Showing 741 - 760 results of 120,517 for search '"Methodism"', query time: 0.12s Refine Results
  1. 741

    Method of diversity software protection based on fusion compilation by Xiaobing XIONG, Hui SHU, Fei KANG

    Published 2020-12-01
    “…For the obvious characteristics and single mode of the existing common protection methods,with the help of the LLVM framework,a diversity software protection method based on fusion compilation was proposed.In the proposed method,the target software is encrypted randomly,and deeply integrated with the bunker code at the compilation level,and the encrypted target software is decrypted by memory execution technology.Then it is executed in the form of no process in memory,and the diversified protection effect of the target software is realized by the diversity of the bunker and the randomness of the fusion strategies.A number of commonly used software are selected as the test case,and the proposed method is tested from the aspects of resource cost,protection effect,comparative experiment and so on.Compared with the traditional methods such as obfuscation and packing,the proposed method has great advantages in anti-static analysis and anti-dynamic debugging,and can effectively resist the mainstream methods of reverse analyzing and cracking.…”
    Get full text
    Article
  2. 742

    Clinical method, ‘’good clinical practices’’, and medical professionalism by Miguel Ángel Moreno Rodríguez

    Published 2010-12-01
    “…It is pointed out that the clinical method is the scientific or experimental method of science applied to the attention of an individual patient, but in this case the experimental stage is replaced by the confrontation with diagnostic technology. …”
    Get full text
    Article
  3. 743

    Power emergency assistant decision methods based on CBR by Yongsheng MEN, Shanbao LIU

    Published 2015-12-01
    “…Application of case-based reasoning(CBR)to generate grid infrastructure accidents emergency disposal scheme,can provide auxiliary decision scientific method for emergency people.Through investigation and analysis of the electric accident case,conclude basic situation,disposal process,disposal effect in three aspects of the characteristic attributes presentation framework of power accidents.Search similar case in two methods by means of inductive retrieval and similarity calculation.The determination of membership function of fuzzy attributes by using expert scoring was put forward.Fuzzy attribute similarity by membership functions was calculated and the power accidents case-based reasoning emergency disposal of the auxiliary decision-making process were given.…”
    Get full text
    Article
  4. 744

    Cloud resource allocation method based on time collaboration by Bo YIN, Yun-yong ZHANG, Zhi-jun WANG, Bing-yi FANG, Wei-bin FENG

    Published 2014-11-01
    “…According to the application in the cloud computing environment load and load change is difficult to predict the amount of real time.A resource allocation method based on cooperative time was designed,the application of this method in the process of operation,according to the load and the task processing time,formulate the resource allocation scheme for multi virtual machine cooperation.The method uses time collaborative to effectively reuse resource,improves the utilization rate of data center resources,and further reduces the cost of operation and maintenance of data center.It has realistic significance to the increase of cloud resource provider profit.…”
    Get full text
    Article
  5. 745

    Intention embedding method based social bot detection by NIU Hongfeng, LI Jiawei, SONG Yunpeng, CAI Zhongmin

    Published 2024-11-01
    “…Artificial intelligence generated content technology has significantly enhanced the disguise capabilities of social bots, presenting new challenges to existing bot detection methods. By modeling the intentions of social media users through intention representation, a intention embedding method based social bot detection was proposed, thereby avoiding the difficulty of directly detecting bots with enhanced behavioral camouflage at the action level on social platforms. …”
    Get full text
    Article
  6. 746
  7. 747
  8. 748
  9. 749

    Effect of the Synthesis Methods on Hydrophobic Properties of Modified Silicas by Olena V. Goncharuk, Iryna Ya. Sulym, Konrad Terpilowski, Evgeniy M. Pakhlov

    Published 2015-08-01
    “…Composites based on fumed silica with surface hydrophobic groups were synthesized by chemical substitution of silanol groups' proton for trimethylsilyl (TMS) groups, adsorption of poly(dimethylsiloxane) (PDMS) and combined chemical-adsorption methods. Microcalorimetry measurements and values of the wetting contact angle with water (Θ) were obtained to investigate the hydrophobic properties of prepared materials. …”
    Get full text
    Article
  10. 750

    Opinion mining method on hot topic of micro−blog by Guang-lei ZHANG, Ya-bin XU

    Published 2014-11-01
    “…A method of opinion mining was argued in connection with hot topic of micro-blog.Firstly,opinion sentences are identified by syntactic dependencies templates and support vector machine (SVM).Secondly,the opinion words can be get in opinion sentences by syntactic dependencies and lexical relations,thus they can be displayed clearly.Finally,the experiment proves the effectiveness of this method.…”
    Get full text
    Article
  11. 751
  12. 752

    The Alternating Direction Method of Multipliers for Sufficient Dimension Reduction by Sheng Ma, Qin Jiang, Zaiqiang Ku

    Published 2024-01-01
    “…The minimum average variance estimation (MAVE) method has proven to be an effective approach to sufficient dimension reduction. …”
    Get full text
    Article
  13. 753
  14. 754
  15. 755
  16. 756
  17. 757

    Earthquake prediction method based on seismogenic process tracking by Xuezhong Chen, Yan’e Li, Lijuan Chen

    Published 2025-01-01
    “…Until now, empirical earthquake prediction methods have remained in use, but the accuracy falls far short of what is needed to effectively mitigate earthquake disasters. …”
    Get full text
    Article
  18. 758
  19. 759

    Study on Thixojoining Process Using Partial Remelting Method by M. N. Mohammed, M. Z. Omar, M. S. Salleh, K. S. Alhawari

    Published 2013-01-01
    “…AISI D2 cold-work tool steel was thixojoined to 304 stainless steel by using a partial remelting method. After thixojoining, microstructural examination including metallographic analysis, energy dispersive spectroscopy (EDS), and Vickers hardness tests was performed. …”
    Get full text
    Article
  20. 760

    Composite Rolling Test Control Method of Gear and Software by Guo Xiaodong, Zhang Hongli, Zhang Weiqing, Wang Ge, Huang Gang

    Published 2016-01-01
    “…According to the test result,the gear transmission quality is reflected more systematically by using this new method.…”
    Get full text
    Article