Showing 3,001 - 3,020 results of 120,517 for search '"Methodism"', query time: 0.19s Refine Results
  1. 3001

    Calculation Method of the Interference Fit Connection Structure Fretting Slip Vector by Li Yamei, Dong Huimin, Zhang Rubian, Hao Lige, Qiu Jun, Wang Delun

    Published 2016-01-01
    “…When the interference fit connection structure being applied load,its contact surface can produce small relative slip amplitude.When the relative slip amplitude is in a certain range,the fretting fatigue life would be shortened.In order to evaluate the rationality of the joint of planet carrier interference fit connection structure,the condition of interference fit fretting slip is analyzed by using Workbench.Since Workbench cannot directly get the fretting slip amplitude of certain direction or loading step,therefore a method for extracting slip vector magnitude is proposed to analyze the slip amplitude of a certain direction or loading step.The results show that,in the loading stage,the fretting slip of back-end interference contact area is in critical value range,the fretting fatigue life is shorter.The analysis results provide a reference for structural design improvement.…”
    Get full text
    Article
  2. 3002

    Research on attack scenario reconstruction method based on causal knowledge discovery by Di FAN, Jing LIU, Jun-xi ZHUANG, Ying-xu LAI

    Published 2017-04-01
    “…In order to discover the attack pattern from the distributed alert data and construct the attack scene,a method of finding the attack scene from the alert data generated by intrusion detection system was studied.Current research suffer from the problem that causal knowledge is complex and difficult to understand and it is difficult to automatically acquire the problem.An attack scenario reconstruction method based on causal knowledge discovery was proposed.According to the process of KDD,the sequence set of attack scenes was constructed by the correlation degree of IP attributes among alert data.Time series modeling was adopted to eliminate the false positives to reduce the attack scene sequence.Finally,causal relationship between the alert data was found by using probability statistics.Experiments on the DARPA2000 intrusion scenario specific data sets show that the method can effectively identify the multi-step attack mode.…”
    Get full text
    Article
  3. 3003

    Two Optimal Eighth-Order Derivative-Free Classes of Iterative Methods by F. Soleymani, S. Shateyi

    Published 2012-01-01
    “…Moreover, a large number of numerical tests are considered to confirm the applicability and efficiency of the produced methods from the new classes.…”
    Get full text
    Article
  4. 3004

    A Modified NM-PSO Method for Parameter Estimation Problems of Models by An Liu, Erwie Zahara, Ming-Ta Yang

    Published 2012-01-01
    “…The M-NM-PSO method improves the efficiency of the PSO method and the conventional NM-PSO method by rapid convergence and better objective function value. …”
    Get full text
    Article
  5. 3005
  6. 3006

    A method for synthetic speech detection using local phase quantization by Jia XU, Zhihua JIAN, Honghui JIN, Man YANG

    Published 2024-02-01
    “…Due to the convenience of speech synthesis, synthesized disguised speech poses a great threat to the security of speaker verification systems.In order to further enhance the ability of detecting the camouflage to the speaker verification system, a method of synthetic speech detection was put forward using the information in spectral domain of the synthetic speech spectrogram.The method employed the local phase quantization (LPQ) algorithm to describe frequency domain information in the speech spectrogram.Firstly, the spectrogram was divided into several sub-blocks, and then the LPQ was performed on each sub-block.After the histogram statistical analysis, the LPQ feature vector was obtained and used as the input feature of the random forest classifier to realize the synthetic speech detection.The experimental results demonstrate that the proposed method further reduces tandem detection cost function (t-DCF) and has better generalization ability.…”
    Get full text
    Article
  7. 3007

    Non-stationary signal combined analysis based fault diagnosis method by Zhe CHEN, Yuqi HU, Shiqing TIAN, Huimin LU, Lizhong XU

    Published 2020-05-01
    “…Considering the complementarity between the deep learning,spectrum and time frequency analysis methods,a multi-stream framework was designed by combining the convolutional network,Fourier transform and wavelet package decomposition methods,with the aim to analyze the non-stationary signal.Accordingly,a none-stationary signal combined analysis based fault diagnosis method was proposed to extract features in difference aspects.The fault diagnosis experiments demonstrate that the combined analysis method can efficiently and stably depict the fault and significantly improve the performance of fault diagnosis.…”
    Get full text
    Article
  8. 3008
  9. 3009
  10. 3010

