Showing 2,521 - 2,540 results of 120,517 for search '"Methodism"', query time: 0.17s Refine Results
  1. 2521

    Hish speed deep packet inspection method with low power dissipation by ZHU Guo-sheng1, YU Shao-hua1

    Published 2011-01-01
    “…Hish speed deep packet inspection using TCAM faces the problem of high power dissipation.A 2-phase DPI method BF-TCAM was proposed.The first phase used parallel Bloom filters to exclude the normal packets not including attack signatures.The second phase used TCAM to inspect suspicious packets including real attack packets and false positive packets of the first phase.The Bloom filters’ false negative probability is zero and false positive probability is very low.Since most of the network data traffic does not include attack signatures,the method can get high speed deep packet inspection with low power dissipation.…”
    Get full text
    Article
  2. 2522

    Indirect Method of Moisture Degree Evaluation in Varistors by Means of Dielectric Spectroscopy by Krzysztof Walczak

    Published 2024-12-01
    “…Their reliability, however, requires periodic inspection, which should specifically include assessment of their moisture content. So far, no method has been developed that would directly and non-invasively allow for the assessment of the moisture content of a varistor. …”
    Get full text
    Article
  3. 2523

    Bayesian-network-approximate-reasoning-based method for network vulnerabilities evaluation by JIA Wei1, LIAN Yi-feng2, FENG Deng-guo2, CHEN Si-si3

    Published 2008-01-01
    “…To evaluate the large-scale computer networks,a Bayesian-network-approximate-reasoning-based method for vulnerabilities evaluation was proposed.First,it models the elements which compose the network and the factors which affect the network security.Second,it builds the attack state graph(ASG) of the computer network to describe the process of vulnerability exploitation.Then,it makes the approximate reasoning to the ASG by stochastic sampling.At last,after the samples analysis and statistic,it achieves the quantitative evaluation result and will provide the theoretical evidence to improve the network security.…”
    Get full text
    Article
  4. 2524
  5. 2525

    Adaptive selection method of differential privacy GAN gradient clipping thresholds by Peng GUO, Shangping ZHONG, Kaizhi CHEN, Hang CHENG

    Published 2018-05-01
    “…A method of adaptive selection of differential privacy GAN gradient clipping threshold was proposed.The method assumes that a small portion of public data that is identically distributed with the private data can be accessed,a batch of data is randomly selected from the public data,a clipping threshold is set as an average gradient norm of the batch of data,and the above operations are iterated until the network converges.The method was verified on the Mnist and Cifar10 data sets.The results show that under a reasonable privacy budget,the accuracy of CNN classifiers is improved by 1%~4% compared with the differential privacy auxiliary classifier GAN,inception scores increased by 0.6~1.2.…”
    Get full text
    Article
  6. 2526

    A System Identification-Based Damage-Detection Method for Gravity Dams by Masoud Mirtaheri, Mojtaba Salkhordeh, Masoud Mohammadgholiha

    Published 2021-01-01
    “…In order to evaluate the efficiency of the proposed method in field condition, 10% noise is added to the structural response. …”
    Get full text
    Article
  7. 2527

    Research on the improvement method of imbalance of ground penetrating radar image data by Ligang Cao, Lei Liu, Congde Lu, Ruimin Chen

    Published 2025-01-01
    “…The effect on accuracy by varying the proportions of different kinds of samples and traditional expansion methods is also explored. The improvement of the classification network accuracy and FlD metrics illustrates the better performance of the proposed method.…”
    Get full text
    Article
  8. 2528

    Log-Cubic Method for Generation of Soil Particle Size Distribution Curve by Songhao Shang

    Published 2013-01-01
    “…The log-cubic method and commonly used log-linear and log-spline methods were evaluated by the leave-one-out cross-validation method for 394 soil samples extracted from UNSODA database. …”
    Get full text
    Article
  9. 2529

    An Accurate Integral Method for Vibration Signal Based on Feature Information Extraction by Yong Zhu, Wanlu Jiang, Xiangdong Kong, Zhi Zheng, Haosong Hu

    Published 2015-01-01
    “…After summarizing the advantages and disadvantages of current integral methods, a novel vibration signal integral method based on feature information extraction was proposed. …”
    Get full text
    Article
  10. 2530

    Evaluating Lateral Spreading Using Newmark Method Based on Liquefaction Triggering by Yanxin Yang, Junhua Chen, Zhenqiang Zhang, Jianlin Ma

    Published 2020-01-01
    “…In this paper, a simplified prediction method based upon Newmark sliding block analysis was proposed to predict the liquefaction-induced lateral spreading. …”
    Get full text
    Article
  11. 2531

    Calculating the feature method of short text based on analytic hierarchy process by Xue-qiang ZOU, Xiu-guo BAO, Xiao-jun HUANG, Hong-yuan MA, Qing-sheng YUAN

    Published 2016-12-01
    “…In order to model the accurate interest preference of microblog users and discover user groups with similar in-terest, a new method was proposed which considered the total amount of retweets, comments and attitudes of each mi-croblog for text feature calculation with utilizing classic analytical hierarchy process method. …”
    Get full text
    Article
  12. 2532

    A Comprehensive Review of Flamelet Methods: Future Directions and Emerging Challenges by Mohammed Niyasdeen Nejaamtheen, Jeong-Yeol Choi

    Published 2024-12-01
    “…The review also highlights ongoing debates within the research community regarding the validity of the flamelet approach, particularly in high-speed flows, and suggests that while alternative methods may offer more detailed modeling, they often come with prohibitive computational costs. …”
    Get full text
    Article
  13. 2533

    New version of Universal modeling method for centrifugal compressors calculation development by Yu. B. Galerkin, A. A. Drozdov

    Published 2019-06-01
    “…The math model of Universal modeling method is a sum of algebraic equations for calculation of head losses. …”
    Get full text
    Article
  14. 2534

    Study on the Analyzing and Simulating Method of Workspace of Force Reflecting Main Manipulator by Qu Jinxing, Feng Feng

    Published 2016-01-01
    “…The functional relationships between robotic end- effector space position and variables for robotic joints are obtained through the main manipulator forward kinematics solution calculation,a simulation of main manipulator workspace is conducted by adopting numerical,graphical method and analytic method in the Matlab. According to the position information of collecting by 3D electromagnetic tracking system,through the quantitative and qualitative analysis,the correctness of the simulation method for solving the main manipulator workspace is verified. …”
    Get full text
    Article
  15. 2535
  16. 2536

    Method for Correction of Design Diacoptic Z-Matrix of Complicated Power System by N. P. Badalyan

    Published 2004-06-01
    “…The paper proposes correction method of a design diacoptic Z-matrix of complicated power system that ensures high manoeuvrability while calculating steady - state conditions.…”
    Get full text
    Article
  17. 2537
  18. 2538

    LIGHTWEIGHT DESIGN OF STRUCTURES BASED ON A SEMIDEFINITE PROGRAMMING METHOD (MT) by WANG XingFeng, ZHANG Qing, QIN XianRong, SUN YuanTao

    Published 2022-01-01
    “…A semidefinite programming-based optimization method is proposed for lightweight design of boom and stay bars of container cranes. …”
    Get full text
    Article
  19. 2539

    Verifiable federated aggregation method based on homomorphic proxy re-authentication by YANG Fan, SUN Yi, CHEN Xingyuan, GAO Qi

    Published 2024-06-01
    “…Additionally, a privacy-preserving, efficient, and trustworthy federated learning aggregation method was constructed, combining the double mask technique. …”
    Get full text
    Article
  20. 2540