Showing 2,401 - 2,420 results of 120,517 for search '"Methodism"', query time: 0.19s Refine Results
  1. 2401
  2. 2402

    A LOW-LOAD-TRUNCATION METHOD FOR FATIGUE CRACK GROWTH TESTS by ZHANG HaiYing, DONG DengKe, CHEN Li, ZANG WeiFeng, YAN WenWei

    Published 2016-01-01
    “…Based on the dependence of fatigue crack growth( FCG) threshold on stress ratio,a low-load-truncation method for FCG tests is proposed. The effects of FCG property,stress amplitude and stress ratio are considered by this method. …”
    Get full text
    Article
  3. 2403

    Review of current methods of preparation and distribution of DMEK graft at the eye banks by Shalini Singh, Priyanka Pantola, Sunita Chaurasia, Sujata Das, Somasheila Murthy

    Published 2025-01-01
    “…Eye banks across various countries have devised and adopted different methods of providing DMEK grafts based on the demands and preferences of corneal surgeons. …”
    Get full text
    Article
  4. 2404
  5. 2405

    Intelligent route planning method with jointing topology control of UAV swarm by Zhi YAN, Zhenglun YI, Bo OUYANG, Yaonan WANG

    Published 2024-02-01
    “…Existing routing protocols without awareness of the topology causes excessive retransmissions, energy holes, and long delay, data routing performance was seriously deteriorated.Considering the relation of topology and routing, an intelligent route planning with jointing topology control (IRPJTC) method was proposed.IRPJTC consisted of two part, the virtual force-based adaptive topology control (VFATC), and the PPO-based geographic routing protocol (PPO-GRP).Based on neighbor’s mobility information, the distance between UAVs was adaptively adjusted by VFATC to provide stable links between UAVs.Combined with link stability metric in VFATC, end-to-end delay and energy consumption, a multi-objective reward function was designed by PPO-GRP to train optimal routing strategy.According to the performance study, the proposed IRPJTC reduces existing routing protocols by 12.11% of end-to-end delay, and 4.56% of energy consumption, and has a better energy balance ability.…”
    Get full text
    Article
  6. 2406

    An Exponential Active Queue Management Method Based on Random Early Detection by Hussein Abdel-Jaber

    Published 2020-01-01
    “…The reported results showed that E_RED offered a marginally higher satisfactory performance with reference to mql and D than that found in common AQM methods in cases of heavy congestion. Moreover, RED_E compares well with the considered AQM methods with reference to the above evaluation performance measures using minimum threshold position (min threshold) at a router buffer.…”
    Get full text
    Article
  7. 2407

    PhishingAgent: an agentic workflow method for advanced phishing email detection by JIN Jiandong, HUANG Zheng, HU Zhanyu, ZOU Yuanxin, QIN Huidong, LAI Qingnan, YANG Jia, ZHOU Changling

    Published 2024-11-01
    “…To address the increasing complexity of advanced persistent threat (APT) and phishing email attacks, an intelligent agentic workflow method for phishing email detection called PhishingAgent was proposed. …”
    Get full text
    Article
  8. 2408

    Subsidence Control Design Method and Application to Backfill-Strip Mining Technology by Xiaojun Zhu, Feng Zha, Guangli Guo, Pengfei Zhang, Hua Cheng, Hui Liu, Xiaoyu Yang

    Published 2021-01-01
    “…A subsidence control design method of backfill-strip mining was proposed in this paper based on the subsidence control effects and economic benefits. …”
    Get full text
    Article
  9. 2409

    Solution Method of Common Constraint of the Mechanism in the Modified G-K's Formula by Xu Zhaotang

    Published 2023-04-01
    “…The common constraint of the mechanism is equal to the number of coordinate directions with common constraint. This method does not need the screw theory to solve the common constraints of the mechanism, which is convenient for engineering and technical personnel to solve the common constraints of the mechanism. …”
    Get full text
    Article
  10. 2410
  11. 2411

    Computation Method for the Settlement of a Vertically Loaded Pile in Sloping Ground by Chong Jiang, Wen-yan Wu, Jia-li He, Lu-jie Chen

    Published 2020-01-01
    “…Based on the hyperbolic curve tangent modulus method and the wedge stress theory, this paper proposes a calculation method for the settlement of a vertically loaded single pile in sloping ground. …”
    Get full text
    Article
  12. 2412

    Software refactoring prediction evaluation method based on deep learning models by Yichi ZHANG, Yang ZHANG, Yanlei LI, Kun ZHENG, Wei LIU

    Published 2024-12-01
    “…Aiming at the lack of research on the performance of deep learning models in predicting software refactoring in the current field, a deep learning-based software refactoring prediction evaluation method was proposed to assess the refactoring predictive performance of these models. …”
    Get full text
    Article
  13. 2413

    Thermoelectric Characterization of IGBT Power Modules: An Approach by Static and Dynamic Methods by Deivid F. de Souza, Diego S. Greff

    Published 2025-01-01
    “…The research employs the Thermo Electric Sensitive Parameter method to measure the Virtual Junction Temperature and obtain the Thermal Impedance curve. …”
    Get full text
    Article
  14. 2414

    Simplified Analytical Method for Estimating the Resistance of Lock Gates to Ship Impacts by Loïc Buldgen, Hervé Le Sourne, Philippe Rigo

    Published 2012-01-01
    “…In this paper, a simplified analytical method is presented to evaluate the resistance of such structures under collision. …”
    Get full text
    Article
  15. 2415
  16. 2416

    Bianchi Scrotal Orchiopexy Method: An Alternative Surgical Technique for Undescended Testicles by Kenan Yalcin, Engin Kolukcu, Fatih Firat

    Published 2024-11-01
    “…We aimed to evaluate the surgical outcomes of patients who underwent a single transverse scrotal incision for PUT. Methods: The data of 212 patients who underwent scrotal orchidopexy for PUT between 2018 and 2022 at our clinic were retrospectively analyzed. …”
    Get full text
    Article
  17. 2417
  18. 2418

    Authentication method in SWIM based on improved Diameter/EAP-MD5 by Zhi-jun WU, Ting ZHAO, Jin LEI

    Published 2014-08-01
    “…Experi-ments on the security of SWIM authentication service based on Diameter are performed in SWIM simulation environ-ment, results show that the improved Diameter/EAP-MD5 authentication method can enhance the security of SWIM au-thentication and guarantee SWIM security service.…”
    Get full text
    Article
  19. 2419

    Exponential Collocation Method for Solutions of Singularly Perturbed Delay Differential Equations by Şuayip Yüzbaşı, Mehmet Sezer

    Published 2013-01-01
    “…Also, an error analysis technique based on the residual function is introduced for the method. Four examples are considered to demonstrate the performance of the proposed scheme, and the results are discussed.…”
    Get full text
    Article
  20. 2420

    Low fluctuation stiffness design method for vibration reduction of helical gears by YOU Zhiwei, GAO Jingtao, LI Haonan

    Published 2025-01-01
    “…Then it was compared with the finite element method to verify the correctness and effectiveness of the parameter design method and the analytical mesh stiffness model. …”
    Get full text
    Article