Showing 2,181 - 2,200 results of 120,517 for search '"Methodism"', query time: 0.17s Refine Results
  1. 2181

    A UWB NLOS identification method under pedestrian occlusion by Tong WU, Yeshen LI, Zhenhuang HUANG, Yu ZHANG, Wanle ZHANG, Ke XIONG

    Published 2023-12-01
    “…Ultrawideband (UWB) is a hot technology for indoor positioning with large bandwidth, strong anti-interference ability, and high multipath resolution capacity.However, due to the complex indoor environment, UWB signal propagation will inevitably be blocked, resulting in non-line-of-sight (NLOS) propagation, which greatly reduces the accuracy of UWB positioning.Therefore, identifying NLOS signals accurately and discarding or correcting them are important to alleviate the problem of the decline in positioning accuracy.The majority of present NLOS identification work focuses on scenes with building structures such as walls.Further discussion is needed for scenes obscured by pedestrians.Since the impact of human obstacles on the signals is more complex and cannot be ignored, the NLOS identification under pedestrian occlusion was studied.By comparing a variety of machine learning methods and signal feature combinations, the random forest method based on the three-dimensional features of the first path signal power, the received signal power, and the measured distance was proposed.These features with fewer dimensions and easy extraction were used to achieve a high identification percentage for NLOS.The experimental results based on the measured data of different devices show that the NLOS identification accuracy based on the proposed method reaches 99.05%, 99.32% and 98.81% respectively.…”
    Get full text
    Article
  2. 2182

    Network security situation evaluation method for multi-step attack by Hao-pu YANG, Hui QIU, Kun WANG

    Published 2017-01-01
    “…Aiming at analyzing the influence of multi-step attack,as well as reflecting the system’s security situation accurately and comprehensively,a network security situation evaluation method for multi-step attack was proposed.This method firstly clustered security events into several attack scenes,which was used to identify the attacker.Then the attack path and the attack phase were identified by causal correlation of every scene.Finally,combined with the attack phase as well as the threat index,the quantitative standard was established to evaluate the network security situation.The proposed method is assessed by two network attack-defense experiments,and the results illustrate accuracy and effectiveness of the method.…”
    Get full text
    Article
  3. 2183

    A Vegetable-Price Forecasting Method Based on Mixture of Experts by Chenyun Zhao, Xiaodong Wang, Anping Zhao, Yunpeng Cui, Ting Wang, Juan Liu, Ying Hou, Mo Wang, Li Chen, Huan Li, Jinming Wu, Tan Sun

    Published 2025-01-01
    “…As a result, we propose a novel vegetable-price forecasting method based on mixture of expert models (VPF-MoE), which combines the strengths of large language models and deep learning methods. …”
    Get full text
    Article
  4. 2184

    Intelligent Diagnosis Method of Gear Faults based on MGAN and CNN by Zheng Li, Shengli Wu, Wenting Xing, Shiyong Liao

    Published 2022-07-01
    “…An intelligent diagnosis method of gear faults based on MGAN (Mixture Generative Adversarial Nets) and CNN (Convolutional Neural Networks) is proposed. …”
    Get full text
    Article
  5. 2185

    Epidemiological methods in transition: Minimizing biases in classical and digital approaches. by Sara Mesquita, Lília Perfeito, Daniela Paolotti, Joana Gonçalves-Sá

    Published 2025-01-01
    “…Therefore, we briefly describe some of the possible biases arising from varied collection methods and sources, and offer some recommendations to better explore the potential of Digital Epidemiology, particularly on how to help reduce inequity.…”
    Get full text
    Article
  6. 2186

    Secure network coding method merged with timestamp and homomorphic signature by Heng-li PEI, Tao SHANG, Jian-wei LIU

    Published 2013-04-01
    “…A secure network coding method merged with timestamp and homomorphic signature which can solve security issues in wireless multi-hop networks was proposed.The timestamp into RSA-based homomorphic signature scheme was brought and used to produce random coefficients of net it possible to defend pollution attacks and replay attacks simultaneously while maintaining the homomorphic property of the signature.The analysis that mainly focus on was the influence of random coefficients on decoding probability of network coding a security of the proposed scheme.Results indicate that the proposed scheme can defend pollution attacks and replay attacks simultaneously,and the ratio of overhead between RSA-based homomorphic signature scheme and the proposed scheme is approximates 1.…”
    Get full text
    Article
  7. 2187

    Method of reliability coefficients with adjustable values for steel structures design by V. V. Nadolski

    Published 2024-09-01
    Subjects: “…modified partial factor method…”
    Get full text
    Article
  8. 2188
  9. 2189

    Development of Difference Spectroscopic Method for the Estimation of Balsalazide in Bulk and in Formulation by K. Anandakumar, Nageswararao Pacha, J. Saminathan, R. Subathrai, Kumarasamy Gandla

