Showing 1,401 - 1,420 results of 120,517 for search '"Methodism"', query time: 0.19s Refine Results
  1. 1401
  2. 1402

    Rolling Bearing Fault Diagnosis Method Based on MCMF and SAIMFE by Dejun Meng, Changyun. Miao, Xianguo Li, Jia Shi, Yi Liu, Jie Li

    Published 2022-01-01
    “…Third, some experiments are completed to demonstrate the effectiveness and superiority of the proposed method. The experimental results show that the proposed method not only has high diagnosis accuracy but also less dependent on the diagnosis model.…”
    Get full text
    Article
  3. 1403

    Method to generate cyber deception traffic based on adversarial sample by Yongjin HU, Yuanbo GUO, Jun MA, Han ZHANG, Xiuqing MAO

    Published 2020-09-01
    “…In order to prevent attacker traffic classification attacks,a method for generating deception traffic based on adversarial samples from the perspective of the defender was proposed.By adding perturbation to the normal network traffic,an adversarial sample of deception traffic was formed,so that an attacker could make a misclassification when implementing a traffic analysis attack based on a deep learning model,achieving deception effect by causing the attacker to consume time and energy.Several different methods for crafting perturbation were used to generate adversarial samples of deception traffic,and the LeNet-5 deep convolutional neural network was selected as a traffic classification model for attackers to deceive.The effectiveness of the proposed method is verified by experiments,which provides a new method for network traffic obfuscation and deception.…”
    Get full text
    Article
  4. 1404

    Liquid Chromatographic Method for Determination of Nisoldipine from Pharmaceutical Samples by Amit Gupta, Ram S. Gaud, S. Ganga

    Published 2010-01-01
    “…The method was carried out at 320 nm after extraction of drug in methanol. …”
    Get full text
    Article
  5. 1405

    SDN based e-mail repudiation source restraining method by Zhi-geng HAN, Xia FENG, Geng CHEN

    Published 2016-09-01
    “…With the limitation of controllability of the existing Internet architecture,the existing secure e-mail technology such as certified e-mail can only post detection but cannot source restraining on e-mail repudiation.Based on the idea of control and data separation of software-defined networking technology,by means of bypass attaching customized repudiation restrain unit to the traditional e-mail model.An e-mail repudiation source restraining method was proposed without destroying the existing e-mail structure.After presenting e-mail evidence binding protocol,repudiation behavior detection algorithm,certified reputation evaluation model,and repudiation restraining strategy formation algorithm embedded in repudiation restrain unit,the effectiveness were tested of the proposed method in 4 cross scenarios.The experimental results show that,under the premise of compatibility with the current e-mail system,the method can source restrain e-mail repudiation effectively.…”
    Get full text
    Article
  6. 1406

    Recent methods for the diagnosis and differentiation of ameloblastoma: a narrative review by Ke Hu, Xudong Zhang, Ruixue Chen, Xiangjun Li

    Published 2024-12-01
    “…This review summarises the diagnostic techniques used for the detection of ameloblastoma and the methods for differentiating it from other benign odontogenic tumours to aid in the clinical diagnosis. …”
    Get full text
    Article
  7. 1407

    A Vortex Identification Method Based on Extreme Learning Machine by Jun Wang, Lei Guo, Yueqing Wang, Liang Deng, Fang Wang, Tong Li

    Published 2020-01-01
    “…A large number of experiments prove the effectiveness of our method, which can improve or supplement the shortcomings of existing methods.…”
    Get full text
    Article
  8. 1408

    Uncertainty-Aware Semi-Supervised Method for Pectoral Muscle Segmentation by Yutao Tang, Yongze Guo, Huayu Wang, Ting Song, Yao Lu

    Published 2025-01-01
    “…The consistency regularization method is a widely used semi-supervised method that uses regularization terms constructed from unlabeled data to improve model performance. …”
    Get full text
    Article
  9. 1409

    Method to generate attack graphs for assessing the overall security of networks by MAN Da-peng1, ZHOU Yuan2, YANG Wu1, YANG Yong-tian1

