Showing 2,561 - 2,580 results of 120,517 for search '"Methodism"', query time: 0.15s Refine Results
  1. 2561

    Towards Sophisticated Air Traffic Control System Using Formal Methods by Abdessamad Jarrar, Youssef Balouki

    Published 2018-01-01
    “…In such a critical safety system, the use of robust formal methods that assure bugs absence is highly required. …”
    Get full text
    Article
  2. 2562

    A Fractional Trust Region Method for Linear Equality Constrained Optimization by Honglan Zhu, Qin Ni, Liwei Zhang, Weiwei Yang

    Published 2016-01-01
    “…A quasi-Newton trust region method with a new fractional model for linearly constrained optimization problems is proposed. …”
    Get full text
    Article
  3. 2563

    Solar photovoltaic panel soiling accumulation and removal methods: A review by Yunpeng Liu, Haoyi Li, Le Li, Xiaoxuan Yin, Xinyue Wu, Zheng Su, Fengsheng Gao, BinBin Cai, Li Tang, Songsong Zhou

    Published 2024-12-01
    “…In addition, the principles, status quo, effects, costs, advantages, and disadvantages of existing soiling removal methods are specifically described, thus providing a reference for the selection of soiling removal methods in different regions. …”
    Get full text
    Article
  4. 2564

    Shape Reconstruction for Unsteady Advection-Diffusion Problems by Domain Derivative Method by Wenjing Yan, Jian Su, Feifei Jing

    Published 2014-01-01
    “…This allows the investigation of iterative method for the ill-posed problem. By the parametric method, a regularized Gauss-Newton scheme is employed to the shape inverse problem. …”
    Get full text
    Article
  5. 2565

    APPLICATION OF LEXICOGRAPHIC METHODS IN FINDING NEW SOLUTIONS FOR THE CONSTRUCTION OF SWITCH FAUCETS by VLAD ANDREI CIUBOTARIU, IONEL OLARU, CRINA MARIA RADU, COSMIN GRIGORAS

    Published 2021-01-01
    “… Methods and techniques to stimulate creativity are indispensable in the process of obtaining more reliable and competitive products. …”
    Get full text
    Article
  6. 2566

    Maximum Mutual Information Feature Extraction Method Based on the Cloud Platform by Shasha Wei, Huijuan Lu, Wei Jin, Chao Li

    Published 2013-10-01
    “…With the large-scale application of gene chip,gene expression data with high dimension which exists a large number of irrelevant and redundant features may reduce classifier performance problem.A maximum mutual information feature extraction method based on cloud platforms was proposed.Hadoop cloud computing platform could be a parallel computing after gene expression data segmentation,features was extracted at the same time combined with the maximum mutual information method and the characteristics of cloud computing platform filter model was realized.Simulation experiments show that the maximum mutual information feature extraction method based on the cloud platform can rapid extraction of features in a higher classification accuracy which save a lot of time resources to make a highly efficient gene feature extraction system.…”
    Get full text
    Article
  7. 2567

    Network traffic anomaly detection method based on multi-scale characteristic by Xueyuan DUAN, Yu FU, Kun WANG, Taotao LIU, Bin LI

    Published 2022-10-01
    “…Aiming at the problem that most of the traditional network traffic anomaly detection methods only pay attention to the fine-grained features of traffic data, and make insufficient use of multi-scale feature information, which may lead to low accuracy of anomaly detection results, a network traffic anomaly detection method based on multi-scale features was proposed.The original traffic was divided into sub-sequences with multiple observation spans by using multiple sliding windows of different scales, and the multi-level sequences of each sub-sequence were reconstructed by wavelet transform technology.Multi-level reconstructed sequences were generated by Chain SAE through feature space mapping, and a preliminary judgment of abnormality was made by the classifiers of each level according to the errors of the reconstructed sequences.The weighted voting strategy was adopted to summarize the preliminary judgment results of each level to form the final result judgment.Experimental results show that the proposed method can effectively mine the multi-scale feature information of network traffic, and the detection performance of abnormal traffic is obviously improved compared with traditional methods.…”
    Get full text
    Article
  8. 2568

    HPTLC Method for Simultaneous Determination of Lopinavir and Ritonavir in Capsule Dosage Form by A. V. Sulebhavikar, U. D. Pawar, K. V. Mangoankar, N. D. Prabhu-Navelkar

    Published 2008-01-01
    “…A rapid and simple high performance thin layer chromatography (HPTLC) method with densitometry at λ=263 nm was developed and validated for simultaneous determination of lopinavir and ritonavir from pharmaceutical preparation. …”
    Get full text
    Article
  9. 2569

    X-Ray imaging method for in-situ study of particle-laden flows by Julian Kattinger, Phi-Long Chung, Mike Kornely, Julian Ehrler, Marc Kreutzbruck, Christian Bonten

    Published 2025-02-01
    “…The study successfully visualized a parabolic velocity profile, demonstrating the method’s efficacy.  …”
    Get full text
    Article
  10. 2570
  11. 2571
  12. 2572
  13. 2573
  14. 2574

    Key path analysis method for large-scale industrial control network by Yaofang ZHANG, Zheyu ZHANG, Haikuo QU, Ge ZHANG, Zibo WANG, Bailing WANG

    Published 2021-12-01
    “…In order to solve the problem of high time-consuming and resource-consuming quantitative calculation of large-scale industrial control network attack graphs, a key path analysis method for large-scale industrial control networks was proposed.Firstly, the idea of cut set was used to calculate the key nodes set of Bayesian attack graph by combining the atomic attack income in industrial control network, which solved the problem that the current cut set algorithm only considers the key nodes in graph structure.Secondly, a dynamic updating strategy of Bayesian attack graph which only updated the attack probability of key nodes was proposed to efficiently calculate the attack probability of the whole graph and analyze the key path of attack graph.The experimental results show that the proposed method can not only ensure the reliability of the calculation results of large-scale industrial control attack graphs, but also can significantly reduce the time consumption and have a significant improvement in the calculation efficiency.…”
    Get full text
    Article
  15. 2575
  16. 2576

    Application of Piecewise Successive Linearization Method for the Solutions of the Chen Chaotic System by S. S. Motsa, Y. Khan, S. Shateyi

    Published 2012-01-01
    “…This paper centres on the application of the new piecewise successive linearization method (PSLM) in solving the chaotic and nonchaotic Chen system. …”
    Get full text
    Article
  17. 2577

    Influence of partitioning methods on computational cost of cfd simulations applied to hydrocyclones by Felipe Orlando da Costa, Felipe Leonardo Barcelos Mateus, Irineu Petri Júnior

    Published 2020-10-01
    “…It was stated the choice of an adequate partitioning method can save high costs of computational power. …”
    Get full text
    Article
  18. 2578

    Presentation of Coastal Environmental Management Plan by using SWOT/AHP methods by R Sharifipour, B Mahmodi

    Published 2013-07-01
    “…At first, the vision, mission, and objective of developing the environmental management of the eastern coasts of Mazandaran by SWOT (Strengths-Weaknesses-Opportunities-Threats) method have been determined. Thereafter, with using of analytic hierarchical process (AHP) method and EC (Expert chose) software have been applied to prioritize the strategies. …”
    Get full text
    Article
  19. 2579

    An Eigenpoint Based Multiscale Method for Validating Quantitative Remote Sensing Products by Shaohui Chen, Hongbo Su

    Published 2014-01-01
    “…Experimental results demonstrate that the proposed method is manpower-and time-saving compared with the ideal scanning method and it is satisfying to perform simultaneous observation at these eigenpoints in terms of efficiency and accuracy.…”
    Get full text
    Article
  20. 2580