriented methods most useful when expected cash flows are negative throughout the forecast period. …”
    Get full text
    Article
  12. 212

    Sieve Method for Polynomial Linear Equivalence by Baocang Wang, Yupu Hu

    Published 2013-01-01
    “…By combining the three sieves, we propose a sieve method for the PLE problem. As an application of our sieve method, we show that it is infeasible to construct public key encryption schemes from the PLE problem.…”
    Get full text
    Article
  13. 213
  14. 214

    Design of multi-key encryption method by Yuqing ZHONG, Hao WANG, Zebing LIN, Min WANG, Liye CHEN

    Published 2020-11-01
    “…In order to improve the security in the process of information transmission,the current encryption methods were studied,and the research status was reported which increased the security of encryption by processing the key.According to the principle of segmenting and grouping data in the process of sending and encrypting,a method of multi-key encryption was designed:the segmenting key group and grouping key group were generated by the source key and random number,and the corresponding key was selected for each segmented and grouped data by its sequence number according to the matching algorithm.This method realized the encryption of multi-key in the process of information transmission.Finally,on the one hand,MATLAB was used to test and verify the encryption efficiency of this method.On the other hand,the security of this method was analyzed from the theoretical and mathematical perspective,comparing with the traditional method.It is concluded that this method can increase the security of the traditional method without too much cost much cost.…”
    Get full text
    Article
  15. 215

    Modification of the Quasilinearization Method for the Inverse Problem by Lenka Celechovská-Kozáková

    Published 2007-01-01
    “…We propose a new modification of Bellman's quasilinearization method such that at any iteration step, it works with an approximate solution of the original nonlinear system and with new approximation of parameters α(k+1) which are close enough to the previous ones. …”
    Get full text
    Article
  16. 216
  17. 217

    Methods to Quantify In-Field Nutrient Leaching by Bibek Acharya, Vivek Sharma, Charles Barrett, Sudeep Singh Sidhu, Lincoln Zotarelli, Michael D. Dukes

    Published 2023-01-01
    “… This publication summarizes the basic concepts of three most-used NO3-N leaching quantification methods in field conditions. Written by Bibek Acharya, Vivek Sharma, Charles Barrett, Sudeep Singh Sidhu, Lincoln Zotarelli, and Michael D. …”
    Get full text
    Article
  18. 218
  19. 219

    Imaging method for airborne SAL data by Guangzuo Li, Ning Wang, Ran Wang, Keshu Zhang, Yirong Wu

    Published 2017-03-01
    Subjects: “…imaging method…”
    Get full text
    Article
  20. 220

    Self-Treatment Methods for Livestock—Backrubbers by Emma N. I. Weeks, Phillip E. Kaufman

    Published 2012-10-01
    “…Back rubbers are a method of pesticide self-treatment for cattle. When bothered by insects or other pests, cattle tend to rub against objects. …”
    Get full text
    Article