Showing 1,301 - 1,320 results of 120,517 for search '"Methodism"', query time: 0.15s Refine Results
  1. 1301

    Approximation for Transient of Nonlinear Circuits Using RHPM and BPES Methods by H. Vazquez-Leal, K. Boubaker, L. Hernandez-Martinez, J. Huerta-Chua

    Published 2013-01-01
    “…Therefore, in this paper, rational homotopy perturbation method and Boubaker Polynomials Expansion Scheme are applied to a differential equation from a nonlinear circuit. …”
    Get full text
    Article
  2. 1302

    Approximate Method for Solving the Linear Fuzzy Delay Differential Equations by S. Narayanamoorthy, T. L. Yookesh

    Published 2015-01-01
    “…We propose an algorithm of the approximate method to solve linear fuzzy delay differential equations using Adomian decomposition method. …”
    Get full text
    Article
  3. 1303

    Routing control method of hot standby BRAS in IP MAN by Huanyi WANG, Guofu XIANG

    Published 2016-01-01
    “…With the implementation of“Broadband China”strategy,IP services become more and more diversified,the demand for all kinds of security is also increasing.The key technology of BRAS hot backup and its realization method were introduced,realizing the seamless handover between primary and standby BRAS and effectively controlled the route range in BRAS.The routing was optimized to reduce traffic between interconnect circuits of primary and backup BRAS to improve the utilization efficiency of the circuit.…”
    Get full text
    Article
  4. 1304

    Novel topic detection method for microblog based on SVM filtration by Jun-xia CHENG, Zhi-tang LI, Ming-guang ZOU, Jin XIAO

    Published 2013-09-01
    “…A detection method based on SVM filtration was proposed.The method uses text feature as imported vectors to filtrate microblog news,reducing the amount of calculation greatly.A single-pass clustering algorithm based on the improvement of high-frequency words sorting was proposed,which can detect isolated points commendably.Experimental results show that the method can detect news topics from massive microblog data efficiently.…”
    Get full text
    Article
  5. 1305

    Fast and Sensitive Method for Determination of Domoic Acid in Mussel Tissue by Elena Barbaro, Roberta Zangrando, Carlo Barbante, Andrea Gambaro

    Published 2016-01-01
    “…In this work, we propose a very simple and fast analytical method to determine DA in mussel tissue. The method consists of two consecutive extractions and requires no purification steps, due to a reduction of the extraction of the interfering species and the application of very sensitive and selective HILIC-MS/MS method. …”
    Get full text
    Article
  6. 1306

    Covert Channel Construction Method Based on HTTP Composite Protocols by Longxing Jin, Zijun Liu, Fuquan Huang, Zizhao Lin, Ming Li

    Published 2022-01-01
    “…Experimental results show that this method can resist the detection method based on application signature, protocol fingerprint detection method, and combination model detection method, and has strong concealment. …”
    Get full text
    Article
  7. 1307

    Recent trends in user studies: action research and qualitative methods by T.D. Wilson

    Published 1998-01-01
    “…</i> It attempted to set out what was, for the time, a novel perspective on appropriate methodologies for the study of human information seeking behaviour, focusing on qualitative methods and action research, arguing that the application of information research depended up its adoption into the managerial processes of organizations, rather than its self-evident relationship to any body of theory.…”
    Get full text
    Article
  8. 1308

    A Reliable Method for Identification of Antibiotics by Terahertz Spectroscopy and SVM by Jin Guo, Hu Deng, Quancheng Liu, Linyu Chen, Zhonggang Xiong, Liping Shang

    Published 2020-01-01
    “…However, conventional antibiotic identification methods have a low sensitivity and a long detection time. …”
    Get full text
    Article
  9. 1309

    Using artificial intelligence methods for the optimal synthesis of reversible networks by Taras Kyryliuk, Mykhailo Palahuta, Vitaly Deibuk

    Published 2024-11-01
    “…This enables the use of synthesis methods to create quantum reversible logical computing devices, which in turn promotes the development of quantum technologies. …”
    Get full text
    Article
  10. 1310

    Polynomial estimation method for PN sequence based on reliability accumulation by Song CHEN, Kai-zhi HUANG, Hua ZHAO

