Showing 2,501 - 2,520 results of 120,517 for search '"Methodism"', query time: 0.17s Refine Results
  1. 2501

    Infrared Drying as a Quick Preparation Method for Dried Tangerine Peel by Mingyue Xu, Guifang Tian, Chengying Zhao, Aftab Ahmad, Huijuan Zhang, Jinfeng Bi, Hang Xiao, Jinkai Zheng

    Published 2017-01-01
    “…To establish the most convenient and effective method to dry tangerine peels, different methods (sun drying, hot-air drying, freeze drying, vacuum drying, and medium- and short-wave infrared drying) were exploited. …”
    Get full text
    Article
  2. 2502

    Stochastic job stream scheduling method for cipher chip with multi-cryptography by Li LI, Guo-zhen SHI, Kui GENG, Xiu-ze DONG, Xuan WANG, Feng-hua LI

    Published 2016-12-01
    “…Aiming at the rich of safety requirements of tasks which resulting in random cross access to multi cipher algorithms, a hierarchical hardware scheduling method was presented with associated control based on data identifica-tion. …”
    Get full text
    Article
  3. 2503

    Traffic anomaly detection method in networks based on improved clustering algorithm by Hong-cheng LI, Xiao-ping WU, Hong-hai JIANG

    Published 2015-12-01
    “…To solve the problem that traditional traffic abnormal detection methods were not accurate enough,a traf-fic anomaly detection method based on improved k-means was proposed.All kinds of network traffic data were pre-processed to make k-means algorithm can apply to enumeration data detection.Then a features selection method was pro-posed with the analysis of the distribution of network traffic data to avoid the distance useless caused by too much fea-tures.Furthermore,the clustering process of K clusters was optimized based on dichotomy,aiming to reduce the effects of initial clusters centers selection.Simulation results demonstrate the effectiveness of the algorithm.…”
    Get full text
    Article
  4. 2504

    A High-Order Compact 2D FDFD Method for Waveguides by Gang Zheng, Bing-Zhong Wang

    Published 2012-01-01
    “…Numerical examples are given, which show that this high-order compact 2D FDFD method is more efficient than the low-order compact 2D FDFD method and has a less storage cost.…”
    Get full text
    Article
  5. 2505

    Study on the Load Spectrum Test Method and Experiment of Shaft Parts of Loader by Wan Yipin, Jia Jie, Wei Yongxiang, Song Xuding

    Published 2017-01-01
    “…In order to obtain the load time history data of the shaft parts of loader drive system under the actual load,based on the load transfer principle and the design theory of the sensor,the load time history of shaft parts of the multi parameter test method is researched.Aiming at the key and difficult points of the load spectrum testing of the loader drive system,the dynamic telemetry device is used to solve the problem of parameter measurement in small space.The load signal acquisition system of loader shaft parts is established.And the system consisted of half shaft,drive shaft torque and speed parameters acquisition,engine speed parameters and the acquisition of gear parameters.The load time history data of the shaft parts are obtained by selecting the 50 type loader as the test sample.The test results show that the load test method is accurate and feasible,and the test method has very good generality and could be used for testing the load data of shaft parts of automobile,agricultural machinery and so on.…”
    Get full text
    Article
  6. 2506

    Microblog hot topic detection method based on meaningful string clustering by Min HE, Li-hong WANG, Pan DU, Jin ZHANG, Xue-qi CHENG

    Published 2013-08-01
    “…Aiming at the properties of sparse feature, content fragmentation for microblog data, a hot topic detection method was proposed based on meaningful string clustering. …”
    Get full text
    Article
  7. 2507

    Risk Assessment Method for Offshore Structure Based on Global Sensitivity Analysis by Zou Tao, Li Huajun, Liu Defu

    Published 2012-01-01
    “…Based on global sensitivity analysis (GSA), this paper proposes a new risk assessment method for an offshore structure design. This method quantifies all the significances among random variables and their parameters at first. …”
    Get full text
    Article
  8. 2508
  9. 2509

    Optimally stable fifth-order integration methods: a numerical approach by D. J. Rodabaugh, S. Thompson

    Published 1978-01-01
    Subjects: “…linear multistep methods…”
    Get full text
    Article
  10. 2510

