Showing 2,621 - 2,640 results of 120,517 for search '"Methodism"', query time: 0.16s Refine Results
  1. 2621

    Conjugation of Daunorubicin to Monoclonal Antihuman Sarcoma Antibody by a Novel Method by Michel Pagé, Denis Thibeault, Hélène Tremblay, Christiane Noël, Marie-Josée Perron

    Published 1992-01-01
    “…Most of the reported methods for coupling anthracycline drugs to antibody result in either a loss of pharmacological activity or yield antibodies which have lost much of their immunological specificity. …”
    Get full text
    Article
  2. 2622

    Numerical Solutions of Advection Diffusion Equations Using Finite Element Method by Kassahun Getnet Mekonen, Zerihun Kinfe Birhanu

    Published 2023-04-01
    Subjects: “…Finite Element Method; Varational Formulation; Numerical integration…”
    Get full text
    Article
  3. 2623
  4. 2624

    Integral invariant manifold method applied to a mathematical model of osteosarcoma by Ophir Nave

    Published 2025-03-01
    Subjects: “…Integral invariant manifold method…”
    Get full text
    Article
  5. 2625

    Network security threat warning method based on qualitative differential game by Shirui HUANG, Hengwei ZHANG, Jindong WANG, Ruiyu DOU

    Published 2018-08-01
    “…Most current network security research based on game theory adopts the static game or multi-stage dynamic game model,which does not accord with the real-time change and continuity of the actual network attack-defense process.To make security threats warning more consistent with the attack-defense process,the threat propagation process was analyzed referring to the epidemic model.Then the network attack-defense game model was constructed based on the qualitative differential game theory,by which the evolution of the network security state could be predicted.Based on the model,the qualitative differential game solution method was designed to construct the attack-defense barrier and divide the capture area.Furthermore,the threat severity in different security states were evaluated by introducing multidimensional Euclidean distance.By designing the warning algorithm,the dynamic warning of the network security threat was realized,which had better accuracy and timeliness.Finally,simulation results verify the effectiveness of the proposed algorithm and model.…”
    Get full text
    Article
  6. 2626

    Automatic Multitarget Detection Method Based on Distributed Through-wall Radar by Xiao LIANG, Shengbo YE, Chenyang SONG, Yubing YUAN, Qunying ZHANG, Xiaojun LIU, Hejun JIANG, Hong LI

    Published 2025-02-01
    “…In particular, the method is over four times faster than other methods.…”
    Get full text
    Article
  7. 2627

    Dynamic Calibration Method of Multichannel Amplitude and Phase Consistency in Meteor Radar by Yujian Jin, Xiaolong Chen, Songtao Huang, Zhuo Chen, Jing Li, Wenhui Hao

    Published 2025-01-01
    “…Despite the inherently dynamic nature of these inconsistencies, the majority of existing research predominantly employs static calibration methods to address these issues. In this study, we propose a dynamic adaptive calibration method that combines normalized least mean square and correlation algorithms, integrated with hardware design. …”
    Get full text
    Article
  8. 2628
  9. 2629
  10. 2630

    Comparison of Methods for Determining Catchment Area Threshold for Water System Extraction by ZHENG Jiawei, CHEN Xingwei, LI Xiaocheng, RUAN Weifang

    Published 2023-01-01
    “…Most of the methods using digital elevation models (DEM) to extract water systems require the determination of catchment area thresholds.For a better understanding of the rationality and applicability of several commonly used determination methods of the catchment area threshold for water system extraction,the distance error between the real river source and the extracted one is used as a criterion to determine the rationality of the real water system extraction methods.Four main methods,namely,the drainage density method,the water-system fractal dimension method,the method of the minimum error at the river source,and the channel branching ratio method,are selected,and the Jinjiang River Basin on the southeast coast is taken as an example.The distance errors between the extracted river sources by different methods and the real river sources are compared.The results show that the visual discrimination of the catchment area threshold used by the drainage density method,water-system fractal dimension method,and channel branching ratio method has a large uncertainty,and the distance errors are large.In the method of the minimum error at the river source,the catchment area threshold is determined according to the minimum distance error between the extracted river source and the real one,which is unique.Hence,it is a more reasonable method among the four DEM-based real water system extraction methods.…”
    Get full text
    Article
  11. 2631

    New extension method of trusted certificate chain in virtual platform environment by Liang TAN, Neng QI, Lingbi HU

    Published 2018-06-01
    “…When using trusted computing technology to build a trusted virtual platform environment,it is a hot problem that how to reasonably extend the underlying physical TPM certificate chain to the virtual machine environment.At present,the certificate trust expansion schemes are not perfect,either there is a violation of the TCG specifications,or TPM and vTPM certificate results inconsistent,either the presence of key redundancy,or privacy CA performance burden,some project cannot even extend the certificate trust.Based on this,a new extension method of trusted certificate chain was proposed.Firstly,a new class of certificate called VMEK (virtual machine extension key) was added in TPM,and the management mechanism of certificate VMEK was constructed,the main feature of which was that its key was not transferable and could be used to sign and encrypt the data inside and outside of TPM.Secondly,it used certificate VMEK to sign vTPM’s vEK to build the trust relationship between the underlying TPM and virtual machine,and realized extension of trusted certificate chain in virtual machine.Finally,in Xen,VMEK certificate and its management mechanism,and certificate trust extension based on VMEK were realized.The experiment results show that the proposed scheme can effectively realize the remote attestation function of virtual platform.…”
    Get full text
    Article
  12. 2632

