Showing 821 - 840 results of 120,517 for search '"Methodism"', query time: 0.16s Refine Results
  1. 821
  2. 822

    Intelligent terminal device identification method of internet of things by Qingwang XIAO, Jinhua WANG, Yixiang ZHU

    Published 2017-02-01
    “…The correct identification of the terminal of the internet of things is an important prerequisite to establish a secure connection of the internet of things.The identification of the intelligent terminal is particularly important.The device identification method of intelligent terminals in internet of things under the existing technology was investigated.From the perspective of the security of the internet of things,the security problem that the device identification method was too simple to be easily falsified of the existing scheme was analyzed.Combining the achievements of project research in the field of internet of things and the experience of the industry,the identification method of multidimensional device feature information of IoT intelligent terminals was proposed.…”
    Get full text
    Article
  3. 823

    A Variational Method for Multivalued Boundary Value Problems by Droh Arsène Béhi, Assohoun Adjé

    Published 2020-01-01
    “…In this purpose, we use a variational method which relies on Szulkin’s critical point theory. …”
    Get full text
    Article
  4. 824

    Efficient Method to Approximately Solve Retrial Systems with Impatience by Jose Manuel Gimenez-Guzman, M. Jose Domenech-Benlloch, Vicent Pla, Jorge Martinez-Bauset, Vicente Casares-Giner

    Published 2012-01-01
    “…This technique, known as value extrapolation, truncates the infinite state space using a polynomial extrapolation method to approach the states outside the truncated state space. …”
    Get full text
    Article
  5. 825
  6. 826
  7. 827
  8. 828
  9. 829

    Electrochemical Method for the Assay of Organic Peroxides Directly in Acetonitrile by Vanina Ivanova, Mariya Pimpilova, Maria Stoyanova, Nina Dimcheva

    Published 2025-01-01
    “…Herein, we propose an alternative electrochemical method to the classical iodometric titration method most widely used for determining the PV. …”
    Get full text
    Article
  10. 830

    Formal modeling and analyzing method for database security policy by Rong WANG, Min ZHANG, Deng-guo FENG, Hao LI

    Published 2015-09-01
    “…Because of the high-level abstraction,insufficient description of database states and constraints,it was difficult to find the tiny flaws in design and implementation.Based on PVS,a method for formal description and analysis of data-base security policy was proposed,which was more close to the actual database,more widely used in reality,and more complete in describing the safe properties,more extendible of the model,and ensure the efficiency of modeling and veri-fication.Finally,this method is applied in the security policy modeling and analyzing of BeyonDB,which is a commer-cial database,find some security risks in the system design,and thereby verify its effectiveness.…”
    Get full text
    Article
  11. 831

    Block Preconditioned SSOR Methods for -Matrices Linear Systems by Zhao-Nian Pu, Xue-Zhong Wang

    Published 2013-01-01
    “…We present a block preconditioner and consider block preconditioned SSOR iterative methods for solving linear system . When is an -matrix, the convergence and some comparison results of the spectral radius for our methods are given. …”
    Get full text
    Article
  12. 832

    Review of Particle Breakage Measurement Methods for Calcareous Sand by Liang-Jie Xu, Ren Wang, Dong-Sheng Xu, Xin-Zhi Wang, Qing-Shan Meng, Chang-Qi Zhu

    Published 2022-01-01
    “…The characteristic particle size measurement method for particle breakage is simple and has limitations. …”
    Get full text
    Article
  13. 833

    Dimension Estimation Using Weighted Correlation Dimension Method by Yuanhong Liu, Zhiwei Yu, Ming Zeng, Shun Wang

    Published 2015-01-01
    “…Among all the dimension estimation methods, correlation dimension (CD) method is one of the most popular ones, which always assumes that the effect of every point on the intrinsic dimension estimation is identical. …”
    Get full text
    Article
  14. 834
  15. 835

    Measures and optimization methods of communications network energy efficiency by Xiuying NIE

    Published 2019-11-01
    “…Although network played an important role in energy efficiency improvement for many industries,network energy consumption had threatened the sustainable development of network operators,due to the fast increasing of the networks’ energy consumption recent years as the swift development of internet users,internet services and applications.The energy consumption risk faced by network operators,the research development of the measures and optimization methods of network energy efficiency was introduced.The energy efficiency optimization in the future network was finally concluded.…”
    Get full text
    Article
  16. 836

    Method of connection establishment between CPE and the cloud platform by UFengchao FU, Yuanbao XIE

    Published 2016-12-01
    “…The main idea of vCPE is to split the CPE into two parts and to make the L3 functions up to the network. Through this method, CPE can be simplified and the difficulty for subscribers to operate and maintain CPE can be reduced. …”
    Get full text
    Article
  17. 837

    Deception defense method against intelligent penetration attack by Jinyin CHEN, Shulong HU, Changyou XING, Guomin ZHANG

    Published 2022-10-01
    “…The intelligent penetration attack based on reinforcement learning aims to model the penetration process as a Markov decision process, and train the attacker to optimize the penetration path in a trial-and-error manner, so as to achieve strong attack performance.In order to prevent intelligent penetration attacks from being maliciously exploited, a deception defense method for intelligent penetration attack based on reinforcement learning was proposed.Firstly, obtaining the necessary information for the attacker to construct the penetration model, which included state, action and reward.Secondly, conducting deception defense against the attacker through inverting the state dimension, disrupting the action generation, and flipping the reward value sign, respectively, which corresponded to the early, middle and final stages of the penetration attack.At last, the three-stage defense comparison experiments were carried out in the same network environment.The results show that the proposed method can effectively reduce the success rate of intelligent penetration attacks based on reinforcement learning.Besides, the deception method that disrupts the action generation of the attacker can reduce the penetration attack success rate to 0 when the interference ratio is 20%.…”
    Get full text
    Article
  18. 838
  19. 839

    ANALYSIS AND TEST METHODS OF SUSPENSION STRUCTURE OF AIRBORNER MISSILE by SONG Lei, ZHANG Jin, WANG CongWei, JIN Ling, XU JunWei

    Published 2019-01-01
    “…First, the inertia release method is used. This method can accurately simulate the boundary conditions of the hang up flight but the ground static test can’t be carried out accordingly. …”
    Get full text
    Article
  20. 840