Showing 881 - 900 results of 120,517 for search '"Methodism"', query time: 0.16s Refine Results
  1. 881

    Escape method of malicious traffic based on backdoor attack by MA Bowen, GUO Yuanbo, MA Jun, ZHANG Qi, FANG Chen

    Published 2024-04-01
    “…Launching backdoor attacks against deep learning (DL)-based network traffic classifiers, and a method of malicious traffic escape was proposed based on the backdoor attack. …”
    Get full text
    Article
  2. 882
  3. 883
  4. 884

    Continuous Finite Element Methods of Molecular Dynamics Simulations by Qiong Tang, Luohua Liu, Yujun Zheng

    Published 2015-01-01
    “…So finite element method is also a reliable method to simulate long-time classical trajectory of molecular systems.…”
    Get full text
    Article
  5. 885

    A METHOD OF CREATING DISTRIBUTED ENGINEERING KNOWLEDGE DATABASES by V. А. Kochurov

    Published 2017-12-01
    “…The article reviews the principle and methods for creating the models of distributed engineering knowledge as well as software implementation of such models in the form of the Information and Logical Table Server (SILT) resulted in development of a cluster based on the WCF (Windows Communication Foundation) technology and reciprocity of the SILT elements. …”
    Get full text
    Article
  6. 886
  7. 887
  8. 888

    The Effect of Corn Ensiling Methods on Digestibility and Biogas Yield by Karol Kupryaniuk, Kamil Witaszek, Iryna Vaskina, Sebastian Filipek-Kaźmierczak, Jakub Kupryaniuk, Piotr Sołowiej, Jacek Dach

    Published 2025-01-01
    “…This study investigates the impact of different corn silage preparation methods, namely the traditional and Shredlage methods, on digestibility and biogas yield in anaerobic digestion and its nutritional value—the first complex study of its kind. …”
    Get full text
    Article
  9. 889
  10. 890

    THEORETICAL METHODS FOR INVESTIGATING PROTEIN THERMOSTABILITY AND THEIR APPLICATIONS IN BIOLOGY by N. A. Alemasov, E. S. Fomin

    Published 2014-12-01
    “…But those approaches are limited in accuracy and therefore require certain improvements e.g. making them to allow for molecular charge distribution. Also promising methods are those dealing with rigid regions of proteins. …”
    Get full text
    Article
  11. 891

    A Graph-Based Method for IFC Data Merging by Qin Zhao, Yuchao Li, Xinhong Hei, Mingsong Yang

    Published 2020-01-01
    “…The feasibility of the method is proven by a program, and the method can ignore the impacts of GUID and other factors.…”
    Get full text
    Article
  12. 892

    A two-level method for elephant flow identification by Junrong YAN, Jingchang YE, Peng PAN

    Published 2017-03-01
    “…The high accuracy and low overhead of elephant flows identification have a great meaning on solving the controller's single point of failure problem in SDN traffic management.Aiming at the problem of high overhead of the existing elephant flows identification method,a two-level method for elephant flows identification was proposed which included a suspicious elephant detection algorithm based on TCP write-queue in the first stage and areal elephant detection algorithm based on flow duration in the second stage.During the first stage,the suspicious elephant flows were identified in the end systems to reduce the amount of flows monitored by the SDN controller at the second stage.Analysis and simulation prove that, under the premise of ensuring the accuracy of elephant flow identification, the two-level method for elephant flows identification reduces about 85% overhead of identification compared with sampling identification method.…”
    Get full text
    Article
  13. 893

    Bearing fault diagnosis method based on SAVMD and CNN by SONG ChunSheng, LIANG YaRu, LU NiFang, DU Gang, JIA Bo

    Published 2024-06-01
    “…These results show that this method can be used to achieve bearing fault diagnosis in complex working environment.…”
    Get full text
    Article
  14. 894

    Accurate Modification Method of Gears Based on Spatial Lattice by Zhang Xiaodi, Li Gui, Liang Renjie, Ding Zixi, Peng Qinluan

    Published 2024-03-01
    “…Therefore, a new gear modification method based on spatial lattice is proposed in this study. …”
    Get full text
    Article
  15. 895

    Method of constructing smartflow application based on Web services by LI Hui, CUI Li-zhen, WANG Hai-yang

    Published 2009-01-01
    “…A new service-oriented process pattern——smartflow as well as the just-in-time construction of smartflow was proposed.Firstly,smartflow description framework(SfDF),which was the semantic description cornerstone of smartflow, was put forward.Based on the SfDF,satisfied Web services were discovered.The smartflow model was constructed by using a algorthim based on traveling salesman problem.The feasibility of the method proposed is verified in smart travel platform.…”
    Get full text
    Article
  16. 896

    Two Iterative Methods for Solving Linear Interval Systems by Esmaeil Siahlooei, Seyed Abolfazl Shahzadeh Fazeli

    Published 2018-01-01
    “…Conjugate gradient is an iterative method that solves a linear system Ax=b, where A is a positive definite matrix. …”
    Get full text
    Article
  17. 897

    New methods of surgical treatment of rare tumours of heart by R.M. Vitovsky, V.V. Isayenko, A.O. Rusnak, B.G. Gulak, O.A. Pishchurin

    Published 2016-05-01
    “…New methods of surgical treatment of rare tumours of heart Among benign heart tumors, except most frequently observed myxomas (89.6 % саses), non-myxomatous benign tumours, including fibromas (0.4 % саses) may be diagnosed. …”
    Get full text
    Article
  18. 898
  19. 899
  20. 900

    Android malware detection method based on SimHash by Bo CHEN, Yong-tao PAN, Tie-ming CHEN

    Published 2017-11-01
    “…A new similarity detection scheme based on hierarchical SimHash algorithm was proposed.The scheme extractd contents from different aspects to represent the APK file,then used the improved SimHash to respectively represent the file.The scheme analyzed the APK file by extracting the AndroidManifest.xml file in it,the sum of the Smali code from the decompilation of dex file,instructions extracted in Smali files,Java code set,and instructions extracted in Java code files.Through the study of Voted Perceptron voting algorithm,the scheme used trust weight method,by valuating a trust weight in every layer,then combined all the result with weight in every layer as a resule of scheme,the result can be more reasonable and more convincing.…”
    Get full text
    Article