    A Dresser Drawer Method of Managing Insect and Mite Resistance in Ornamentals by James F. Price, Curtis A. Nagle

    Published 2009-01-01
    “…Nagle, describes a dresser drawer method to develop pesticide rotation plans that can extend the useful lives of pesticides. …”
    Get full text
    Article
  13. 2633

    A New Iterative Method for Finding Approximate Inverses of Complex Matrices by M. Kafaei Razavi, A. Kerayechian, M. Gachpazan, S. Shateyi

    Published 2014-01-01
    “…This paper presents a new iterative method for computing the approximate inverse of nonsingular matrices. …”
    Get full text
    Article
  14. 2634

    Binary program taint analysis optimization method based on function summary by Pan YANG, Fei KANG, Hui SHU, Yuyao HUANG, Xiaoshao LYU

    Published 2023-04-01
    “…Taint analysis is a popular software analysis method, which has been widely used in the field of information security.Most of the existing binary program dynamic taint analysis frameworks use instruction-level instrumentation analysis methods, which usually generate huge performance overhead and reduce the program execution efficiency by several times or even dozens of times.This limits taint analysis technology’s wide usage in complex malicious samples and commercial software analysis.An optimization method of taint analysis based on function summary was proposed, to improve the efficiency of taint analysis, reduce the performance loss caused by instruction-level instrumentation analysis, and make taint analysis to be more widely used in software analysis.The taint analysis method based on function summary used function taint propagation rules instead of instruction taint propagation rules to reduce the number of data stream propagation analysis and effectively improve the efficiency of taint analysis.For function summary, the definition of function summary was proposed.And the summary generation algorithms of different function structures were studied.Inside the function, a path-sensitive analysis method was designed for acyclic structures.For cyclic structures, a finite iteration method was designed.Moreover, the two analysis methods were combined to solve the function summary generation of mixed structure functions.Based on this research, a general taint analysis framework called FSTaint was designed and implemented, consisting of a function summary generation module, a data flow recording module, and a taint analysis module.The efficiency of FSTaint was evaluated in the analysis of real APT malicious samples, where the taint analysis efficiency of FSTaint was found to be 7.75 times that of libdft, and the analysis efficiency was higher.In terms of accuracy, FSTaint has more accurate and complete propagation rules than libdft.…”
    Get full text
    Article
  15. 2635

    Method of detecting IRC Botnet based on the multi-features of traffic flow by Jian-en YAN, Chun-yang YUAN, Hai-yan XU, Zhao-xin ZHANG

    Published 2013-10-01
    “…To resolve the problem of detecting IRC Botnet,a method based on traffic flow characteristics was proposed.The characteristics of Botnet channel traf?…”
    Get full text
    Article
  16. 2636

    Vulnerability detection method for blockchain smart contracts based on metamorphic testing by Jinfu CHEN, Zhenxin WANG, Saihua CAI, Qiaowei FENG, Yuhao CHEN, Rongtian XU, KwakuKudjo Patrick

    Published 2023-10-01
    “…Aimed at the defects of existing test methods, a vulnerability detection method for blockchain smart contracts based on metamorphic testing was proposed, which could generate test cases for specific functions in blockchain smart contracts to detect possible vulnerabilities.According to the possible security vulnerabilities, different metamorphosis relationships were designed and then metamorphic testing was performed.Through verifying whether the metamorphic relationship between the source test case and the subsequent test case was satisfied, whether the smart contract had related security vulnerabilities was judged.The experimental results show that the proposed method can effectively detect the security vulnerabilities in the smart contracts.…”
    Get full text
    Article
  17. 2637

    An Accurate Method for Extracting the Critical Field in Short Channel NMOS Devices by Y. Amhouche, A. El Abbassi, K. Raïs, R. Rmaily

    Published 2001-01-01
    “…In this letter, an accurate method for extracting the critical field Ec in short channel MOSFET's is presented. …”
    Get full text
    Article
  18. 2638
  19. 2639

    Method for determining the lengths of protocol keywords based on maximum likelihood probability by Jian-zhen LUO, Shun-zheng YU, Jun CAI

    Published 2016-06-01
    “…A left-to-right inhomogeneous cascaded hidden Markov modelwas proposed and applied to model application protocol messages.The proposed modeldescribed the transition probabilities between states and the evolution rule of phases inside the states,revealed the transition feature ofmessage fields and the left-to-right Markov characteristicsinside the fields.The protocol keywords were inferred by selecting lengths with maximum likelihood probability,and then the message format was recovered.The experimental results demonstrated that the proposed method perform well in protocol keyword extraction and message format recovery.…”
    Get full text
    Article
  20. 2640

    Fatigue Life Prediction of the Zirconia Fixture Based on Boundary Element Method by Y. W. Wang, J. J. Ye, W. P. He, G. G. Cai, B. Q. Shi

    Published 2020-01-01
    “…To this end, a boundary element method is developed in this paper to investigate their crack growth and fatigue life. …”
    Get full text
    Article