Showing 281 - 300 results of 120,517 for search '"Methodism"', query time: 0.20s Refine Results
  1. 281

    Implementing Inquiry-Based Teaching Methods by Anna J. Warner, Brian E. Myers

    Published 2009-01-01
    “…AEC395/WC076: Implementing Inquiry-Based Teaching Methods (ufl.edu) …”
    Get full text
    Article
  2. 282

    School teenager knowledge on contraceptive methods by Mariane Cristina Carlucci Molina, Patrica Grazieli Silverio Stoppiglia, Christine Baccarat de Godoy Martins, Lidiane Cristina da Silva Alencastro

    Published 2015-01-01
    “…The study aimed evaluation of the knowledge on contraceptive methods and their utilization among adolescents of the secondary grade of public schools in Cuiaba-MT. …”
    Get full text
    Article
  3. 283
  4. 284
  5. 285

    Secure controlling method for scalable botnets by Qiang LIU, Pengfei LI, Zhangjie FU

    Published 2023-02-01
    “…., internet of things (IoT) devices.Future botnets will become more cross-platform and stealthy, which introduces severe security risks to cyberspace.Therefore, in-depth research on botnets can offer study targets to corresponding defensive studies, which is very meaningful for designing an architecture to secure the next-generation cyberspace.Hence, an HTTP-based scalable botnet framework was proposed to address the problems of compatibility, stealthiness and security.Specifically, the framework adopted a centralized controlling model.Moreover, it used the HTTP protocol as the designed botnet’s communication protocol and block encryption mechanisms based on symmetric cryptography to protect the botnet’s communication contents.Furthermore, a secure control mechanism for multi-platform botnets was designed.In particular, the proposed mechanism utilized source-level code integration and cross-compilation techniques to solve the compatibility challenge.It also introduced encrypted communication with dynamic secret keys to overcome the drawbacks of network traffic regularity and ease of analysis in traditional botnets.Moreover, it designed server migration and reconnection mechanisms to address the weakness of single-point-failure in centralized botnet models.Simulation results in three experimental scenarios with different levels of botnet controllability show that there is a linear relationship between the size of a botnet and the service overhead of the related C&C servers.In addition, under the condition of the same botnet scale, a higher level of controllability introduces a higher throughput and a greater system overhead.The above results demonstrate the effectiveness and the practical feasibility of the proposed method.…”
    Get full text
    Article
  6. 286

    Lie Group Method of the Diffusion Equations by Jian-Qiang Sun, Rong-Fang Huang, Xiao-Yan Gu, Ling Yu

    Published 2014-01-01
    “…The ordinary differential equations are solved by Lie group method and the explicit Runge-Kutta method. Numerical results showed that Lie group method is more stable than the corresponding explicit Runge-Kutta method.…”
    Get full text
    Article
  7. 287

    Multifractal Framework Based on Blanket Method by Milorad P. Paskaš, Irini S. Reljin, Branimir D. Reljin

    Published 2014-01-01
    “…The first two measures (proposed Methods 1 and 3) support model of image with embedded dimension three, while the other supports model of image embedded in space of dimension three (proposed Method 2). …”
    Get full text
    Article
  8. 288

    Hybrid Method for Point Cloud Classification by Abdurrahman Hazer, Remzi Yildirim

    Published 2025-01-01
    “…In this study, we introduce a novel hybrid ResPOL method that integrates a bidirectional architecture with a newly developed Patch-Offset Lambda (POL) mechanism for feature extraction from point cloud data. …”
    Get full text
    Article
  9. 289

    Mergeable adaptive tile coding method by Meng-yu SHI, Quan LIU, Qi-ming FU

    Published 2015-02-01
    “…In order to solve many unnecessary division,mergence supported adaptive tile coding algorithm was presented which would eliminate the unnecessary division.Simulation is conducted on mountain car problem with discrete actions and continuous state space Results show that the proposed method can eliminate the influence of false division in the traditional tile coding method and achieve a more accurate adaptive partition of continuous state space.A higher convergence rate is achieved at the same time.…”
    Get full text
    Article
  10. 290
  11. 291
  12. 292
  13. 293

    Application of the Time Step Optimization Method in Seismic Liquefaction Analysis and Its Evaluation Method for Computational Efficiency Improvement by Qi Li, Bin Li, Shaorui Sun, Nan Yang

    Published 2020-01-01
    “…The results show that the time step optimization method can effectively solve the time step setting problem. …”
    Get full text
    Article
  14. 294
  15. 295

    Р. DESCARTES: PRINCIPLES OF RATIONALISTIC METHOD AND MORALITY (TO THE QUESTION ON THE METHODS OF SCIENTIFIC RESEARCH IN THE FIELD OF PHILOSOPHY AND SOCIAL WORK) by Оксана ОСЕТРОВА

    Published 2024-12-01
    Subjects: “…rationalism, common sense, method, obviousness, truth, clearly and distinctly, critical thinking, morality, maxim, psychoanalysis, social unconscious, socially conditioned filter, novice scientist…”
    Get full text
    Article
  16. 296
  17. 297
  18. 298
  19. 299

    Kinetic Analysis of the Thermal Decomposition of Polymer-Bonded Explosive Based on PETN: Model-Fitting Method and Isoconversional Method by Trung Toan Nguyen, Duc Nhan Phan, Van Thom Do, Hoang Nam Nguyen

    Published 2020-01-01
    “…It was found that kinetic parameters obtained by the modified Kissinger–Akahira–Sunose method (using non-isothermal TG/DTG data) were close to those obtained by the isoconversional and model-fitting methods that use isothermal VST data. …”
    Get full text
    Article
  20. 300

    A method to evaluate the performance of institutions based on data envelopment analysis method with qualitative data and emphasis on OCB by mohammad javad hossainzadeh saljughi

    Published 2024-08-01
    “…To validate the method, the results of the proposed method were compared with the ranking results of the hierarchical process method.…”
    Get full text
    Article