    Published 2009-01-01
    “…In order to evaluate the overall security of networks, a new method for generating attack graphs was proposed.The method used breadth-first algorithm to search the dependence of network vulnerabilities.To solve the state explosion problem, the strategies that limited the number of attack steps and the reachability of state nodes were adopted in gener-ating attack graphs.The experimental results show that the generated attack graphs can help security administrators to evaluate the overall security of networks, and the adopted optimization strategies are effective to remove redundant edges and nodes in attack graphs and decrease the system overhead during generating attack graphs.…”
    Get full text
    Article
  10. 1410

    Exact Group Sequential Methods for Estimating a Binomial Proportion by Zhengjia Chen, Xinjia Chen

    Published 2013-01-01
    “…We first review existing sequential methods for estimating a binomial proportion. Afterward, we propose a new family of group sequential sampling schemes for estimating a binomial proportion with prescribed margin of error and confidence level. …”
    Get full text
    Article
  11. 1411
  12. 1412

    Adaptive user behavior's evaluation method based on network status by You LU, Jun-zhou LUO, Wei LI, Feng YU, Nu XIA

    Published 2013-07-01
    “…This method can construct and dynamically adjust the evaluation indexes and their weight adaptive the actual data. …”
    Get full text
    Article
  13. 1413

    A NEW FAILURE PROBABILITY COMPUTING METHOD FOR MECHANICAL COMPONENTS by ZHANG YanFang, ZHANG YanLin

    Published 2020-01-01
    “…Based on univariate dimension reduction method( UDRM),edgeworth series and the relation of statistical moment,a method for calculation of failure probability of mechanical components is proposed. …”
    Get full text
    Article
  14. 1414
  15. 1415

    ANALYZING THE CRITERIA AFFECTING TRANSITION TO AIRPLANE BY COMPARING DIFFERENT METHODS by Dilaver Tengilimoğlu, İzay Reyhanoğlu

    Published 2022-07-01
    “…This study is important since it compares three different methods for the purpose of criteria determination concerning the choice of transportation modes.…”
    Get full text
    Article
  16. 1416

    Research on networking troubleshooting method based on software defined network by Jia-wei LI, Zhi-ju YANG, Xi-jun LIN, UHai-peng Q

    Published 2016-12-01
    “…Based on the reaserch status of networking troubleshooting in software defined network,a new net-working troubleshooting method was proposed.A TCP packet marked in head field was sent and detailed forward information in every hop would be written in its data filed once the test packet was matched.Taking advantages of the programmable feature of the controller and OpenFlow extensible match,special flow table was designed for matching test-used packet.The analysis module extracted and split the forward information,and thus printed the suspicious network problem which can be used to track and located the problematic network node.The experiment results indicate that the proposed method is fairy efficient.…”
    Get full text
    Article
  17. 1417

    Method for Monitoring the Stator Core of a Powerful Turbo Generator by A. S. Levitskyi, Ie. O Zaitsev, M. V. Panchik

    Published 2021-07-01
    “…The article is devoted to the development of an automatic method and device for monitoring the pressing of the stator core of a powerful turbo generator during its assembling at the manufacturer. …”
    Get full text
    Article
  18. 1418

    Padé-Sumudu-Adomian Decomposition Method for Nonlinear Schrödinger Equation by Metomou Richard, Weidong Zhao

    Published 2021-01-01
    “…The main purpose of this paper is to solve the nonlinear Schrödinger equation using some suitable analytical and numerical methods such as Sumudu transform, Adomian Decomposition Method (ADM), and Padé approximation technique. …”
    Get full text
    Article
  19. 1419
  20. 1420

    The Referenced Vertex Ordering Problem: Theory, Applications, and Solution Methods by Omer, Jérémy, Mucherino, Antonio

    Published 2021-08-01
    “…Our branch-and-bound outperforms other existing solution methods: among 180 instances with 60 vertices, it solves 179 instances to optimality whereas the best existing method is only able to solve 109 of them. …”
    Get full text
    Article