Showing 1,241 - 1,260 results of 120,517 for search '"Methodism"', query time: 0.19s Refine Results
  1. 1241
  2. 1242
  3. 1243
  4. 1244

    A New Method to Prove and Find Analytic Inequalities by Xiao-Ming Zhang, Bo-Yan Xi, Yu-Ming Chu

    Published 2010-01-01
    “…We present a new method to study analytic inequalities. As for its applications, we prove the well-known Hölder inequality and establish several new analytic inequalities.…”
    Get full text
    Article
  5. 1245

    Precisely positioning method for roadheaders and robotic roadheader system by Xinming LU, Changqing YAN, Zhaoping YUAN

    Published 2020-02-01
    “…To overcome the problems faced in underground positioning,the robotic roadheader mine Internet of things (IoT) was designed which connected multi sensors,surveying devices and industrial computers,and a novel positioning method was developed,based on which a robotic roadheader system was built.The robotic roadheader system was employed for real-world tunnel cutting.The experimental results verifies the high accuracy of the positioning method,which achieves an RMSE error less than 5 cm,and the robust running of the robotic roadheader indicates that the robotic roadheader system can precisely perceive the surrounding environment and make precise interaction with the working environment,which yield a safety,high efficiency,and precisely underground tunnel building and coal mining and an unmanned working surface.…”
    Get full text
    Article
  6. 1246

    Modified Preconditioned GAOR Methods for Systems of Linear Equations by Xue-Feng Zhang, Qun-Fa Cui, Shi-Liang Wu

    Published 2013-01-01
    “…The comparison results show that the convergence rate of the preconditioned generalized AOR (PGAOR) methods is better than that of the original GAOR methods. …”
    Get full text
    Article
  7. 1247
  8. 1248

    Noise-attention-based forgery face detection method by Bolin ZHANG, Chuntao ZHU, Qilin YIN, Jingqiao FU, Lingyi LIU, Jiarui LIU, Hongmei LIU, Wei LU

    Published 2023-08-01
    “…With the advancement of artificial intelligence and deep neural networks, the ease of image generation and editing has increased significantly.Consequently, the occurrence of malicious tampering and forgery using image generation tools is on the rise, posing a significant threat to multimedia security and social stability.Therefore, it is crucial to research detection methods for forged faces.Face tampering and forgery can occur through various means and tools, leaving different levels of forgery traces during the tampering process.These traces can be partly reflected in the image noise.From the perspective of image noise, the noise components reflecting tampering traces of forged faces were extracted through a noise removal module.Furthermore, noise attention was generated to guide the backbone network in the detection of forged faces.The training of the noise removal module was supervised using SRM filters.In order to strengthen the guidance of the noise removal module, the noise obtained by the noise removal module was added back to the real face image, forming a pair of supervised training samples in a self-supervised manner.The experimental results illustrate that the noise features obtained by the noise removal module have a good degree of discrimination.Experiments were also conducted on several public datasets, and the proposed method achieves an accuracy of 98.32% on the Celeb-DF dataset, 92.61% on the DFDC dataset, and more than 94% on the FaceForensics++ dataset, thus proving the effectiveness of the proposed method.…”
    Get full text
    Article
  9. 1249
  10. 1250
  11. 1251

    CLM:differential privacy protection method for trajectory publishing by Hao WANG, Zheng-quan XU, Li-zhi XIONG, Tao WANG

    Published 2017-06-01
    “…In order to solve the problem existing in differential privacy preserving publishing methods that the independent noise was easy to be filtered out,a differential privacy publishing method for trajectory data (CLM),was proposed.A correlated Laplace mechanism was presented by CLM,which let Gauss noises pass through a specific filter to produce noise whose auto-correlation function was similar with original trajectory series.Then the correlated noise was added to the original track and the perturbed track was released.The experimental results show that the proposed method can achieve higher privacy protection and guarantee better data utility compared with existing differential privacy preserving publishing methods for trajectory data.…”
    Get full text
    Article
  12. 1252

