Showing 841 - 860 results of 120,517 for search '"Methodism"', query time: 0.17s Refine Results
  1. 841

    Fasting for male fertility—a mixed methods study by Katharina T. May, Jocelyn Behling, Katharina Sochiera-Plegniere, Katharina Batschari, Christian S. Kessler, Christian S. Kessler, Christian S. Kessler, Andreas Michalsen, Andreas Michalsen, Farid I. Kandil, Sarah B. Blakeslee, Michael Jeitler, Michael Jeitler, Michael Jeitler, Wiebke Stritter, Daniela A. Koppold, Daniela A. Koppold, Daniela A. Koppold

    Published 2025-01-01
    “…This study aimed at investigating feasibility and effects of a Fasting Mimicking Diet (FMD) in the context of male subfertility.Materials and methodsIn this two-arm, randomized, controlled, exploratory mixed methods study men with impaired sperm quality were randomized into a fasting and a waiting-list control group. …”
    Get full text
    Article
  2. 842

    Smart Shift Decision Method Based on Stacked Autoencoders by Zengcai Wang, Yazhou Qi, Guoxin Zhang, Lei Zhao

    Published 2018-01-01
    “…Manual calibration and testing on real vehicles are common methods of generating shifting schedules for newly developed vehicles. …”
    Get full text
    Article
  3. 843

    Progressive active inference method of protocol state machine by Yan PAN, Wei LIN, Yuefei ZHU

    Published 2023-04-01
    “…Protocol state machine active inference is a technique that relies on active automata learning.However, the abstraction of the alphabet and the construction of the mapper present critical challenges.Due to the diversity of messages of the same type, the response types of the same type are different, causing the method of regarding the message types as the alphabet will result in the loss of states or state transitions.To address the issue, message types were refined into subtypes according to the different responses and a progressive active inference method was proposed.The proposed method extracted the state fields from the existing protocol data to construct the initial alphabet and the mapper, and obtained the initial state machine based on active automata learning.It then mutated the existing messages to explore the response sequences, which were inconsistent with the current state machine.The mutated message was regarded as a protocol subtype and added to the alphabet, and a new state machine was inferred progressively based on the new alphabet.In order to reduce the interactions, a pre-response query algorithm was proposed based on prefix matching for the caching mechanism in the active automata learning.The ProLearner tool was utilized to evaluate the proposed method in the context of the SMTP and RSTP protocols.It is verified that the pre-response query method can effectively reduce the number of actual interactions, with an average reduction rate of about 10%.…”
    Get full text
    Article
  4. 844

    Robust deepfake detection method based on siamese network by LIN Shanhe

    Published 2024-04-01
    “…In response to the need for robust detection, researchers have been developing methods to identify deepfakes. While current detection methods perform well on high-quality images, they often falter when confronted with low-quality or compressed images. …”
    Get full text
    Article
  5. 845

    Binary image steganography method based on layered embedding by Yuxiang CHENG, Weiming ZHANG, Weixiang LI, Nenghai YU

    Published 2021-10-01
    “…A non-additive distortion binary image steganography method was proposed which divided the cover image into two sub cover images, updated the distortion through delivering influence factor, and used the minimizing distortion codes to achieve message embedding.Compared with the previous additive distortion steganography methods with fixed distortion, the proposed method combined the characteristics of binary images with only black and white pixels.Hence, it facilitated the correlation capture of pixel points and dynamic modification of distortion, improving the visual quality and steganography security of the binary image steganography.…”
    Get full text
    Article
  6. 846
  7. 847

    Reliable heuristic mapping method for survivable virtual network by Qiang ZHU, Hui-qiang WANG, Chun-guang MA, Guang-sheng FENG, Hong-wu LV

    Published 2015-07-01
    “…For reliable virtual network mapping problem,virtual network survivability constraints are introduced to ensure that the rest of the mapped virtual network remains connected under a single node failure condition in the substrate network,which makes sure the completeness of the virtual network and continuity of services.In order to reduce cost of the substrate network,the reliable heuristic mapping problem is considered as an integer linear programming model and a reliable heuristic mapping method for survivable virtual network is proposed to solve the problem.The simulation results show that average usage of links is reduced and the success rate,average revenue of mapping,recovery success rate of virtual network are increased compared with the existing reliable mapping algorithms.…”
    Get full text
    Article
  8. 848

    Treatment methods for sugar rich wastewater: A review by Sadia Fida, Maria Yasmeen, Rabia Adnan, Muhammad Zeeshan

    Published 2025-06-01
    “…Anaerobic methods are more energy-efficient, enabling energy recovery as methane and hydrogen gas while producing less sludge. …”
    Get full text
    Article
  9. 849
  10. 850

    STRUCTURAL DAMAGE IDENTIFICATION BY SINGULAR VALUE TRUNCATION METHOD by YANG QiuWei, LU Chen, LI CuiHong

    Published 2019-01-01
    “…The singular value truncation method is studied in this work for structural damage identification. …”
    Get full text
    Article
  11. 851
  12. 852

    Circular thin plates buckling analysis with HRPIM method by Baid Sokayna, Hilali Youssef, Mesmoudi Saïd, Bourihane Oussama

    Published 2025-01-01
    “…The algorithm integrates high-order continuation (HOC) solver and the Hermite-type radial point interpolation method (HRPIM). The in-plane displacement is approximated with RPIM method, while the HRPIM approach is used to compute the transverse component and its derivatives. …”
    Get full text
    Article
  13. 853

    Justification of the Method of Vehicle Engine Radiator Ultrasonic Cleaning by Baurzhan Moldabaev, Kirill Sinelnikov, Aliya Kukesheva

    Published 2025-01-01
    “…Results confirm the applicability of this method for cleaning the vehicle radiators.…”
    Get full text
    Article
  14. 854
  15. 855

    Comparison of Machine Learning Methods for the Arterial Hypertension Diagnostics by Vladimir S. Kublanov, Anton Yu. Dolganov, David Belo, Hugo Gamboa

    Published 2017-01-01
    “…Moreover, in the study, different methods of feature extraction are analyzed: statistical, spectral, wavelet, and multifractal. …”
    Get full text
    Article
  16. 856
  17. 857
  18. 858

    Method of Infinite System of Equations for Problems in Unbounded Domains by Dang Quang A, Tran Dinh Hung

    Published 2012-01-01
    “…Numerical experiments for several examples show the effectiveness of the offered method.…”
    Get full text
    Article
  19. 859
  20. 860

    Load Forecasting in Electrical Grids: Analysis of Methods and their Trends by Kyryk V.V., Shatalov Y.O.

    Published 2025-02-01
    “…This analysis evaluates various forecasting approaches, including statistical methods, artificial intelligence, fuzzy logic, ensemble methods, and hybrid systems, to understand their evolution and current state. …”
    Get full text
    Article