Showing 381 - 400 results of 120,517 for search '"Methodism"', query time: 0.18s Refine Results
  1. 381

    NEW METHOD OF PRODUCTION OF ALUNINUM SILICON ALLOYS by V. K. Afanasiev, E. L. Marukovich, M. N. Churik, V. V. Gertsen, A. V. Gorshenin, V. A. Samon

    Published 2015-11-01
    “…Practical ways to implement the new method were proposed on the example of industrial alloys prepared on charge synthetic alloy. …”
    Get full text
    Article
  2. 382
  3. 383

    Survey of the teaching methods of human computer interaction by Kristina Lapin

    Published 2004-12-01
    “… The paper surveys teaching methods of both sciences and engineering that are implemented in the Hu­man Computer Interaction courses. …”
    Get full text
    Article
  4. 384
  5. 385
  6. 386

    Analysis of Drag Reduction Methods and Mechanisms of Turbulent by Gu Yunqing, Liu Tao, Mu Jiegang, Shi Zhengzan, Zhou Peijian

    Published 2017-01-01
    “…Then, the relevant drag reduction technologies and mechanisms are discussed, focusing on the microbubbles, the vibrant flexible wall, the coating, the polymer drag reduction additives, superhydrophobic surface, jet surface, traveling wave surface drag reduction, and the composite drag reduction methods. Finally, applications and advancements of the drag reduction technology in turbulence are prospected.…”
    Get full text
    Article
  7. 387

    The Viro Method for Construction of Piecewise Algebraic Hypersurfaces by Yisheng Lai, Weiping Du, Renhong Wang

    Published 2013-01-01
    “…The method is based on the smooth blending theory and the Viro method for construction of Bernstein-Bézier algebraic hypersurface piece on a simplex.…”
    Get full text
    Article
  8. 388

    METHODS OF RESEARCH OF ELECTRO-PHYSICAL CHARACTERISTICS OFAGGLUTINANTSANDS by D. M. Kukuj, S. L. Rovin, M. A. Saikov

    Published 2004-11-01
    “…In the article the authors offer original methods of experimental investigation of electrophysical characteristics °f different agglutinant sands, used in foundry. …”
    Get full text
    Article
  9. 389

    Visual explanation method for reversible neural networks by Xinying MU, Bingbing SONG, Fanxiao LI, Yisen ZHENG, Wei ZHOU, Yunyun DONG

    Published 2023-12-01
    “…The issue of model explainability has gained significant attention in understanding the vulnerabilities and anonymous decision-making processes inherent in deep neural networks (DNN).While there has been considerable research on explainability for traditional DNN, there is a lack of exploration on the operation mechanism and explainability of reversible neural networks (RevNN).Additionally, the existing explanation methods for traditional DNN are not suitable for RevNN and suffer from issues such as excessive noise and gradient saturation.To address these limitations, a visual explanation method called visual explanation method for reversible neural network (VERN) was proposed for RevNN.VERN leverages the reversible property of RevNN and is based on the class-activation mapping mechanism.The correspondence between the feature map and the input image was explored by VERN, allowing for the mapping of classification weights of regional feature maps to the corresponding regions of the input image.The importance of each region for model decision-making was revealed through this process, which generates a basis for model decision-making.Experimental comparisons with other explanation methods on generalized datasets demonstrate that VERN achieves a more focused visual effect, surpassing suboptimal methods with up to 7.80% improvement in average drop (AD) metrics and up to 6.05% improvement in average increase (AI) metrics in recognition tasks.VERN also exhibits an 82.00% level of localization for the maximum point of the heat value.Furthermore, VERN can be applied to explain traditional DNN and exhibits good scalability, improving the performance of other methods in explaining RevNN.Furthermore, through adversarial attack analysis experiments, it is observed that adversarial attacks alter the decision basis of the model.This is reflected in the misalignment of the model’s attention regions, thereby aiding in the exploration of the operation mechanism of adversarial attacks.…”
    Get full text
    Article
  10. 390

    Choice and justification of the method of titanium welding with platinum by Anatolii Sanin, Ihor Mamchur, Tetiana Nosova, Stella Mamchur

    Published 2024-06-01
    “…Micro-X-ray spectral analysis was carried out on a Cameca device using the scanning method and determining the composition by elements with a distance between points of 2 μm in the direction perpendicular to the welding surface. …”
    Get full text
    Article
  11. 391

    Fostering responsible innovation with critical design methods by Alexi Orchard, Marcel O’Gorman

