Showing 2,541 - 2,560 results of 120,517 for search '"Methodism"', query time: 0.15s Refine Results
  1. 2541
  2. 2542

    Design of Normal Concrete Mixtures Using Workability-Dispersion-Cohesion Method by Hisham Qasrawi

    Published 2016-01-01
    “…The workability-dispersion-cohesion method is a new proposed method for the design of normal concrete mixes. …”
    Get full text
    Article
  3. 2543

    An interaction relational inference method for a coal-mining equipment system by Xiangang Cao, Jiajun Gao, Xin Yang, Fuyuan Zhao, Boyang Cheng

    Published 2025-01-01
    “…This study proposes an interaction-relation inference method EMIFC-CIRI for coal-mining equipment systems. …”
    Get full text
    Article
  4. 2544

    Optimal Analysis Method for Dynamic Contrast-Enhanced Diffuse Optical Tomography by Michael Ghijsen, Yuting Lin, Mitchell Hsing, Orhan Nalcioglu, Gultekin Gulsen

    Published 2011-01-01
    “…In this study, we investigated and compared different reconstruction methods and analysis approaches for regular endogenous DOT and DCE-DOT with and without MR anatomical a priori information for arbitrarily-shaped objects. …”
    Get full text
    Article
  5. 2545

    Exponentially Fitted Numerical Method for Singularly Perturbed Differential-Difference Equations by Habtamu Garoma Debela, Solomon Bati Kejela, Ayana Deressa Negassa

    Published 2020-01-01
    “…This paper presents a numerical method to solve singularly perturbed differential-difference equations. …”
    Get full text
    Article
  6. 2546
  7. 2547

    Fast demagnetization method for power transformers combined with residual flux measurement by Yuzhan Ren, Chengcheng Liu, Youhua Wang

    Published 2025-03-01
    “…In addition, the lack of effective Br measurement methods makes it impossible to evaluate the demagnetization effect. …”
    Get full text
    Article
  8. 2548

    Method for Information Security Events Detection in a Cloud Signature Systems by V. A. Gerasimov, O. V. Boyprav

    Published 2024-06-01
    “…The parameters and mechanisms that can be used as the basis for a method for detecting information security events in cloud signature systems, where the signature activation protocol is used, and the development of such a method are substantiated. …”
    Get full text
    Article
  9. 2549

    « ‘A flat dichotomist’ : Critique marlovienne de la méthode ramiste » by Laetitia Sansonetti

    Published 2014-10-01
    “…In this play, but also in other dramatic works such as Doctor Faustus and The Jew of Malta, Marlowe stages the ambiguities attached to “Ramus”, who was seen by some as a martyr for method, while others deemed him to be an arrogant upstart. …”
    Get full text
    Article
  10. 2550

    Large Rapidity Gap Method to Select Soft Diffraction Dissociation at the LHC by Emily Nurse, Sercan Sen

    Published 2016-01-01
    “…In order to observe diffractive events in this way, we consider the pseudorapidity acceptance in the forward region of the ATLAS and CMS detectors at the Large Hadron Collider (LHC) and discuss the methods to select soft diffractive dissociation for pp collisions at s=7 TeV. …”
    Get full text
    Article
  11. 2551
  12. 2552

    Exact Solutions of Travelling Wave Model via Dynamical System Method by Heng Wang, Longwei Chen, Hongjiang Liu

    Published 2016-01-01
    “…By using the method of dynamical system, the exact travelling wave solutions of the coupled nonlinear Schrödinger-Boussinesq equations are studied. …”
    Get full text
    Article
  13. 2553

    Optimal Routing of Solid Waste Collection Trucks: A Review of Methods by Alhassan Sulemana, Emmanuel A. Donkor, Eric K. Forkuo, Sampson Oduro-Kwarteng

    Published 2018-01-01
    “…This paper reviews the effect of applying optimization methods on the collection process of solid waste, with particular interest in mathematical programming and geographic information system approaches in developing countries. …”
    Get full text
    Article
  14. 2554
  15. 2555

    Software diversity evaluation method based on the properties of ROP/JOP gadgets by Yuning CHI, Yunfei GUO, Yawen WANG, Hongchao HU