    Published 2009-01-01
    “…A simple, precise and accurate difference spectroscopic method has been developed for the estimation of balsalazide in bulk and in pharmaceutical dosage form. …”
    Get full text
    Article
  10. 2190

    Cultural Method Considerations for Integrated Weed Management in Agronomic Crops by Prasanna Kharel, Pratap Devkota, Gregory MacDonald

    Published 2021-05-01
    “… This article provides growers with information on various cultural methods to increase weed control in their fields, reduce herbicide inputs, and contribute to integrated weed management. …”
    Get full text
    Article
  11. 2191

    Attack path prediction method based on causal knowledge net by Shuo WANG, Guang-ming TANG, Guang KOU, Hai-tao SONG

    Published 2016-10-01
    “…The existing attack path prediction methods can not accurately reflect the variation of the following attack path caused by the capability of the attacker.Accordingly an attack path prediction method based on causal knowledge net was presented.The proposed method detected the current attack actions by mapping the alarm sets to the causal knowledge net.By analyzing the attack actions,the capability grade of the attacker was inferred,according to which adjust the probability knowledge distribution dynamically.With the improved Dijkstra algorithm,the most possible attack path was computed.The experiments results indicate that the proposed method is suitable for a real network confrontation environment.Besides,the method can enhance the accuracy of attack path prediction.…”
    Get full text
    Article
  12. 2192

    FTIR: A novel method for identifying fish gut contents by Abolfazl Aminimehr, Mohammad Amini Chermahini, Laleh Moosavi Dehmoordi

    Published 2024-06-01
    “…However, the formulated feed, which is a mixture of various plant and animal-derived materials, and its resulting feces were not as distinguishable.Conclusion: According to the results, it seems that the FTIR will be practical and reliable method to identify foods used by fish in aquaculture or nature using fish feces. …”
    Get full text
    Article
  13. 2193

    Aircraft Bearing Fault Diagnosis Method Based on LSTM-IDRSN by Lei Wang, Kun He, Haipeng Fu, Weixing Chen

    Published 2025-01-01
    “…Additionally, the model maintains high precision and stability even under noise interference, outperforming other methods.…”
    Get full text
    Article
  14. 2194

    Current agritourism literature: What methods did researchers prefer? by Starman Ana, Pavić Lazar

    Published 2024-01-01
    “…More than half of original scientific studies opted for quantitative data collection and analysis, followed by qualitative methods (28%), mixed model (9%) and mixed methods (7%). …”
    Get full text
    Article
  15. 2195

    Rule-defect oriented browser XSS filter test method by Zhijie GUI, Hui SHU

    Published 2018-11-01
    “…In order to alleviate XSS (cross-site scripting) attacks,modern browsers use XSS filters for defense.It is difficult to effectively test and evaluate the security of browser XSS filters.The rule-defect is the defect and security problem in the implementation process of browser XSS filter.The formal definition,design test sample and scene generation algorithm were presented for browser XSS filter rule-defects.In order to quantitatively test and evaluate the filtering level of different browser XSS filters,combined with filtering success rate,false positive rate,input loss calculation filtering ability.Based on the proposed method,the prototype system is designed to automate the testing of several mainstream browser XSS filters,and the XSS filtering capabilities of different browsers are obtained.Further,after actual testing,the system also has the ability to discover undisclosed vulnerabilities.…”
    Get full text
    Article
  16. 2196

    Enriched Meshfree Method for an Accurate Numerical Solution of the Motz Problem by Won-Tak Hong

    Published 2016-01-01
    “…The Motz problem has been known as a benchmark problem to verify the efficiency of numerical methods in the presence of a jump boundary data singularity at a point, where an abrupt change occurs for the boundary condition. …”
    Get full text
    Article
  17. 2197
  18. 2198
  19. 2199

    Comprehensive review of greenness, whiteness, and blueness assessments of analytical methods by Sherin F. Hammad, Mohamed A. Adel Hamid, Latifa Adly, Samar H. Elagamy

    Published 2025-03-01
    “…Thus, modern assessment tools have evolved to include sample preparation in their evaluation, providing a more comprehensive and fair judgment of the sustainability of the method. Today, various metrics are available to evaluate the sustainability of analytical methods, including green metrics and models for assessing whiteness, blueness, or the practicality of the method. …”
    Get full text
    Article
  20. 2200

    Screening Methods for Southern Chinch Bug Resistance in St. Augustinegrass by Huangjun Lu, Ronald Cherry

    Published 2014-11-01
    “…(Photo credit: Long Ma, UF/IFAS Extension) ENY-480/IN1050: Screening Methods for Southern Chinch Bug Resistance in St. …”
    Get full text
    Article