Showing 961 - 980 results of 120,517 for search '"Methodism"', query time: 0.14s Refine Results
  1. 961

    PyFuzzer:automatic in-memory fuzz testing method by Wei-ming LI, Jun-qing YU, Shao-bo AI

    Published 2013-09-01
    “…Fuzz Testing is an effective method to mine all kinds of vulnerabilities.But the main drawbacks to current fuzz testing tools are:firstly,it produces high volume testing data and it’s extraordinary time consumption; secondly,if the accessing needs authentication,the greatest part of test data will be abandoned.PyFuzzer,a novel automatic in-memory fuzz testing tool combining static analysis,dynamic analysis and in-memory fuzz testing,was presented.The tool is highly automatic and effective.Compared with 4n FTP Fuzzer in testing WarFTPD and Serv-U,PyFuzzer can discover all vulnerabilities and improve test efficiency greatly.…”
    Get full text
    Article
  2. 962

    Method for router online security risk assessment quantification by Jun-gang YANG, Li LIANG, Gu-jing LIU, Qian ZHANG, Chang-qing ZHANG

    Published 2013-11-01
    “…The experiment results show the method is effective in calculating the quantitive risk of the router and helpful for administrators to assess security risks.…”
    Get full text
    Article
  3. 963

    CIP Method of Characteristics for the Solution of Tide Wave Equations by Yafei Nie, Kai Fu, Xianqing Lv

    Published 2018-01-01
    “…The CIP-MOC (Constrained Interpolation Profile/Method of Characteristics) is proposed to solve the tide wave equations with large time step size. …”
    Get full text
    Article
  4. 964
  5. 965
  6. 966

    Wind Turbine Aerodynamic Performance by Lifting Line Method by Horia Dumitrescu, Vladimir Cardos

    Published 1998-01-01
    “…Predictions are, shown to compare favorably with existing numerical data from more involved free wake methods, but require less computational effort. Thereby, the present method may be a very useful tool for calculating the aerodynamic loads on horizontal-axis wind turbine blades.…”
    Get full text
    Article
  7. 967

    REGULATION AND ROLLING QUALITY CONTROL ON THE BASIS OF STATISTICAL METHODS by A. N. Polobovets, S. V. Matveeva

    Published 2009-05-01
    “…It is shown that introduction of statistical method of control will allow to reduce efforts for production, delivery of the samples to the laboratory of mechanical testing, and to reduce the expenses as well.…”
    Get full text
    Article
  8. 968

    Random 2D Composites and the Generalized Method of Schwarz by Vladimir Mityushev

    Published 2015-01-01
    “…This method is related to the traditional method based on the average probabilistic values involving the n-point correlation functions. …”
    Get full text
    Article
  9. 969

    The New Method of Sensor Data Privacy Protection for IoT by Yue Wu, Liangtu Song, Lei Liu

    Published 2021-01-01
    “…This article introduces the new method of sensor data privacy protection method for IoT. …”
    Get full text
    Article
  10. 970

    Trajectory privacy protection method based on location obfuscation by Shaobo ZHANG, Qin LIU, Guojun WANG

    Published 2018-07-01
    “…In the process of continuous queries,a method of trajectory privacy protection based on location obfuscation was proposed to solve the problem that K-anonymity was difficult to guarantee user privacy in third party architectrue.Firstly,the (G-1) query obfuscation locations through the location prediction was obtained and the dummy location selection mechanism,and then sent them together with the user’s real query location to different anonymizers to form cloaking regions and sent them to the LBS server for queries,and the query results were returned to the user by different anonymizers.In this method,the user’s real query location was confused by the location obfuscation,and the attacker couldn’t deduce the user’s trajectory from a single anonymizer or the LBS server.The method can enhance the privacy of the user’s trajectory and can effectively solve the performance bottleneck in the single anonymizer structure.Security analysis shows the security of the proposed approach,and experiments show this method can reduce the number of interactions between the user and the LBS server and the overhead of the single anonymizer.…”
    Get full text
    Article
  11. 971

    A New Method of Network Index Data Forecast by Zhigang Ni

    Published 2013-03-01
    “…As the expansion of communication industry, the network data tends to be diverse, comp1ex and numerous.Therefore, the management and optimization become more and more difficu1t.And the index data forecast requires higher and higher accuracy.How to manage the network data effective1y and comprehensive1y turns to be a capita1 issue.A new method of network index data forecast was studied.…”
    Get full text
    Article
  12. 972

