Showing 1,021 - 1,040 results of 120,517 for search '"Methodism"', query time: 0.15s Refine Results
  1. 1021
  2. 1022

    Methodology for integrated analysis of vector- and spectroscopic bioimpedance methods by Bello José Luis García, Lafargue Alcibiades Lara, Ciria Héctor Camué, Luna Taira Batista, Leyva Yohandys Zulueta

    Published 2024-12-01
    “…The aim of this study is to propose a methodology that allows us to integrate two methods of electrical bioimpedance analysis: bioelectrical impedance vector analysis, and bioelectrical impedance spectroscopy to evaluate the health of individuals.…”
    Get full text
    Article
  3. 1023

    Survey on community detection method based on random walk by Yang GAO, Hongli ZHANG

    Published 2023-06-01
    “…Random walk techniques achieve high accuracy and efficiency in community detection.To summarize and analyze community detection methods based on random walk, the random walk technique was classified into personalized PageRank, heat kernel diffusion and other random walk methods, and community detection was classified into tasks of local community detection and global community structure identification.A detailed overview of different techniques based on random walk and their application to the tasks of community detection was provided, problems in existing methods were analyzed, and future research directions were pointed out.Finally, evaluation metrics of community detection accuracy for different community detection tasks were summarized in terms of similarity and structure respectively to facilitate research in community detection.…”
    Get full text
    Article
  4. 1024

    Complexity control method of random forest based HEVC by Peng WEN, Zongju PENG, Fen CHEN, Gangyi JIANG, Mei YU

    Published 2019-02-01
    “…High efficiency video coding (HEVC) has high computational complexity,and fast algorithm cannot perform video coding under restricted coding time.Therefore,a complexity control method of HEVC based on random forest was proposed.Firstly,three random forest classifiers with different prediction accuracy were trained to provide various coding configurations for coding tree unit (CTU).Then,an average depth-complexity model was built to allocate CTU complexity.Finally,the CTU coding configuration,determined by the smoothness,average depth,bit,and CTU-level accumulated coding error,was used to complete complexity control.The experimental results show that the proposed method has better complexity control precision,and outperforms the state-of-the-art method in terms of video quality.…”
    Get full text
    Article
  5. 1025

    Graphical Optimization Method for Symmetrical Bidirectional Corridor Progression by Kai Lu, Shuyan Jiang, Yiming Zhao, Yongjie Lin, Yinhai Wang

    Published 2021-01-01
    “…The graphical progression method can obtain grand coordinated schemes with minimal computational complexity. …”
    Get full text
    Article
  6. 1026

    TPCM-based trusted PXE boot method for servers by Guojie LIU, Jianbiao ZHANG

    Published 2020-12-01
    “…The PXE startup mechanism downloads operating system files through the network and starts the operating system,which is widely used in server network startup.It is widely used in server network startup.The PXE boot process is secured and trusted through trusted computing technology to prevent the PXE boot file from being tampered with maliciously,ensuring the safe and reliable operation of the server.The cyber security classified protection standard requires that the system boot program and system program of the server device be trusted and verified based on the trusted root.A TPCM-based server trusted PXE boot method based on the requirements of classified protection standard was proposed to ensure the security and trust of the server's BIOS firmware,PXE bootfiles,and Linux system files.When the server performs PXE boot,TPCM measured BIOS firmware,BIOS boot environment measured PXE boot files,and PXE boot environment measured Linux system files.Taking TPCM as the root of trust,one level of measurement,one level of trust,and a chain of trust were established to achieve a trusted server operating environment.The proposed method was tested on a domestically-controlled,self-controllable Shenwei server.The experimental results show that the proposed method is feasible.…”
    Get full text
    Article
  7. 1027
  8. 1028
  9. 1029
  10. 1030

    Integrated positioning method of roadheader based on inertial technology by Lingfei SUN, Ya LIU, Jiguo PENG, Muyi YANG, Zhiyuan MA, Kun ZHANG

    Published 2024-12-01
    “…Taking the inertial navigation system as the main system, a combined positioning and orientation method based on inertial navigation system and laser sensing system is proposed. …”
    Get full text
    Article
  11. 1031

    Methods to address functional unblinding of raters in CNS trials by Steven D. Targum, William P. Horan, Vicki G. Davis, Alan Breier, Stephen K. Brannan

    Published 2025-02-01
    “…These methods may have utility across all clinical trials.…”
    Get full text
    Article
  12. 1032
  13. 1033

    New methods of local medical treatment of purulent wounds by A. Yu. Grigoryan, A. I. Bezhin, T. A. Pankrusheva, L. V. Zhilyaeva

    Published 2020-06-01
    “…Research methods: in an in vitro experiment, growth retardation zones were determined for the most common pathogens of wound infection using the standard disc method. …”
    Get full text
    Article
  14. 1034

    Methods of casting of composite aluminium alloys with graphite particles by V. V. Ovchinnikov, A. T. Volochko, A. P. Laskovnev, Zh. E. Makarova

    Published 2002-02-01
    “…The article describes the basic methods of casting of antifriction aluminium-graphite alloys and their peculiarities.…”
    Get full text
    Article
  15. 1035

    Modifications of the continuation method for the solution of systems of nonlinear equations by G. R. Lindfield, D. C. Simpson

    Published 1979-01-01
    “…For the easier problems the modified method is equivalent to the Davidenko-Broyden algorithm.…”
    Get full text
    Article
  16. 1036

    DMA-based key generation method for IoT scenario by Yinuo HAO, Zhou ZHONG, Xiaoli SUN, Liang JIN

    Published 2022-12-01
    “…Aiming at the problems of slow update frequency of channel key, low generation rate and limited node resources in the IoT scenario, a DMA-based physical layer key generation method was proposed, by using the agility and reconfigurability of DMA to improve the time variability and randomness of received signal.Firstly, DMA was used by the transmitter to randomly weight the signal and send it to the receiver, which could enhance the randomness of signals on the premise of ensuring the transparent reception of the signal.Then, the key from the received signal was extracted by the sender and receiver.By combining the rapid changeability and randomness of DMA, the randomness of signal source and the randomness of natural channel, a composite channel was constructed to improve the randomness of the key source.In addition, the channel estimation was transfered overhead from the terminal to the base station, which effectively reduced the overhead and delay of the communication system, and was suitable for IoT scenarios with asymmetric resources and lightweight equipment.Simulation results show that the proposed method can effectively improve the key generation rate in quasi-static scenarios, and the generated physical layer key has passed the NIST test.…”
    Get full text
    Article
  17. 1037
  18. 1038

    The analysis of methods for calculating seals of hybrid power machines by E. A. Pavlyuchenko, A. S. Tegzhanov, V. E. Shcherba, E. A. Lysenko, A. K. Kuzhbanov

    Published 2023-03-01
    “…The article discusses the main methods for calculating seals of hybrid power machines. …”
    Get full text
    Article
  19. 1039
  20. 1040

    Channel modeling and performance test method for 5G by Guiming WEI, Xiang ZHANG, Yuhang GUO, Shangbing QIAO

    Published 2021-02-01
    “…With the rapid development of 5G wireless communication system, the throughput of 5G gNB and user equipment (UE) in the practical field environment is of great important.How to generate the accurate model in lab, which can represent the propogation condition in the field, has drawn great interests from both the academic and industrial communities.The channel modeling methods of 4G and 5G were introduced, and for 5G UE testing, the advantages of the multi-input multi-output (MIMO) and over-the-air (OTA) performance test solution were showed.Then, a detailed description of the OTA channel modeling principle and throughput simulation results were given in order to provide reference for related work.…”
    Get full text
    Article