    Published 2012-09-01
    “…The issues of insufficient efficiency and poor error-tolerance of current high-order polynomial estimation me-thods under error conditions were studied.By combining the iterative berlekamp-massey(BM)algorithm in GF(2)and the improved Chase algorithm,a novel algorithm based on reliability accumulation was proposed.The sequence soft infor-mation was mapped to sequence reliability as the input information of BM algorithm,and the corresponding output relia-bility of estimated polynomial was accumulated as the rule of correct polynomial.In order to improve the estimation pre-cision,the candidate reliability-accumulated polynomial set were reduced by the characteristics of primitive polynomial in GF(2).The simulation results show that the proposed method is irrelevant with the tapped number of ator poly-nomial,and has a good estimation performance to estimate 17-order polynomials when the sequence BER is 18%.…”
    Get full text
    Article
  11. 1311
  12. 1312

    The Circle Pure Rolling Method for Point Cloud Boundary Extraction by Quanou Yang, Zhihui Li, Zhihui Liu, Xinyu Jiang, Xinglong Gao

    Published 2024-12-01
    “…We introduce a circle rolling method (CRM) for boundary extraction from 2D point clouds. …”
    Get full text
    Article
  13. 1313

    Review on the Method of Compensation Benefit Allocation for Cascade Hydropower Stations by LI Yinghai, WANG Li, LI Qingqing, XIA Qingqing

    Published 2020-01-01
    “…Under the model of cascade rolling development,there are significant compensation benefits in the joint operation of cascade hydropower stations.Scientific and reasonable allocation of compensation benefits becomes the key point to realize joint optimal operation of cascade hydropower stations.This paper first expounds the present situation and existing risk in cascade hydropower station operation management,specifies the compensation benefit types and principles for compensation benefit allocation,summarizes and analyzes the main methods and application examples of compensation benefit allocation of cascade hydropower stations,discusses the applicable conditions and advantages and disadvantages of various methods,analyzes the shortcomings in application examples through existing research,finally proposes the future research direction for allocation of compensation benefits of cascade hydropower stations,so as to provide the reference for sustainable development and utilization of river basin water resources.…”
    Get full text
    Article
  14. 1314
  15. 1315
  16. 1316

    Efficient segment pattern based method for malicious URL detection by Hai-lun LIN, Yan LI, Wei-ping WANG, Yin-liang YUE, Zheng LIN

    Published 2015-11-01
    “…An efficient segment based method for detecting malicious URL was proposed.Firstly it analyzed the annotated malicious URLs in terms of three semantic segments,i.e.…”
    Get full text
    Article
  17. 1317

    Two-Stage Optimization Method for the Bearing Layout of Isolated Structure by Yu Dang, GenXiong Zhao, HongTu Tian, Guobao Li

    Published 2021-01-01
    “…An integer programming method is adopted to optimize the number of each type of isolator. …”
    Get full text
    Article
  18. 1318
  19. 1319

    Spectrophotometric Method for the Determination of Carboxin in its Formulations and Environmental Samples by C. Swarna, K. Purushotham Naidu, G. Nagendrudu, N. V. S. Naidu, K. Saraswathi

    Published 2011-01-01
    “…Simple, precise, rapid, sensitive and accurate spectrophotometric methods have been developed for the estimation of carboxin in pure form and in its formulations. …”
    Get full text
    Article
  20. 1320

    Active deception defense method based on dynamic camouflage network by Shuo WANG, Jianhua WANG, Qingqi PEI, Guangming TANG, Yang WANG, Xiaohu LIU

    Published 2020-02-01
    “…In view of the problem that the existing honeypots often fail to resist the penetration attack due to the lack of confidentiality,an active deception defense method based on dynamic camouflage network (DCN) was presented.The definition of DCN was given firstly,and then the attacker-defender scenario of active deception based on DCN was described.Next,the interaction process of the attacker-defender scenario was modeled by using a signaling game,whose equilibrium can guide the selection of optimal deception strategy.Furthermore,to quantify the payoffs accurately,the two-layer threat penetration graph (TLTPG) was introduced.Finally,the solution for game equilibrium was designed,through which pure strategy and mixed strategy could be calculated simultaneously.The experimental results show that,based on the dynamic camouflage network,the perfect Bayesian equilibrium can provide effective guidance for the defender to implement the optimal defense strategy and maximize the benefits of the defender.In addition,the characteristics and rules of active deception defense DCN-based are summarized.…”
    Get full text
    Article