    Harmonising Theory: Integrating Singing With Grounded Theory Methods by Belinda Densley, Virginia Dickson-Swift, Jane Mills

    Published 2025-01-01
    “…International Journal of Qualitative Methods…”
    Get full text
    Article
  13. 973

    Efficient method of constructing parameters in R-ate paring by LI Bin, WANG Xin-mei

    Published 2010-01-01
    “…In order to accelerate the computing of Tate paring, a new technique of selection method of parameters (A,B) based on R-ate technique had been proposed. …”
    Get full text
    Article
  14. 974

    Spatial error concealment method based on tensor voting by GAN Nan, GONG Sheng-rong, WANG Zhao-hui, LIU Chun-ping, LIU Quan

    Published 2011-01-01
    “…As the existing spatial error concealment algorithms is lack of the recovery accuracy in complex texture areas,a spatial error concealment method based on tensor voting was proposed,which extracted structural information by using tensor voting.On this basis,an improved spatial error concealment algorithm which combined with the traditional algo-rithms was further proposed.Firstly the lost marc blocks were classified into three categories,and then the appropriate concealment method was chose to recover the lost macro blocks according to the type of lost macro blocks.Experimental results show that the proposed method improves the recovery accuracy effectively and avoids the edge disorder phe-nomenon,especially in the region with more complex texture,the subjective and objective quality of concealed image is improved greatly.…”
    Get full text
    Article
  15. 975

    Application of the Moment Of Inertia method to the Critical-Plane Approach by Hao Wu, Marco Antonio Meggiolaro, Jaime Tupiassú Pinho de Castro

    Published 2016-10-01
    “…The Moment-Of-Inertia (MOI) method has been proposed by the authors to solve some of the shortcomings of convex-enclosure methods, when they are used to calculate path-equivalent ranges and mean components of complex non-proportional (NP) multiaxial load histories. …”
    Get full text
    Article
  16. 976

    Botnet detecting method based on group-signature filter by WANG Jin-song1, LIU Fan1, ZHANG Jian3

    Published 2010-01-01
    “…A botnet detecting method was presented based on group-signature filter,suitable for the traditional signatures matching algorithm.Using multiple member signatures to filter the packets of hosts from Intranet,the proposed method is able to handle the shortened and scattered signatures at a space expense of O(tmn).The simulated experiment proves the correctness and validity of the detecting method.…”
    Get full text
    Article
  17. 977

    Privacy protection method on time-series data publication by Dong YU, Hai-yan KANG

    Published 2015-11-01
    “…A differential privacy model was proposed based on the sampling filtering and the mechanism of evaluation.Firstly,fixed sampling method was used to sample the original data and the non-sampling data be published directly.Secondly,for the sampling date,utilize the differential privacy mechanism to add the noise.Then,use Kalman to correct the sampling date.Finally,use the mutual information to evaluate data under different sampling intervals.Through the experiment,it is proved that the mechanism can achieve a good balance between the practicality and protective.…”
    Get full text
    Article
  18. 978

    RSA-based image recognizable adversarial attack method by Yu ZHANG, Hailiang LI

    Published 2021-10-01
    “…Adversarial attack is an important part of deep learning security research.Relying on the RSA signature schemes and RSA encryption schemes in cryptography, an adversarial attack method that adversarial examples can be recognized by a specific classifier is proposed.Through the idea of one pixel attack, the normal image can have the ability to make other classifier misclassify while embedding additional information.It can be used in classifier authorization management, online image anti-counterfeiting, etc.The experiment show that the adversarial examples can be recognized under the specific classifier, and the disturbance noise is difficult to detect by the human eye.…”
    Get full text
    Article
  19. 979

    Coupling Analysis of Research Methods for Hydrological Model Uncertainty by ZHENG Yanfeng

    Published 2022-01-01
    “…To reduce the average bandwidth of the forecast interval while increasing the interval coverage,this paper conducted a coupling analysis of dual EnKF and GLUE,two methods to research the hydrological model uncertainty and obtained the dual E-G method.Taking the Xin'anjiang model as an example,the paper used three evaluation indicators (i.e.…”
    Get full text
    Article
  20. 980