    Published 2022-12-01
    “…In order to reduce the risk of rapid spread of homogeneous attacks in network systems, and enhance network and software security, software diversification technologies are applied widely nowadays.Software diversification aims to generate functionally equivalent but internally changed program variants, thereby alter a single operating environment and mitigating homogenization attacks.The existing diversified technical evaluation index ROP gadgets survival rate is difficult to directly reflect the safety impact and the evaluation method is single.In order to evaluate the effectiveness of the diversification method more comprehensively and effectively, a software diversification evaluation method based on the properties of ROP/JOP gadgets is proposed, by analyzing common code reuse attacks, and turns abstract quantification into concrete indicators evaluates the security gain and effect of diversified methods from three aspects of space, time and quality.The method first discusses how diversification techniques affect ROP/JOP attacks according to the three properties of gadgets similarity, damage degree and availability.Nine kinds of diversification methods, such as instruction replacement, NOP insertion, and control flow flattening, are used to diversify the GNU coreutils assembly to generate diversification assembly.Experiments based on the property of gadgets are carried out on the diverse assemblies, and the effectiveness of different diversification methods and the impact on attacks are evaluated according to the experimental results.The experimental results show that this method can accurately evaluate the security gain of software diversification methods, the diversification technology will lead to the increase of the attack chain space required by the ROP/JOP attack, the longer time to construct the attack chain and the lower the attack success rate.The effects of different diversification methods are different, it has a guiding role for the follow-up research on diversified technologies with higher safety gains.…”
    Get full text
    Article
  16. 2556

    Évaluer le développement durable : enjeux, méthodes, démarches d’acteurs by Bruno Villalba, Antoine Goxe, Jean-Christophe Lipovac

    Published 2005-12-01
    “…Le 3 novembre 2005, le Centre Ressource du Développement Durable du Nord-Pas de Calais (CERDD) et le réseau de recherche « Développement durable et territoires fragiles » organisaient une journée d’étude et de débat sur le thème : « Évaluer le développement durable : enjeux, méthodes, démarches d’acteurs ». Cette rencontre, qui bénéficiait du soutien du Conseil régional Nord–Pas-de-Calais, entendait contribuer à définir des outils d’aide à l’élaboration de politiques publiques locales de développement durable. …”
    Get full text
    Article
  17. 2557

    Numerical Analysis of Hydrodynamics for Bionic Oscillating Hydrofoil Based on Panel Method by Gang Xue, Yanjun Liu, Muqun Zhang, Hongpeng Ding

    Published 2016-01-01
    “…The kinematics model based on the Slender-Body theory is proposed from the bionic movement of real fish. The Panel method is applied to the hydrodynamic performance analysis innovatively, with the Gauss-Seidel method to solve the Navier-Stokes equations additionally, to evaluate the flexible deformation of fish in swimming accurately when satisfying the boundary conditions. …”
    Get full text
    Article
  18. 2558

    STUDY ON THE RIGIDITY OF THE TRUCK SCALE BODY BASED ON THE PRESTRESSED-TREATMENT METHOD by WEI TiePing, YANG XiaoXiang, XU YiQing, YAO JinHui

    Published 2017-01-01
    “…The prestressedtreatment method of steel structure was applied to the welding procedure of the truck scale body and U-beam. …”
    Get full text
    Article
  19. 2559

    Fast reconstruction method for compressed sensing model with semi-tensor product by Jinming WANG, Shiping YE, Lizhe YU, Sen XU, Yanjun JIANG

    Published 2018-07-01
    “…To reduce the storage space of random measurement matrix and improve the reconstruction efficiency for compressed sensing (CS),a new sampling approach for CS with semi-tensor product (STP-CS) was proposed.The proposed approach generated a low dimensional random measurement matrix to sample the sparse signals.Then the solutions of the sparse vector were estimated group by group with a l<sub>q</sub>-minimization (0&lt;q&lt;1) iteratively re-weighted least-squares (IRLS) algorithm.Compared with traditional compressed sensing methods,the proposed approach outperformed conventional CS in speed of reconstruction and that it also obtained comparable quality in the reconstruction.Numerical experiments were conducted using gray-scale images,the peak signal-to-noise ratio (PSNR) and the reconstruction time of the reconstruction images were compared with the random matrices with different dimensions.Comparisons were also conducted with other low storage techniques.Numerical experiment results show that the STP-CS can effectively reduce the storage space of the random measurement matrix to <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mi>M</mi> <mi>t</mi> </mfrac> <mtext>×</mtext><mfrac> <mi>N</mi> <mi>t</mi> </mfrac> </math></inline-formula> and decrease tow orders of magnitude of time that for conventional CS,while maintaining the reconstruction quality.Numerical results also show that the reconstruction time can be effectively improved 260 for the image size of 1 024×1 024.…”
    Get full text
    Article
  20. 2560