Showing 2,741 - 2,760 results of 120,517 for search '"Methodism"', query time: 0.13s Refine Results
  1. 2741

    Water Permeability of Pervious Concrete Is Dependent on the Applied Pressure and Testing Methods by Yinghong Qin, Haifeng Yang, Zhiheng Deng, Jiang He

    Published 2015-01-01
    “…Falling head method (FHM) and constant head method (CHM) are, respectively, used to test the water permeability of permeable concrete, using different water heads on the testing samples. …”
    Get full text
    Article
  2. 2742

    The Underwater Projectile Launching Process Prediction Based on Reduced Order Method by Ke Deng, Yi Jiang, Huan-Xing Liu

    Published 2024-01-01
    “…In this paper, computational fluid dynamics (CFD) and reduced order method (ROM) are developed for predicting the velocity time series during the initial stage of projectile launching. …”
    Get full text
    Article
  3. 2743

    Fatigue Life Prediction of Half-Shaft Using the Strain-Life Method by Xipei Ma, Xintian Liu, Haijie Wang, Jiachi Tong, Xiaobing Yang

    Published 2020-01-01
    “…The results show that the prediction method is reliable and meets the service life and safety requirements.…”
    Get full text
    Article
  4. 2744

    Model Reduction Methods for Rotor Dynamic Analysis: A Survey and Review by Matthew B. Wagner, Amir Younan, Paul Allaire, Randy Cogill

    Published 2010-01-01
    “…The focus of this literature survey and review is model reduction methods and their application to rotor dynamic systems. …”
    Get full text
    Article
  5. 2745

    Two-level feature selection method based on SVM for intrusion detection by Xiao-nian WU, Xiao-jin PENG, Yu-yang YANG, Kun FANG

    Published 2015-04-01
    “…To select optimized features for intrusion detection,a two-level feature selection method based on support vector machine was proposed.This method set an evaluation index named feature evaluation value for feature selection,which was the ratio of the detection rate and false alarm rate.Firstly,this method filtrated noise and irrelevant features to reduce the feature dimension respectively by Fisher score and information gain in the filtration mode.Then,a crossing feature subset was obtained based on the above two filtered feature sets.And combining support vector machine,the sequential backward selection algorithm in the wrapper mode was used to select the optimal feature subset from the crossing feature subset.The simulation test results show that,the better classification performance is obtained according to the selected optimal feature subset,and the modeling time and testing time of the system are reduced effectively.…”
    Get full text
    Article
  6. 2746
  7. 2747
  8. 2748

    Method of privacy protection based on multiple edge servers in personalized search by Qiang ZHANG, Guojun WANG, Shaobo ZHANG

    Published 2019-02-01
    “…In the plaintext environment,users' personalized search results can be obtained through users' interest model and query keywords.However,it may possibly result in the disclosure of sensitive data and privacy,which prevents using sensitive data in cloud search.Therefore,data is generally stored in the form of ciphertext in the cloud server.In the process of cloud search service,users intend to quickly obtain the desired search results from the vast amount of ciphertext.In order to solve the problem,it was proposed that a method of privacy protection based on multiple edge servers in personalized search shall be used.By introducing multiple edge servers and cutting the index as well as the query matrix,the computing relevance scores of partial query and partial file index are achieved on the edge server.The cloud server only needs to get the relevance score on the edge server and make a simple processing that can return to the most relevant Top K files by user query,so as to make it particularly suitable for a large number of users in the massive personalized ciphertext search.Security analysis and experimental results show that this method can effectively protect users’ privacy and data confidentiality.In addition,it can guarantee high efficiency in search to provide better personalized search experience.…”
    Get full text
    Article
  9. 2749

    A Dictionary Learning Method with Total Generalized Variation for MRI Reconstruction by Hongyang Lu, Jingbo Wei, Qiegen Liu, Yuhao Wang, Xiaohua Deng

    Published 2016-01-01
    “…In the proposed method, the TGV selectively regularizes different image regions at different levels to avoid oil painting artifacts largely. …”
    Get full text
    Article
  10. 2750

    A Novel Optimization Method for Nonconvex Quadratically Constrained Quadratic Programs by Hongwei Jiao, Yong-Qiang Chen, Wei-Xin Cheng

