Showing 801 - 820 results of 120,517 for search '"Methodism"', query time: 0.14s Refine Results
  1. 801

    An Overview of the Molecular Methods in the Diagnosis of Gastrointestinal Infectious Diseases by Muhammad Amjad

    Published 2020-01-01
    “…However, based on the advancement in the molecular diagnostics and with the introduction of commercially available tests, traditional diagnostic techniques have been continuously replaced by these newer rapid antigen detection and molecular-based methods. This review summarizes and discusses the availability, advantages, and disadvantages of molecular methods in the detection and identification of human gastrointestinal pathogens.…”
    Get full text
    Article
  2. 802

    Revisiting a Cutting-Plane Method for Perfect Matchings by Chen, Amber Q., Cheung, Kevin K. H., Kielstra, P. Michael, Winn, Avery D.

    Published 2020-12-01
    “…However, their method requires a strong uniqueness condition, which they imposed by using perturbations of the form $c(i)=c_0(i)+2^{-i}$. …”
    Get full text
    Article
  3. 803

    Method for determining reactions in hinges of mechanism of original manipulator by A. H. Shamutdinov, I. Yu. Lesnyak

    Published 2022-04-01
    “…This article discusses the development of a method for determining reactions in the hinges of a manipulator, based on the classical principle of release from bonds in the example of its main part. …”
    Get full text
    Article
  4. 804
  5. 805

    Analysis of Gamasyab River Flood by Multi-Regression Method by Nabe Khazaei, Mahmood Alaee Taleghani, Habib Jafari

    Published 2013-08-01
    “…For this purpose, two simple logarithmic regression methods are used. First, the environment River catchment Gamasiab of GIS software and each sub-watershed were identified. …”
    Get full text
    Article
  6. 806
  7. 807
  8. 808

    Angular Photometry of Biological Tissue by Ellipsoidal Reflector Method by M. A. Bezuglyi, N. V. Bezuglaya, A. V. Ventsuryk, K. P. Vonsevych

    Published 2019-06-01
    “…Purpose of the research is investigation of the reflectance of biologic tissues by the ellipsoidal reflector method under the variable angle of the incident radiation.The research investigates functional features of improved photometry method by ellipsoidal reflectors. …”
    Get full text
    Article
  9. 809

    A Method for Improving the Accuracy of Link Prediction Algorithms by Jie Li, Xiyang Peng, Jian Wang, Na Zhao

    Published 2021-01-01
    “…This study proposes a method for improving the accuracy of link prediction. …”
    Get full text
    Article
  10. 810
  11. 811

    Analysis of methods for calculating tooth interior fatigue fracture by S. Yu. Lebedev

    Published 2022-04-01
    “…Methods (Findley, V. I. Korotkina, E. I. Tesker and V. …”
    Get full text
    Article
  12. 812
  13. 813
  14. 814
  15. 815

    MACRONUTRIENT CONTENT OF DRY LEAVES COMPOST BY VERMICOMPOSTING METHOD by Kasam Kasam, Fajri Mulya Iresha, Alhamdy Adytama, Abdul Mutolib, Rofiqul Umam, Felga Zulfia Rasdiana, Ali Rahmat

    Published 2023-09-01
    “…Mismanagement in dry leaves will promote the campus area to look dirty. One method to control the dry leaves waste is the vermicomposting process. …”
    Get full text
    Article
  16. 816

    Accelerated traffic replay method based on time compression by Shuo WANG, Jun BAI, Bailing WANG, Xu ZHANG, Hongri LIU

    Published 2021-10-01
    “…With the proliferation of network traffic, replaying traffic in a virtual environment faces many problems.In order to meet the requirements of traffic integrity and accuracy in the replay process, an accelerated traffic replay method based on time-compressed was proposed to achieve accelerated replay of real network traffic in a virtual environment.The method prioritized the compression of the largest time interval in the set of time intervals, and reduced the compression of the smaller intervals, thus reducing the traffic spike per unit time caused by time compression, and reducing the packet loss rate of traffic.The effect was measured in terms of packet loss rate, time interval error and similarity.The experiments show that this method has a lower packet loss rate and lower time interval error compared with the isometric compression method, although it performs worse in similarity.…”
    Get full text
    Article
  17. 817

    Link prediction method based on the similarity of high path by Qiuyang GU, Bao WU, Renyong CHI

    Published 2021-07-01
    “…For the problem that the existing link prediction method has many problems, including low accuracy and low efficiency, a method of high-order path similarity link prediction was proposed.Firstly, the path was used as the judging feature to predict missing links in complex networks, which could make resource allocation more effective and restricts information leakage by punishing public neighbor pairs.Secondly, by using high order paths as judging features, the available long paths between seed nodes would be punished.Finally, several real complex network datasets were used for numerical examples calculation.Experimental results show that the proposed algorithm is more accurate and efficient than other baseline methods.…”
    Get full text
    Article
  18. 818

    Mimic defense authentication method for physical access control by Qinglei ZHOU, Shaohuan BAN, Yingjie HAN, Feng FENG

    Published 2020-06-01
    “…To address the security problem of the vulnerability of the authentication methods of traditional physical access control systems,a mimic defense authentication method was designed based on the principle of mimic defense technique and its dynamic heterogeneous redundant architecture (DHR),using mobile 2D code as the interface and dynamic password as the core.First,the actuator pool of the authentication server was constructed.Then,a central controller consisting of functional modules such as input distribution agent,selector and voter was used to dynamically schedule heterogeneous redundant actuators from the actuator pool.Finally,a multimode ruling on the heterogeneous redundant actuator output to determine the authentication result was made by the voter.The experimental results show that the proposed authentication method has higher security and reliability compared to the traditional physical access control system authentication method,and at the same time,it can be used in combination with other authentication methods.…”
    Get full text
    Article
  19. 819

    Dynamic adaptive offloading method based on WPT-MEC by Lin SU, Xiaochao DANG, Zhanjun HAO, Chunrui RU, Xu SHANG

    Published 2022-12-01
    “…For the dynamic fading time-varying channel state information, a dynamic adaptive offloading (RLDO) method based on WPT-MEC was proposed to solve the task offloading and resource optimization problems for multiple users by combining wireless power transmission (WPT) technology and mobile edge computing (MEC).The wireless power transmission technology can provide energy to wireless end-user (WEU) and effectively alleviate the problem of limited energy supply from conventional batteries.To maximize the resource utilization, a wireless powered MEC network model was designed where the energy collected by the wireless end-user from the wireless access point (AP) was stored in a rechargeable battery, and then this energy was used for task computation or task offloading.The approach performed real-time offloading decisions through a fully connected deep neural networks (DNN) deployed in the MEC server.A fully binary offloading strategy was used for the offloading decision.Simulation results show that the computation rate of the method can still be maintained above 92% in a multi-user time-varying wireless channel-oriented environment.Compared with the basic method, it has great advantages in improving the calculation rate, reducing the delay and energy consumption,and effectively reduces computational complexity.…”
    Get full text
    Article
  20. 820

    THE EXISTING APPROACHES AND METHODS OF FORECASTING OF DEMAND FOR CONTAINER TRANSPORTATIONS by A. Perminova

    Published 2016-01-01
    “…The methodical principles of the analysis of the object of forecasting are considered. …”
    Get full text
    Article