Showing 481 - 500 results of 120,517 for search '"Methodism"', query time: 0.13s Refine Results
  1. 481

    THE ANTHROPOLOGIZATION OF DASEIN-PSYCHE’S BEING BY METHODS OF NEUROPHILOSOPHY by O. A. Bazaluk

    Published 2020-12-01
    “…The purpose of the article is to reveal the anthropologization of Dasein-psyche’s being by methods of neurophilosophy. The anthropologization of Dasein-psyche’s being by methods of neurophilosophy allows considering the noogenesis from the perspective of philosophical traditions, which is much richer in comparison with the history of scientific knowledge about the psychology of meanings. …”
    Get full text
    Article
  2. 482

    An Adaptive Reordered Method for Computing PageRank by Yi-Ming Bu, Ting-Zhu Huang

    Published 2013-01-01
    “…This method can provide a speedup for calculating the PageRank vector. …”
    Get full text
    Article
  3. 483

    Non-cultural diagnostic methods of fungal keratitis by K.I. Bel'skaja, Obrubov A. S

    Published 2018-07-01
    “…<br> Together these studies provide that none of the above-mentioned methods of diagnostics is the etalon. For more accurate diagnostics an ophthalmologist should better use a combination of diagnostic methods. …”
    Get full text
    Article
  4. 484
  5. 485

    A New Image Restoration Method for MUSER by Wei Wang, Yihua Yan

    Published 2019-01-01
    “…Therefore, restoration method for solar radio image is different from other radio sources. …”
    Get full text
    Article
  6. 486
  7. 487
  8. 488

    Computational Methods for Multidimensional Neutron Diffusion Problems by Song Han, Sandra Dulla, Piero Ravetto

    Published 2009-01-01
    “…A standard finite-difference approach is firstly implemented, mainly to serve as a reference for less computationally challenging schemes, such as nodal methods and boundary element methods, which are considered in the second part of the work. …”
    Get full text
    Article
  9. 489

    Evaluation method for node importance in communication networks by CHEN Yong, HU Ai-qun, HU Xiao

    Published 2004-01-01
    “…An evaluation method for node importance in communication networks is proposed, the concise generalized expressions are given. …”
    Get full text
    Article
  10. 490

    Valuing Convertible Bonds Based on LSRQM Method by Jian Liu, Lizhao Yan, Chaoqun Ma

    Published 2014-01-01
    “…The empirical results show that the model fits well the market prices of convertible bonds in China’s market and the LSRQM method is effective.…”
    Get full text
    Article
  11. 491
  12. 492
  13. 493

    Extractive Spectrophotometric Methods for the Determination of Etoricoxib in Tablets by Kamal Shah, Alka Gupta, Pradeep Mishra

    Published 2009-01-01
    “…Two simple, rapid, sensitive, precise and economic spectrophotometric methods have been developed for the estimation of etoricoxib in tablet formulation. …”
    Get full text
    Article
  14. 494

    Method of Optimization of Electrical Power System Conditions by A. M. Bakanovsky

    Published 2004-04-01
    “…The paper considers an algorithm of optimization of electrical power system conditions with due account of loss in power network. A method of dynamic programming and a successive approximation method are simultaneously used as optimization methods. …”
    Get full text
    Article
  15. 495

    Rheoencephalography: A non-invasive method for neuromonitoring by Szabo Sandor, Totka Zsolt, Nagy-Bozsoky Jozsef, Pinter Istvan, Bagany Mihaly, Bodo Michael

    Published 2024-03-01
    “…In neurocritical care, the gold standard method is intracranial pressure (ICP) monitoring for the patient's lifesaving. …”
    Get full text
    Article
  16. 496

    Methods of synchronization of electric drives not mechanically connected by A. E. Bychkov, T. A. Funk, A. V. Aleksandrov

    Published 2021-11-01
    “…A comparison of synchronization structures is made in terms of the impact on the final operation of the system and hardware synchronization methods in terms of applicability and maximum performance. …”
    Get full text
    Article
  17. 497

    Comparison of the Methods for Diagnosing the Carpal Tunnel Syndrome by Aurimas Dobilinskas, Saulius Knystautas, Kęstutis Braziulis, Irmantas Rutkauskas, Loreta Pilipaitytė

    Published 2023-11-01
    “…The diagnostic testing methods for the carpal tunnel syndrome are based on anamnesis data, objective and instrumental inspection. …”
    Get full text
    Article
  18. 498

    A Survey of Methods for Gas-Lift Optimization by Kashif Rashid, William Bailey, Benoît Couët

    Published 2012-01-01
    “…This paper presents a survey of methods and techniques developed for the solution of the continuous gas-lift optimization problem over the last two decades. …”
    Get full text
    Article
  19. 499

    Kodaira-Spencer anomalies with Stora-Zumino method by Davide Rovere

    Published 2025-01-01
    “…Abstract Holomorphic diffeomorphism anomalies of 2 n-dimensional gravitational theories in Beltrami parametrisation (Kodaira-Spencer anomalies) are computed in the brst framework, using an extension of the Stora-Zumino method. This method, which allows to compute anomalies in a very concise way, makes manifest the topological origin of anomalies. …”
    Get full text
    Article
  20. 500

    Software diversification method based on binary rewriting by Benwei HE, Yunfei GUO, Yawen WANG, Qingfeng WANG, Hongchao HU

    Published 2023-04-01
    “…Software diversity is an effective defense against code-reuse attacks, but most existing software diversification technologies are based on source code.Obtaining program source code may be difficult, while binary files are challenging to disassemble accurately and distinguish between code pointers and data constants.This makes binary file diversification difficult to generate high levels of randomization entropy, and easily compromised by attackers.To overcome these challenges, a binary file oriented software diversification method was proposed based on static binary rewriting technology, namely instruction offset randomization.This method inserted NOP instructions of varying byte lengths before program instructions with a certain probability, reducing the number of unintended gadgets in the program and randomly offsetting the original instruction address.This disrupts the program’s original memory layout and increases the cost of code-reuse attacks.At the same time, an optimization strategy based on hot code was designed for this method.The execution times of basic blocks in binary files were obtained by dynamic pile insertion, so as to adjust the NOP instruction insertion probability in each basic block.The higher the execution frequency, the fewer NOP instructions were inserted into the basic block, which can ensure lower performance overhead and produce higher randomization entropy.In the experimental part, the SPEC benchmark program was used to test the optimized method from the aspects of performance overhead, gadget survival rate and file size.The results show that a 15% insertion probability achieves the best effect, with an average gadget survival rate of less than 1.49%, increasing attackers’ difficulty in reusing the same gadget attack chain.Furthermore, only a 4.1% operation overhead and 7.7% space overhead are added, maintaining high levels of security.…”
    Get full text
    Article