Showing 521 - 540 results of 120,517 for search '"Methodism"', query time: 0.15s Refine Results
  1. 521

    Research on methods of workers’ context description in mines by Shimin FENG, Enjie DING, Zhongyu LIU, Xiao YU, Lei MENG, Zhikai ZHAO

    Published 2019-12-01
    “…The worker’s unsafe behavior is the key cause of mine accidents.The human activity is closely related with the context.Ontology is widely used in computer science in the field of information exchange and knowledge sharing,which contains complex structures and various semantics.Firstly,the research on the description of the miners’ situational information in the mining field was summarized.It introduced the general situation in the field of the Internet of things.The importance and necessity of the description of the state information of mine personnel was presented.It introduced the research background,including semantic web,context description and knowledge representation.After that,the method of information description of mine personnel was described.The ontology model was proposed based on oneM2M international technical specifications.In order to construct this ontology,it was drawed on some of the core concepts of oneM2M Base Ontology.The concept classes,attributes and relationships that are specific to the information description of mine personnel were put forward.The context description of mine personnel proposed was aimed at achieving the purposes of specification information description,data semantic labeling,knowledge sharing and reuse.Finally,the conclusions were drawn and the prospect of using the ontology method for context perception and the miners’ unsafe behavior recognition was presented.…”
    Get full text
    Article
  2. 522
  3. 523
  4. 524

    New Method of Solving the Economic Complex Systems by Ya-Juan Yang, Chung-Cheng Chen, Yen-Ting Chen

    Published 2020-01-01
    “…In this study, the authors first develop a direct method used to solve the linear nonhomogeneous time-invariant difference equation with the same number for inputs and outputs. …”
    Get full text
    Article
  5. 525

    Network traffic classification method basing on CNN by Yong WANG, Huiyi ZHOU, Hao FENG, Miao YE, Wenlong KE

    Published 2018-01-01
    “…Since the feature selection process will directly affect the accuracy of the traffic classification based on the traditional machine learning method,a traffic classification algorithm based on convolution neural network was tailored.First,the min-max normalization method was utilized to process the traffic data and map them into gray images,which would be used as the input data of convolution neural network to realize the independent feature learning.Then,an improved structure of the classical convolution neural network was proposed,and the parameters of the feature map and the full connection layer were designed to select the optimal classification model to realize the traffic classification.The tailored method can improve the classification accuracy without the complex operation of the network traffic.A series of simulation test results with the public data sets and real data sets show that compared with the traditional classification methods,the tailored convolution neural network traffic classification method can improve the accuracy and reduce the time of classification.…”
    Get full text
    Article
  6. 526
  7. 527

    RAP detection method based on AP fingerprint by Qing LI, Ayong YE, Zhiqiang YAO, Aimin CHEN

    Published 2018-05-01
    “…The access point (AP) is an integral part of the infrastructure mode in wireless network.While the attacks caused by rogue AP (RAP) divulge a lot of users' privates in a large extent,such as the user's location information,surfing behavior on the Internet and social relations.A RAP detection algorithm based on AP fingerprint was proposed.The validity of AP was judged by the unforgeability and stability of the parameters of beacon frames.And the feasibility and effectiveness of the proposed method were further verified by scheme comparisons and experimental analysis.…”
    Get full text
    Article
  8. 528
  9. 529

    CURRENT TRENDS ON MATERIALS AND METHODS FOR TEETH WHITENING by Maria Mirabela IANCU, Cristiana Ioana TATIA, Alina ROBU, Marius Lucian VASILESCU, Iulian ANTONIAC, Anca Maria FRATILA

    Published 2024-12-01
    “…The purpose of teeth whitening is the removal of intrinsic or extrinsic discoloration via mechanical or chemical techniques that restore the teeth to their natural shade or lighten it, depending on the chosen method. Both the abrasive particles used in mechanical procedures and the oxidant agents applied in chemical bleaching are effective if they are used according to the stain aetiology, however, the risks associated with these products (e.g. potential tooth wear, sensitivity, damage of the enamel or dentin organic matrix) are not negligible. …”
    Get full text
    Article
  10. 530

