Showing 2,281 - 2,300 results of 120,517 for search '"Methodism"', query time: 0.15s Refine Results
  1. 2281

    Effects of Milling Methods and Cultivars on Physicochemical Properties of Whole-Wheat Flour by Min Jeong Kang, Mi Jeong Kim, Han Sub Kwak, Sang Sook Kim

    Published 2019-01-01
    “…The aim of the present study was to investigate the influence of milling methods (jet mill (JM) and hammer mill (HM)) and wheat cultivars (Keumkang (K), Jokyung (J), and Anzunbaengi (A)) on physicochemical and dough properties of whole-wheat flour (WWF). …”
    Get full text
    Article
  2. 2282
  3. 2283

    Research on multi-address time-based blockchain covert communication method by Dongyan HUANG, Kun LI

    Published 2023-02-01
    “…Aiming at the problem of low amount of information carried by the existing block timestamp interval hiding method, a multi-address time-based blockchain covert communication method was proposed.Firstly, the ciphertext was split and transmitted by different addresses.The content of the ciphertext fragment was represented by the block timestamp interval of the address.Then the interval of the blocks was read and counted by the receiver where these addresses were located.Finally, the ciphertext was restored by combination.In addition, in view of the lack of concealment measures in the time-based blockchain covert communication system, a method of adjusting the time interval of transaction initiation was proposed to reduce the probability of address specificity caused by covert communication behavior.The experimental results verify that the transmission rate of the proposed method is about n times higher than that of the time-based blockchain covert communication method when n addresses are involved.…”
    Get full text
    Article
  4. 2284

    A Novel Balancing Method for Rotor Using Unsupervised Deep Learning by Shun Zhong, Liqing Li, Huizheng Chen, Zhenyong Lu

    Published 2021-01-01
    “…A novel balancing method for rotor based on unsupervised deep learning is proposed in this paper. …”
    Get full text
    Article
  5. 2285
  6. 2286

    Network Planning Method for Capacitated Metro-Based Underground Logistics System by Jianjun Dong, Wanjie Hu, Shen Yan, Rui Ren, Xiaojing Zhao

    Published 2018-01-01
    “…This paper aims at developing a metro system-based ULS network planning method. First, an evaluation model of underground freight volume was proposed considering service capacity, freight flow, and regional accessibility. …”
    Get full text
    Article
  7. 2287

    Strong measurement method of evidence conflict based on earth mover’s distance by Xin WANG, Wei FU

    Published 2022-05-01
    “…Aiming at the problem that the conflict factor k in D-S evidence theory cannot effectively measure the degree of conflict between two bodies of evidence (BoEs), the expected features of evidence conflict strong measurement function (ECSMF) were proposed, and then a new method of evidence conflict measurement based on earth mover’s distance (EMD)was put forward.The same number of focal elements between different BoEs was not required and the evidence conflict with non-singleton propositions could be directly calculate.The proposed method did not require The theory and experiments show that the size of conflict measure proposed can correctly represent the degree of conflict between two BoEs, and has all the expected features of ECSMF, which is an effective method of evidence conflict strong measurement.…”
    Get full text
    Article
  8. 2288

    Malicious code within model detection method based on model similarity by Degang WANG, Yi SUN, Chuanxin ZHOU, Qi GAO, Fan YANG

    Published 2023-08-01
    “…The privacy of user data in federated learning is mainly protected by exchanging model parameters instead of source data.However, federated learning still encounters many security challenges.Extensive research has been conducted to enhance model privacy and detect malicious model attacks.Nevertheless, the issue of risk-spreading through malicious code propagation during the frequent exchange of model data in the federated learning process has received limited attention.To address this issue, a method for detecting malicious code within models, based on model similarity, was proposed.By analyzing the iterative process of local and global models in federated learning, a model distance calculation method was introduced to quantify the similarity between models.Subsequently, the presence of a model carrying malicious code is detected based on the similarity between client models.Experimental results demonstrate the effectiveness of the proposed detection method.For a 178MB model containing 0.375MB embedded malicious code in a training set that is independent and identically distributed, the detection method achieves a true rate of 82.9% and a false positive rate of 1.8%.With 0.75MB of malicious code embedded in the model, the detection method achieves a true rate of 96.6% and a false positive rate of 0.38%.In the case of a non-independent and non-identically distributed training set, the accuracy of the detection method improves as the rate of malicious code embedding and the number of federated learning training rounds increase.Even when the malicious code is encrypted, the accuracy of the proposed detection method still achieves over 90%.In a multi-attacker scenario, the detection method maintains an accuracy of approximately 90% regardless of whether the number of attackers is known or unknown.…”
    Get full text
    Article
  9. 2289
  10. 2290
  11. 2291

    Investigating feature extraction by SIFT methods for prostate cancer early detection by Shadan Mohammed Jihad, Ali A. Alsaud, Firas H. Almukhtar, Shahab Kareem, Raghad Zuhair Yousif

    Published 2025-03-01
    “…This research study, therefore, seeks to explore the effectiveness of the SIFT method in improving feature extraction toward the accurate detection of incipient prostate cancer. …”
    Get full text
    Article
  12. 2292

    Transformer-based travel time estimation method for plateau and mountainous environments by Guangjun Qu, Kefa Zhou, Rui Wang, Dong Li, Yingpeng Lu, Zhihong Lv, Dequan Zhao, Aijun Zhang, Qing Zhang

    Published 2025-02-01
    “…The objective of this study is to develop TTE methods that are applicable to wilderness areas characterized by plateau and mountainous topography. …”
    Get full text
    Article
  13. 2293
  14. 2294

    Bending fatigue strength design method for machine components with complex geometries by Gang Deng, Tsutomu Nakanishi

    Published 2018-09-01
    “…The purpose of this study is to devise a bending fatigue strength evaluation method that can be widely used for any machine component under the consideration that bending fatigue breakage depends on the initiation of a surface fatigue crack, namely, the conditions for the initiation of a fatigue crack can be used as the criteria for bending fatigue strength design. …”
    Get full text
    Article
  15. 2295
  16. 2296
  17. 2297
  18. 2298

    Video as a Documentation Method: A Qualitative Study of Physiotherapists' Experiences by Silje Bechmann Granås, Ingrid Konstanse Ledel Solem, Ingrid Eitzen, Jenny M. Bergschöld, Cecilie Våpenstad, Wencke Vooren Aase, Trond Halvorsen

    Published 2025-01-01
    “…Aim: To investigate the potential for using video as a method of documentation in physiotherapy for children and adolescents, and potential facilitators and barriers for use and implementation. …”
    Get full text
    Article
  19. 2299

    Comparison of VIDAS and Radioimmunoassay Methods for Measurement of Cortisol Concentration in Bovine Serum by Daniela Proverbio, Roberta Perego, Eva Spada, Giada Bagnagatti de Giorgi, Angelo Belloli, Davide Pravettoni

    Published 2013-01-01
    “…Radioimmunoassay (RIA) is the “gold standard” method for evaluation of serum cortisol concentration. …”
    Get full text
    Article
  20. 2300

    Fabrication of Self-Cleaning Perfluoroacrylate Blend Films by Spray Coating Method by Sema Nur Belen, Özge Ünzal, Uğur Cengiz

    Published 2023-03-01
    “…This study fabricated the superhydrophobic blend coating using a spray coating method. The flat surface of PFMA homopolymer synthesized in scCO2 medium was fabricated free meniscus coating method due to the lack of solubility in the conventional solvent. …”
    Get full text
    Article