Showing 2,961 - 2,980 results of 120,517 for search '"Methodism"', query time: 0.16s Refine Results
  1. 2961

    Calculation method of information dissemination based on information entropy in public internet by Panpan LI, Zhengxia XIE, Zengkai WANG, Rui JIN

    Published 2022-04-01
    “…A method of how to calculate the influence of information dissemination based on the maximum entropy theory was presented, which aimed at evaluating the impacts of the information dissemination in the open internet environment.Firstly, the influential factors of the information dissemination were analyzed.Then, the factors that have high correlation with the calculation of information dissemination were selected by the principle of “Occam’s Razor”, based on Shannon's information entropy theory.Finally, the method of computing the influence of information dissemination was proposed based on the information entropy theory.The effectiveness of the proposed method was validated by the experiments of analyzing the influence of the information dissemination of academic paper citations and hot public opinion events.The experiments show that the proposed method is of great significance for investigating the influence of information dissemination and the extent of impacts on the audience as well as the trends of information evolution in the open internet environment.…”
    Get full text
    Article
  2. 2962

    Secrecy Rate Adaptation Method of Sensor Nodes Based on Evolutionary Game by Shigen Shen, Longjun Huang, Angyan Tu, Hongjie Li, Risheng Han, Qiying Cao

    Published 2014-11-01
    “…Numerical experiments show that the proposed algorithm adaptively adjusts the secrecy rate of the sensor node. Therefore, a novel method to guarantee the confidentiality of wireless sensor network data was provided.…”
    Get full text
    Article
  3. 2963

    Convergence Region of Newton Iterative Power Flow Method: Numerical Studies by Jiao-Jiao Deng, Hsiao-Dong Chiang

    Published 2013-01-01
    “…Power flow study plays a fundamental role in the process of power system operation and planning. Of the several methods in commercial power flow package, the Newton-Raphson (NR) method is the most popular one. …”
    Get full text
    Article
  4. 2964

    Confirmation method for the detection of malicious encrypted traffic with data privacy protection by Gaofeng HE, Qianfeng WEI, Xiancai XIAO, Haiting ZHU, Bingfeng XU

    Published 2022-02-01
    “…In order to solve the problem that excessive false positives in the detection of encrypted malicious traffic based on machine learning, secure two-party computation was used to compare character segments between network traffic and intrusion detection rulers without revealing the data content.Based on the comparison results, an intrusion detection feature matching algorithm was designed to accurately match keywords.A random verification strategy for users’ input was also proposed to facilitate the method.As a result, malicious users couldn’t use arbitrary data to participate in secure two-party calculations and avoid confirmation.The security and resource consumption of the method were theoretically analyzed and verified by a combination of real deployment and simulation experiments.The experimental results show that the proposed method can significantly improve the detection performance with low system resources.…”
    Get full text
    Article
  5. 2965
  6. 2966

    An Effective Dataset Preprocessing Method in Tilted Gear Defects Target Detection by Lifen Tu, Qi Peng, Aiqun Zhang, Xiao Yang, Jiaqi Wang

    Published 2024-01-01
    “…Gear defect detection is a crucial component in power automation systems. Methods based on deep learning have exhibited excellent performance in detecting gears. …”
    Get full text
    Article
  7. 2967
  8. 2968
  9. 2969

    Data-Driven Social Security Event Prediction: Principles, Methods, and Trends by Nuo Xu, Zhuo Sun

    Published 2025-01-01
    “…Aiming at offering a systematic review of current data-driven prediction methods used in social security, this paper delves into the progress of this research from three novel perspectives, prediction factors, technical methods, and interpretability, and then analyzes future development trends. …”
    Get full text
    Article
  10. 2970

    A Tensor-Based Go Decomposition Method for Hyperspectral Anomaly Detection by Meiping Song, Xiao Zhang, Lan Li, Hongju Cao, Haimo Bao

    Published 2025-01-01
    “…Specifically, the TGODEC-AD method combines the typical RX-AD and R-AD with the above decomposition result of the TGODEC model and constructs different modal operator detectors. …”
    Get full text
    Article
  11. 2971
  12. 2972
  13. 2973
  14. 2974

    Research of the Visual Measurement Method of Gear Tooth Profile Total Deviation by Wang Ning, Duan Zhenyun, Zhao Wenhui, Du Po, Duan Boqiang

    Published 2017-01-01
    “…Aiming at the measuring difficulty of small modulus gear,a measuring method of gear tooth profile total deviation based on machine vision is proposed. …”
    Get full text
    Article
  15. 2975

    Cell Area-Based Method for Analyzing the Coverage Capacity of Satellite Constellations by Zhiming Song, Haidong Liu, Guangming Dai, Maocai Wang, Xiaoyu Chen

    Published 2021-01-01
    “…On this basis, an improved cell area-based method is proposed in this paper, in which a cell is used as the basic analytical unit. …”
    Get full text
    Article
  16. 2976
  17. 2977

    Multi-feature fusion classification method for communication specific emitter identification by Zunwen HE, Shuai HOU, Wancheng ZHANG, Yan ZHANG

    Published 2021-02-01
    “…A multi-feature fusion classification method based on multi-channel transform projection, integrated deep learning and generative adversarial network (GAN) was proposed for communication specific emitter identification.First, three-dimensional feature images were obtained by performing various transformations, the time and frequency domain projection of the signal was constructed to construct the feature datasets.GAN was used to expand the datasets.Then, a two-stage recognition and classification method based on multi-feature fusion was designed.Deep neural networks were used to learn the three feature datasets, and the initial classification results were obtained.Finally, through fusion and re-learning of the initial classification result, the final classification result was obtained.Based on the measurement and analysis of the actual signals, the experimental results show that the method has higher accuracy than the single feature extraction method.The multipath fading channel has been used to simulate the outdoor propagation environment, and the method has certain generalization performance to adapt to the complex wireless channel environments.…”
    Get full text
    Article
  18. 2978

    Bandwidth Extension of High Compliance Current Mirror by Using Compensation Methods by Maneesha Gupta, Urvashi Singh, Richa Srivastava

    Published 2014-01-01
    “…The resistive compensation and inductive peaking methods have been used to extend the bandwidth of the conventional current mirror. …”
    Get full text
    Article
  19. 2979

    Convergence of Variational Iteration Method for Second-Order Delay Differential Equations by Hongliang Liu, Aiguo Xiao, Lihong Su

    Published 2013-01-01
    “…This paper employs the variational iteration method to obtain analytical solutions of second-order delay differential equations. …”
    Get full text
    Article
  20. 2980

    Surgical methods of treatment of extrasphincter and transsphincteric fistulas of the rectum (literature review) by I. S. Bogormistrov, S. A. Frolov, A. M. Kuzminov, A. S. Borodkin, V. Yu. Korolik, Sh. T. Minbayev

    Published 2015-09-01
    “…Now highly effective methods with application of various implants to eliminate tissue defect and improve regeneration are presented in the literature more and more commonly. …”
    Get full text
    Article