Showing 2,761 - 2,780 results of 120,517 for search '"Methodism"', query time: 0.15s Refine Results
  1. 2761

    Modeling Of Active Bending By The Method Newton-Raphson And The Modified Newton-Raphson by Herda Roman, Slivanský Miloš, Sandanus Jaroslav

    Published 2024-12-01
    “…Two geometrically nonlinear calculation methods, the Newton-Raphson method and the Modified Newton-Raphson method, are compared for the suitability of active bending modelling. …”
    Get full text
    Article
  2. 2762

    Three-Dimensional Laplace Adomian Decomposition Method and Singular Pseudoparabolic Equations by Hassan Eltayeb, Diaa Eldin Elgezouli, Adem Kilicman, Imed Bachar

    Published 2021-01-01
    “…In this work, the solution of the linear, nonlinear, and coupled system fractional singular two-dimensional pseudoparabolic equation is examined by using a three-dimensional Laplace Adomian decomposition method (3-DLADM). Analysis of the method is discussed, and some demonstrative examples are mentioned to confirm the power and accuracy of the recommended method, and numerical analysis is applied to sketch the exact and approximate solution.…”
    Get full text
    Article
  3. 2763

    Challenges faced by women oncologists in Africa: a mixed methods study by Doreen Ramogola-Masire, Reshma Jagsi, Matthew Jalink, Verna Vanderpuye, Nwamaka Lasebikan, Miriam Mutebi, Nazik Hammad, Susan Msadabwe, Laura Carson, Dorothy Chilambe Lombe, Zainab Doleeb, Haimanot Kasahun Alemu, Nesrine Chraiet, Naa Adorkor Aryeetey, Zainab Mohamed, Nazima Jaffer Dharsee, Sitna Mwanzi, Khadija Warfa, Emmanuella Nwachukwu, Edom Seife Woldetsadik, Hirondina Vaz Borges Spencer

    Published 2024-07-01
    “…This study sought to determine the most common and substantial challenges faced by women oncologists in Africa and identify potential solutions.Methods and analysis A panel of 29 women oncologists from 20 African countries was recruited through professional and personal networks. …”
    Get full text
    Article
  4. 2764
  5. 2765

    A Fast Testing Method to Objectively Quantify the Stiffness of Stability Boots by Simon Bürgi, Judith Roost, Marco R. Hitz, Peter Schwilch, William R. Taylor, Silvio Lorenzetti

    Published 2015-01-01
    “…For comparing different stability shoe designs and prototypes, a reliable and fast testing method (FTM) is required. The aim of this study was to assess the reliability of a novel custom-built device. …”
    Get full text
    Article
  6. 2766

    Detection method for selfish routes based on the sequential probability ratio test by Qi WANG, Qingping WANG, Huaixing WANG, Zheng’an XIAO

    Published 2016-03-01
    “…According to a network model based on the sequential probability ratio test(SPRT),one detection method of selfish routes with respect to the routing functionality in wireless sensor network was developed.Through the analysis of the observed sample values of the nodes,the calculated routes evaluation values were compared with the known threshold values so as to determine whether it was selfish route.Simulation results show that the sequential sampling scheme based on the sequential probability ratio test had high detection accuracy,and the number of the required observation was greatly reduced,so it could operate faster.A merit of SPRT is that the number of observations required to test statistical hypotheses need not be determined in advance when compared to other methods based on a fixed number of observations.This allows for making prompt decision on the behavior of damage to the network,thus it can limit the scope of the damaged networks.…”
    Get full text
    Article
  7. 2767

    Method against process control-flow hijacking based on mimic defense by Chuanxing PAN, Zheng ZHANG, Bolin MA, Yuan YAO, Xinsheng JI

    Published 2021-01-01
    “…To defeat the attack of process control flow hijacking, a threat model was established from the point of vulnerability utilization, and the fortress defense to cut off the key vulnerability utilization path was proposed.On the basis of studying the principle of mimic defense, a threat model of process mimic execution was proposed, and the threat model was analyzed and proved to be effective.Mimic execution could effectively cut off the attack path of control flow hijacking.The ptototype of mimic execution, MimicBox, was implemented.The validation experiment shows that MimicBox can effectively defend against most control flow hijacking attacks based on known binary vulnerabilities.The performance evaluation result shows that the overhead MimicBox lead to is less than 13% on CPU-intensive programs.The Comparative evaluation result shows that mimic execution is a more effective and practical active defense method compared with control flow integrity.…”
    Get full text
    Article
  8. 2768
  9. 2769

    Newton Method to Recover the Phase Accumulated during MRI Data Acquisition by Oh-In Kwon, Chunjae Park

    Published 2012-01-01
    “…In this study, we estimate the magnetic flux density, which is recoverable from nonlinearly encoded MR k-space data by applying a Newton method.…”
    Get full text
    Article
  10. 2770
  11. 2771

    Study on the destination selection methods in router-level Internet topology measurement by JIANG Yu1, HE Song2

    Published 2006-01-01
    “…In order to improve the completeness of router level Internet topology measurement,the notion of self-contained destination set was defined first,and then existing destination selection methods were overviewed.After discussing the limitation of these existing methods,a viewpoint that the stub-network instead of the IP address should be taken as the sampling granularity was put forward,and a self-contained destination selection method that was termed all stub-networks coverage and two-step random selection was presented.Experiments show that this self-contained destination selection method guarantees the measurement completeness from the perspective of destination.…”
    Get full text
    Article
  12. 2772

    The Approach of Takhrīj and Taḥqīq in The Study of the Book of Turāth: Importance and Reference Methods by Ahmad Mursyid Azhar

    Published 2023-05-01
    “…Thus, based on qualitative methods and content analysis, this study examines several scientific works related to the approach of takhrīj and taḥqīq. …”
    Get full text
    Article
  13. 2773
  14. 2774

    Application of Adjoint Data Assimilation Method to Atmospheric Aerosol Transport Problems by Minjie Xu, Kai Fu, Xianqing Lv

    Published 2017-01-01
    “…Then, the initial distribution of PM2.5 concentration is inverted by the adjoint assimilation method with CFD and US1. The adjoint assimilation method with CFD gets better accuracy than adjoint assimilation method with US1 while adjoint assimilation method with CFD costs much less computational time. …”
    Get full text
    Article
  15. 2775

    Fault Diagnosis Method of Gear based on VMD and Multi-feature Fusion by Wang Jianguo, Chen Shuai, Zhang Chao

    Published 2017-01-01
    “…Aiming at the problem that working condition is complex in fact so that it is difficult to extract the gear fault feature frequency,a method of gear fault diagnosis based on variational mode decomposition( VMD) and multi- feature fusion is proposed. …”
    Get full text
    Article
  16. 2776

    A Small Target Detection Method Based on the Improved FCN Model by Guofeng Ma

    Published 2022-01-01
    “…The following is the central concept of the proposed method. Small targets are prone to occlusion and deformation in the image data. …”
    Get full text
    Article
  17. 2777
  18. 2778
  19. 2779
  20. 2780

    Simulation of Magnetorheological Fluids Based on Lattice Boltzmann Method with Double Meshes by Xinhua Liu, Hao Liu, Yongzhi Liu

    Published 2012-01-01
    “…In order to study the rheological characteristics of magnetorheological fluids, a novel approach based on the two-component Lattice Boltzmann method with double meshes was proposed, and the micro-scale structures of magnetorheological fluids in different strength magnetic fields were simulated. …”
    Get full text
    Article