    INTERVAL ANALYSIS METHOD OF RELIABILITY PREDICTION ON AUTOMOTIVE BRAKE SYSTEM AND TIRE by JIA AiQin, WEI YongQiang, JIANG ZhiQiang

    Published 2015-01-01
    “…The calculation results show that this method is effective and feasible, which provide a reference design for improvement and the adjustment of automotive brake system and tire.…”
    Get full text
    Article
  11. 2511

    An intrusion detection method based on depthwise separable convolution and attention mechanism by Zhifei ZHANG, Feng LIU, Yiyang GE, Shuo LI, Yu ZHANG, Ke XIONG

    Published 2023-03-01
    “…In order to improve the accuracy of multi-classification in network intrusion detection, an intrusion detection method was proposed based on depthwise separable convolution and attention mechanism.By constructing a cascade structure combining depthwise separable convolution and long-term and short-term memory networks, the spatial and temporal features of network traffic data can be better extracted.A mixed-domain attention mechanism was introduced to enhance the detection performance.To solve the problem of low detection rate in some samples, a data balance strategy based on the combination of the variational auto-encoder (VAE) the generative adversarial network (GAN) and was designed, which can effectively cope with imbalanced datasets and improve the adaptability of the proposed detection method.The experimental results show that the proposed method is able to achieve 99.80%, 99.32%, and 83.87% accuracy on the CICIDS-2017, NSL-KDD and UNSW-NB15 datasets, which is improved by 0.6%, 0.5%, and 2.3%, respectively.…”
    Get full text
    Article
  12. 2512

    CALCULATION METHODS OF OPTIMAL ADJUSTMENT OF CONTROL SYSTEM THROUGH DISTURBANCE CHANNEL by I. M. Golinko, G. G. Kulakov, Yu. M. Kovrigo

    Published 2014-10-01
    “…These methods allow to optimize the analog and digital regulators, taking into account minimization of regulated influences. …”
    Get full text
    Article
  13. 2513

    Formal modeling and security analysis method of security protocol based on CPN by Xiang GONG, Tao FENG, Jinze DU

    Published 2021-09-01
    “…To solve the problem of modeling and analyzing with colored Petri net (CPN), which was determining vulnerabilities in hole location but couldn’t identify any attack path, and the problem of when the introduction of the attacker model, the number of possible message paths in the CPN formal model of security protocol surges the state space prone to explosion, which made it difficult to extract accurate attack paths, the formal modeling method of security protocol was improved base on CPN, the attack paths were verified and extracted, further the fine-grained protocol modeling and control were adopted.As well as in the aspect of state-space convergence, and a waiting-sync method for different processes of CPN model in each hierarchy model was proposed, which effectively controlled the state-space scale of the model.Through the security evaluation and analysis of TMN protocol, 25 attack paths of the protocol are extracted successfully, the security of the protocol is evaluated, and the effectiveness of the proposed method is proved.…”
    Get full text
    Article
  14. 2514
  15. 2515

    The Propagation of Thermoelastic Waves in Different Anisotropic Media Using Matricant Method by Nurlybek A. Ispulov, Almar Zh. Zhumabekov, Abdul Qadir, Almas A. Kurmanov, Sholpan N. Sarymova, Kairat R. Dossumbekov, Erkin Arinov

    Published 2022-01-01
    “…In this paper, an analytical study has been carried out by using method of matricant to investigate the propagation of longitudinal elastic and heat waves in the anisotropic medium of a monoclinic, trigonal, hexagonal, and cubical crystal systems. …”
    Get full text
    Article
  16. 2516

    A Modern Syllogistic Method in Intuitionistic Fuzzy Logic with Realistic Tautology by Ali Muhammad Rushdi, Mohamed Zarouan, Taleb Mansour Alshehri, Muhammad Ali Rushdi

    Published 2015-01-01
    “…The Modern Syllogistic Method (MSM) of propositional logic ferrets out from a set of premises all that can be concluded from it in the most compact form. …”
    Get full text
    Article
  17. 2517
  18. 2518

    A New Method of Moments for the Bimodal Particle System in the Stokes Regime by Yan-hua Liu, Zhao-qin Yin

    Published 2013-01-01
    “…In order to investigate this system, the conventional method of moments (MOM) should be extended to include the interaction between different particle clusters. …”
    Get full text
    Article
  19. 2519
  20. 2520