    A quantitative prediction method utilizing whole omics data for biosensing by Takahiko Koizumi, Kenta Suzuki, Inoue Mizuki, Kie Kumaishi, Yasunori Ichihashi

    Published 2025-01-01
    “…However, omics data have not been fully utilized because current prediction methods in biomarker construction are susceptible to data multidimensionality and noise. …”
    Get full text
    Article
  11. 3011

    Using Clustering Methods in Multinomial Logit Model for Departure Time Choice by Shahriar Afandizadeh Zargari, Farshid Safari

    Published 2020-01-01
    “…Research results indicated that Ward’s hierarchical clustering method is improper for time discretization; furthermore, the K-means clustering method is more efficient than the expectation maximization and K-medoids methods in the time discretization for MNL modelling. …”
    Get full text
    Article
  12. 3012

    Defense decision-making method based on incomplete information stochastic game by Junnan YANG, Hongqi ZHANG, Chuanfu ZHANG

    Published 2018-08-01
    “…Most of the stochastic game models to select network defense strategies are composed of matrix game and Markov decision,which assumes that the defender has known the attacker's revenue.This assumption does not conform to the actual situation.The uncertainty of the attacker's income was converted into the indeterminacy of the attacker type,and an incomplete information stochastic game model,which was combined with the static Bias game and Markov decision,was constructed.The equilibrium solution method of the incomplete information stochastic game model was given,and the strategy selection of the defender was guided by the stable Bias Nash equilibrium.Finally,a practical example was given to demonstrate the feasibility and effectiveness of the model.…”
    Get full text
    Article
  13. 3013
  14. 3014

    Smart surgical telementoring system with patch-to-pixel point tracking method by Yanwei Qu, Ling Li, Tongtong Li, Jieyu Zheng, Wentao Tang, Xiaojian Li

    Published 2025-03-01
    “…In this system, a novel method named P2PTracking (Patch-to-Pixel Point Tracking) is implemented. …”
    Get full text
    Article
  15. 3015

    Modified boundary integral method for pressure driven MHD duct flow by B. D. Aggarwala, P. D. Ariel

    Published 1989-01-01
    “…In this paper, we investigate the flow of a viscous, Incompressible, electrically conducting fluid through a rectangular duct in the presence of a magnetic field, when one of the boundaries perpedicular to the magnetic field is partly conducting and partly Insulating, by a modified Boundary Integral Method.…”
    Get full text
    Article
  16. 3016

    A Survey of Insulin-Dependent Diabetes—Part II: Control Methods by Daisuke Takahashi, Yang Xiao, Fei Hu

    Published 2008-01-01
    “…Since these mechanisms are more or less related with each other, a mathematical model of the insulin-glucose system can be derived from these surrounding relations. This kind of method of the mathematical model derivation is called a fundamental method. …”
    Get full text
    Article
  17. 3017

    Solving Nonlinear Differential Algebraic Equations by an Implicit Lie-Group Method by Chein-Shan Liu

    Published 2013-01-01
    “…Four numerical examples are given to evaluate the efficiency and accuracy of the new method when comparing the computational results with the closed-form solutions.…”
    Get full text
    Article
  18. 3018

    On Mann’s Type Method for Nonexpansive and Strongly Quasinonexpansive Mappings in Hilbert Spaces by Nawab Hussain, Giuseppe Marino, Badriah A. S. Alamri

    Published 2015-01-01
    “…In the setting of Hilbert spaces, we study Mann’s type method to approximate strong solutions of variational inequalities. …”
    Get full text
    Article
  19. 3019

    A Based Bayesian Wavelet Thresholding Method to Enhance Nuclear Imaging by Nawrès Khlifa, Najla Gribaa, Imen Mbazaa, Kamel Hamruoni

    Published 2009-01-01
    “…Since these images are modeled as the realization of a Poisson process, we propose a new framework that performs variance stabilizing of the Poisson process before applying an adapted Bayesian wavelet shrinkage. The proposed method has been applied on real images, and it has proved its performance.…”
    Get full text
    Article
  20. 3020