    Published 2014-01-01
    “…This paper presents a novel optimization method for effectively solving nonconvex quadratically constrained quadratic programs (NQCQP) problem. …”
    Get full text
    Article
  11. 2751

    CALCULATION METHOD IMPROVEMENT FOR CONTACT FATIGUE RELIABILITY OF CYLINDRICAL HELICAL GEAR by MA Dong, CUN LiGang, LIU YanHu, LIN YiZhe

    Published 2018-01-01
    “…The result shows that the improved method is more comprehensive consideration than general methods. …”
    Get full text
    Article
  12. 2752

    AN ASSESSMENT OF THE DISPLACEMENT OF A CAM FOLLOWER USING REGULA FALSI METHOD by KOLAWOLE ADESOLA OLADEJO, DARE ADERIBIGBE ADETAN, ADEKOLA OLAYINKA OKE, RAHAMAN ABU, GANIU AYOOLA LAMID

    Published 2021-06-01
    “…The principal aim of this work was to study and analyse the displacement of a cam-follower with Regula Falsi method and verify its input by using MATLAB and FORTRAN simulations. …”
    Get full text
    Article
  13. 2753

    An in‐depth study of the effects of methods on the dataset selection of public development projects by Can Cheng, Bing Li, Zengyang Li, Peng Liang, Xu Yang

    Published 2022-04-01
    “…However, it is hard for researchers to effectively select PDPs and DPDPs due to the lack of specific project selection methods for these two types of projects. To address this problem, a standard dataset was labelled and the base line methods (i.e. selecting projects according to a single feature like star number) under 60 configurations and the machine learning methods under 18 configurations were tested to identify the best configurations in precision and F‐measure for selecting PDPs and DPDPs. …”
    Get full text
    Article
  14. 2754

    Research on multiple enhanced k combination reverse Skyline query method by Song Li, Xinyuan Zhang, Liping Zhang

    Published 2025-01-01
    “…Furthermore, to handle multiple combinations with different cardinalities, we develop the Multiple Enhanced k combination reverse Skyline query method (MkECRSQ). MkECRSQ includes three main phases. …”
    Get full text
    Article
  15. 2755
  16. 2756

    A Design Method of Saturation Test Image Based on CIEDE2000 by Yang Yang, Jun Ming, Nenghai Yu

    Published 2012-01-01
    “…In order to generate color test image consistent with human perception in aspect of saturation, lightness, and hue of image, we propose a saturation test image design method based on CIEDE2000 color difference formula. …”
    Get full text
    Article
  17. 2757

    Automated vulnerability discovery method for 5G core network protocol by Peixiang WU, Zhilong ZHANG, Libo CHEN, Yijun WANG, Zhi XUE

    Published 2024-02-01
    “…With the widespread development of fifth-generation (5G) mobile communication technology, concerns regarding 5G network security have also increased.Blackbox fuzzing is a commonly used method for automated vulnerability discovery in software security.However, applying dynamic approaches like fuzzing to discover vulnerabilities in the complex design of 5G core network protocols poses challenges such as low efficiency, poor versatility, and lack of scalability.Therefore, a novel static method to examine the open-source solution of the 5G core network was proposed.Through this method, a series of memory leak security issues caused by improper variable life cycle management were identified, which can lead to denial-of-service attacks on the 5G core network.To summarize these weaknesses, a general vulnerability model and an automated vulnerability discovery method called HoI were presented, which utilized hybrid analysis based on control and data flow.By successfully discovering five zero-day bugs in Open5GS, an open-source solution for the 5G core network, vulnerabilities that cover practical application scenarios of multiple interface protocols in the 5G core network were identified.These vulnerabilities have wide-ranging impact, are highly detrimental, and can be easily exploited.They have been reported to the vendor and assigned four Common Vulnerabilities and Exposures (CVE) numbers, demonstrating the effectiveness of this automated vulnerability discovery method.…”
    Get full text
    Article
  18. 2758
  19. 2759

    Pade Method for Construction of Numerical Algorithms for Fractional Initial Value Problem by Feng Gao, Chunmei Chi

    Published 2020-01-01
    “…In this paper, we propose an efficient method for constructing numerical algorithms for solving the fractional initial value problem by using the Pade approximation of fractional derivative operators. …”
    Get full text
    Article
  20. 2760