    Plant Sources, Extraction Methods, and Uses of Squalene by M. Azalia Lozano-Grande, Shela Gorinstein, Eduardo Espitia-Rangel, Gloria Dávila-Ortiz, Alma Leticia Martínez-Ayala

    Published 2018-01-01
    “…The aim of this review is to provide an overview of SQ to establish research focus with special reference to plant sources, extraction methods, and uses.…”
    Get full text
    Article
  11. 531
  12. 532

    Methods to Test the Compressive Strength of Earth Blocks by Guanqi Lan, Sisi Chao, Yihong Wang, Ying Cui

    Published 2021-01-01
    “…However, there is still much debate on the best method to accurately measure the compressive strength of earth blocks. …”
    Get full text
    Article
  13. 533
  14. 534

    Tauberian conditions for a general limitable method by İbrahim Canak, Ümit Totur

    Published 2006-01-01
    “…Let (un) be a sequence of real numbers, L an additive limitable method with some property, and and different spaces of sequences related to each other. …”
    Get full text
    Article
  15. 535

    Fundamentals and Methods for T- and B-Cell Epitope Prediction by Jose L. Sanchez-Trincado, Marta Gomez-Perosanz, Pedro A. Reche

    Published 2017-01-01
    “…Subsequently, we provide a systematic and inclusive review of the most relevant B- and T-cell epitope prediction methods and tools, paying particular attention to their foundations.…”
    Get full text
    Article
  16. 536

    Construction method of double unicast network coding by Baoxing PU, Zhiyi MO

    Published 2020-09-01
    “…In order to use network coding technology for data transmission in double unicast network,a construction method of double unicast network coding was proposed.The pre-coding strategy was implemented at each source node,the random linear network coding combined to the multi-objective optimization evolutionary algorithm was adopted to design the local coding vector of each channel.At the each sink node,the base vector of zero space of matrix was used to eliminate some information interference,and then the two-level pre-coding strategy was used to control the transmission rate at source.Thus,each sink node could be decoded successfully.With the proposed method,the approximate reachable information rate region of double unicast network coding could be determined and the transmission scheme for each vector in the reachable information rate region could be designed.Theoretical derivation and simulation calculation show the effectiveness of the proposed method.…”
    Get full text
    Article
  17. 537

    IoT intrusion detection method for unbalanced samples by ANTONG P, Wen CHEN, Lifa WU

    Published 2023-02-01
    “…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
    Get full text
    Article
  18. 538

    Service substitution method based on composition context by Hai-yan WANG, Si-rui LI

    Published 2014-09-01
    “…With the variety of requirements from service requesters and the increasing complexity of network environ-ments,service composition has become more and more complicated.In order to decrease redundant information of the substituted service and improve the accuracy of service substitution,the composition context was regarded as the match-ing criteria and tried to substitute failed service with the following two steps.First,a composition context information collecting algorithm (CCICA) was proposed based on the color petri net model of the service workflow,and regarded the composition context as the collecting source of service information.Second,a levenshtein distance-based service substi-tution method (LDBSSM) was given,which was integrated with dependencies between service interfaces.Simulation re-sults show that the proposed LDBSSM method is practical because it can not only reduce redundancy of substituted ser-vice information but also effectively improve the accuracy of service substitution.…”
    Get full text
    Article
  19. 539

    The Model of Disengagement of Talent with Meta-synthesis Method by Ali Asghar Mobasheri, Ali Nasr Isfahani, Hadi Teimouri

    Published 2024-11-01
    “…Consequently, the current research was undertaken with the aim of identifying and modeling the antecedents and consequences of talent disengagement in organizations. Methods This study is a qualitative research project utilizing the meta-synthesis method. …”
    Get full text
    Article
  20. 540

    A New Method of Kronecker Product Decomposition by Yi Wu

    Published 2023-01-01
    “…Theoretical results ensure that the new method is convergent and stable. The simulation results show that the new method is far faster than the known method. …”
    Get full text
    Article