    Published 2024-12-01
    “…We present two examples of pedagogical interventions dedicated to injecting critical design methods into the education of future tech developers to help foster responsible innovation: 1) a cross-disciplinary curricular intervention with English and Systems Design Engineering students; 2) a series of Responsible Innovation workshops conducted with students. …”
    Get full text
    Article
  12. 392
  13. 393

    Factorization Method in Oscillator with the Aharonov-Casher System by J. Sadeghi, Jalil Naji, Behnam Pourhassan

    Published 2014-01-01
    “…We review the oscillator with Aharonov-Casher system and study some mathematical foundation about factorization method. The factorization method helps us to obtain the energy spectrum and general wave function for the corresponding system in some spin condition. …”
    Get full text
    Article
  14. 394

    Effects of Harvest Method on Microclimate in Florida Sugarcane by Hardev Sandhu, Maninder Singh, Robert Gilbert, Kelly Morgan, Ronald Rice, Leslie Baucum, James Shine, Mike Irey

    Published 2015-06-01
    “…SS-AGR-385/SC100: Effects of Harvest Method on Microclimate in Florida Sugarcane (ufl.edu) …”
    Get full text
    Article
  15. 395
  16. 396

    Privacy-preserving trajectory similarity computation method by Haining YU, Hongli ZHANG, Xiangzhan YU, Jiaxing QU, Mengmeng GE

    Published 2022-11-01
    “…To tackle privacy concerns on user information leakage in trajectory outsourcing services, a privacy-preserving trajectory similarity computation (pTSC) method was proposed.A trajectory outsourcing service provider was enabled to store encrypted trajectories from owners, wait for encrypted interested trajectories from requesters, and compute trajectory similarity between an interested trajectory and stored trajectories in ciphertext domain without learning anything about users’ trajectories.To compute a trajectory similarity over encrypted trajectories efficiently, a secure trajectory similarity computation protocol with longest common subsequence was proposed, which used somewhat homomorphic encryption and secure comparison protocol to compute the length of longest common subsequence over two encrypted trajectories.Furthermore, a ciphertext compression algorithm was designed to improve efficiency.Theoretical analysis and experimental evaluations show that pTSC method is secure and efficient.…”
    Get full text
    Article
  17. 397
  18. 398

    Method of unknown protocol classification based on autoencoder by Chunxiang GU, Weisen WU, Ya’nan SHI, Guangsong LI

    Published 2020-06-01
    “…Aiming at the problem that a large number of unknown protocols exist in the Internet,which makes it very difficult to manage and maintain the network security,a classification and identification method of unknown protocols was proposed.Combined with the autoencoder technology and the improved K-means clustering technology,the unknown protocol was classified and identified for the network traffic.The autoencoder was used to reduce dimensionality and select features of network traffic,clustering technology was used to classify the dimensionality reduction data unsupervised,and finally unsupervised recognition and classification of network traffic were realized.Experimental results show that the classification effect is better than the traditional K-means,DBSCAN,GMM algorithm,and has higher efficiency.…”
    Get full text
    Article
  19. 399

    Advances in Quantitative Analytical Methods for Solid Drugs by Yue Tao, Yuhan Gao, Baoxi Zhang, Kun Hu, Yifei Xie, Li Zhang, Shiying Yang, Yang Lu

    Published 2024-12-01
    “…In this paper, the quantitative analysis methods of polymorphs and pharmaceutical cocrystals are reviewed, the advantages and disadvantages of various methods are analyzed mainly from three types of techniques, namely, X-ray diffraction, spectroscopy, and thermal analysis, and the specific applications of various methods are commented on through examples. …”
    Get full text
    Article
  20. 400

    Sampling method for IDS in high bandwidth network by NING Zhuo1, GONG Jian1, GU Wen-jie1

    Published 2009-01-01
    “…A novel sampling method,IDSampling,was developed to solve the performance unbalance problem that IDS could not scale well in G+bit/s link,which was adaptive with the consumption of the memory bottleneck.With the help of the heuristic messages,such as the entropy of the single-packet flow and the flow length,IDSampling applied the simple sampling strategy based on the entropy of the single-packet flow when the large-scale anomaly occurred,or another complicated one instructed by the feedback of the rear detection results by default.In both cases IDSampling tried to guaran-tee the equal security with detection cost as low as it could.The results of experiment show that ①IDSampling keeps IDS effective by cutting off its load significantly when it is overloaded,at the same time it can guarantee the detection accuracy of the large-scale attack;②Comparing with the other two overwhelming sampling methods,the random packet sampling and the random flow sampling,the number of attack packets sampled by IDSampling is higher than that of the former two,the number outweighs the former two one order of magnitude especially in the large-scale anomaly case.…”
    Get full text
    Article