    Host security assessment method based on attack graph by Hongyu YANG, Haihang YUAN, Liang ZHANG

    Published 2022-02-01
    “…In order to solve the problems of inaccurate calculation of host security value and ignoring host correlation in attack graph, a host security assessment method based on attack graph was proposed.First, the host attack graph was generated to quantify the atomic attack probability and the attack probability of the host was calculated from four perspectives, such as vulnerability itself, time, environment and operational system availability.Then, the host assets importance was calculated according to expert transcendental evaluation and correlation weighting method, and the topology importance of host was calculated according to the association relationship between hosts in attack graph.Finally, the host security value was calculated according to the impact value of host vulnerability, host importance and host attack probability.The experimental results show that the importance and security value of the proposed method accord with the real network situation and can reflect the security condition of the host more completely and accurately.The standard deviation of host safety value obtained by the proposed method is 0.078, which is larger than that obtained by other methods, indicating that the safety value obtained by the proposed method is more discrete and easier to distinguish the safety level from the subsequent risk disposal priority.…”
    Get full text
    Article
  13. 1253

    Demonstration of sizing nursing staff methods in intensive care by Érica Batassini, João Lucas Campos de Oliveira, Mariur Gomes Beghetto

    Published 2025-01-01
    “…The difference in nurses between the methods was 18 professionals. Conclusion: the choice of the calculation and the number of work shifts substantially interfere in the estimation of intensive care nursing staff. …”
    Get full text
    Article
  14. 1254

    The Incident Field Optimization Method for the Electromagnetic Inverse Problems by Hao Li, Lijia Chen, Jinghui Qiu

    Published 2022-01-01
    “…In this letter, an incident field optimization (IO) method integrated with contrast source inversion (CSI) method and multiplicative regularized CSI (MR-CSI) method is proposed to deal with the electromagnetic inverse problems. …”
    Get full text
    Article
  15. 1255
  16. 1256
  17. 1257
  18. 1258

    QuEChERS Method Followed by Solid Phase Extraction Method for Gas Chromatographic-Mass Spectrometric Determination of Polycyclic Aromatic Hydrocarbons in Fish by Mona Khorshid, Eglal R. Souaya, Ahmed H. Hamzawy, Moustapha N. Mohammed

    Published 2015-01-01
    “…A gas chromatography equipped with mass spectrometer (GCMS) method was developed and validated for determination of 16 polycyclic aromatic hydrocarbons (PAHs) in fish using modified quick, easy, cheap, effective, rugged, and safe (QuEChERS) method for extraction and solid phase extraction for sample cleanup to remove most of the coextract combined with GCMS for determination of low concentration of selected group of PAHs in homogenized fish samples. …”
    Get full text
    Article
  19. 1259

    Decision Support System by using Multiple Attribute Decision making with Simple Additive Weighting Method (Madm-Saw) Method in Selecting the Best Bromelain by Ririn Fatma Nanda, Anwar Kasim, Rini Rini, Daimon Syukri, Muhammad Arwani

    Published 2023-09-01
    “…Therefore, research has been carried out in making the best bromelain decision using the Multiple Attribute Decision Making with Simple Additive Weighting Method (MADM-SAW) method based on the shelf life of pineapples. …”
    Get full text
    Article
  20. 1260

    Decision Support System by using Multiple Attribute Decision making with Simple Additive Weighting Method (Madm-Saw) Method in Selecting the Best Bromelain by Ririn Fatma Nanda, Anwar Kasim, Rini Rini, Daimon Syukri, Muhammad Arwani

    Published 2023-09-01
    “…Therefore, research has been carried out in making the best bromelain decision using the Multiple Attribute Decision Making with Simple Additive Weighting Method (MADM-SAW) method based on the shelf life of pineapples. …”
    Get full text
    Article