Showing 1,461 - 1,480 results of 120,517 for search '"Methodism"', query time: 0.18s Refine Results
  1. 1461

    An Energy-Domain IR NUC Method Based on Unsupervised Learning by Ting Li, Xuefeng Lai, Sheng Liao, Yucheng Xia

    Published 2025-01-01
    “…To obtain accurate blackbody temperature, emissivity, and waveband measurements, an energy-domain infrared nonuniformity method based on unsupervised learning is proposed. …”
    Get full text
    Article
  2. 1462

    Moral competence of dental students: an explanatory mixed-methods study by Raheleh Mosavi, Fatemeh Foroughipour, Maryam Kazemipoor, Fatemeh Keshmiri

    Published 2025-01-01
    “…Abstract Aim The present study aimed to investigate the level of four components of moral skills, including moral sensitivity, moral reasoning, moral motivation, and moral courage, among dental students and explore the factors affecting their engagement in moral behavior. Method This is an explanatory mixed-method study conducted in two quantitative and qualitative phases. …”
    Get full text
    Article
  3. 1463

    Study on Disease Mechanism and Theoretical Quantification Method of Tunnel Structure by Yu Liu, Chun-an Tang, Peng-yu Wang, Yong-ping Guan, Shu-hong Wang

    Published 2019-01-01
    “…Compared with the diversity of tunnel disease detection methods, there are few studies on the methods of quantifying and evaluating the main structural diseases of the lining. …”
    Get full text
    Article
  4. 1464

    Extraction of Cattle Retinal Vascular Patterns with Different Segmentation Methods by Ahmet Saygılı, Nihat Eren Özmen, Özgür Aksoy, Alican Yılmaz, Uğur Aydın, Celal Şahin Ermutlu, Muhammed Akyüzlü, Pınar Cihan

    Published 2024-12-01
    “…Therefore, in some countries, biometric identification methods are being developed and used as alternatives to overcome the disadvantages of traditional methods. …”
    Get full text
    Article
  5. 1465

    Hard-coded backdoor detection method based on semantic conflict by Anxiang HU, Da XIAO, Shichen GUO, Shengli LIU

    Published 2023-02-01
    “…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
    Get full text
    Article
  6. 1466

    Mechanical and Biochemical Methods for Rigor Measurement: Relationship with Eating Quality by Carlos Álvarez, Lara Morán, Derek F. Keenan, Anne-Maria Mullen, Gonzalo Delgado-Pando

    Published 2019-01-01
    “…Accurate measurements of both the biochemical and mechanical characteristics that underpin muscle and its transformation into meat are key factors to an improved understanding of meat quality, but also this early-stage measurements may be useful to develop methods to predict final meat texture. It is the goal of this review to present the available research literature on the historical and contemporary analyses that could be applied in early postmortem stages (pre-rigor and rigor) to determine the biochemical and physical characteristics of the meat that can potentially impact the eating quality.…”
    Get full text
    Article
  7. 1467

    THE TA'LIQAT METHOD OF SHEIKH SULAIMAN ARRASULI ON THE TAFSIR JALALAIN by Muhammad Roihan Nasution, Muhammad Hidayat, Muhammad Rasyid

    Published 2023-12-01
    “…This research applies a philology-based qualitative method in which manuscripts are the main source with related tafsir books as the research subject. …”
    Get full text
    Article
  8. 1468

    Scenario-Planning Method for Cost Estimation Using Morphological Analysis by Sae-Hyun Ji, Joseph Ahn

    Published 2019-01-01
    “…This study proposes a scenario-planning method that uses morphological analysis for the estimation of construction cost. …”
    Get full text
    Article
  9. 1469

    A FOUR-POINT EQUIVALENT METHOD OF THE BOLTED JOINTS STIFFNESS by LI YuanSheng, ZHANG GuangPeng, XIE FangFang, WANG LiYu

    Published 2017-01-01
    “…The experimental results show that this method is feasible.…”
    Get full text
    Article
  10. 1470

    Efficient diagnosis of diabetes mellitus using an improved ensemble method by Blessing Oluwatobi Olorunfemi, Adewale Opeoluwa Ogunde, Ahmad Almogren, Abidemi Emmanuel Adeniyi, Sunday Adeola Ajagbe, Salil Bharany, Ayman Altameem, Ateeq Ur Rehman, Asif Mehmood, Habib Hamam

    Published 2025-01-01
    “…The second phase employed the same algorithms alongside sequential ensemble methods—XG Boost, AdaBoostM1, and Gradient Boosting—using an average voting algorithm for binary classification. …”
    Get full text
    Article
  11. 1471

    STUDY ON LOAD EQUIVALENT METHOD AND LOAD SPECTRUM OF THE BOOM OF LOADER by LIANG Jia, SONG XuDing, GAO XiaoWei, LV PengMin, ZHANG Lei

    Published 2018-01-01
    “…Based on the measured load of the 5 t loader working device,the method of solving the load with the attitude change to the local coordinate system of the boom has been studied and the MATLAB software to write the corresponding data processing program has been sued to obtain the loader arm under the fixed attitude of the load time course. …”
    Get full text
    Article
  12. 1472
  13. 1473

    An Easy-to-Understand Method to Construct Desired Distance-Like Measures by Wen Qing Fu, Sheng Gang Li, Harish Garg, Heng Liu, Ahmed Mostafa Khalil, Jingjing Zhao

    Published 2021-01-01
    “…This paper recommends in a plausible reasoning manner an easy-to-understand method to construct desired distance-like measures: to fuse easy-to-obtain (or easy to be coined by practitioners) pseudo-semi-metrics, pseudo-metrics, or metrics by making full use of well-known t-norms, t-conorms, aggregation operators, and similar operators (easy to be coined by practitioners). …”
    Get full text
    Article
  14. 1474

    Evolution-Operator-Based Single-Step Method for Image Processing

    Published 2006-01-01
    “…<p>This work proposes an evolution-operator-based single-time-step method for image and signal processing. The key component of the proposed method is a local spectral evolution kernel (LSEK) that analytically integrates a class of evolution partial differential equations (PDEs). …”
    Get full text
    Article
  15. 1475

    Pattern-Based Test Suite Reduction Method for Smart Contracts by Tomasz Górski

    Published 2025-01-01
    “…The article presents the test suite reduction method for smart contracts, which exploits the knowledge of their design manner. …”
    Get full text
    Article
  16. 1476

    A New Website Fingerprinting Method for Tor Hidden Service by Zihang Hui, Jiangtao Zhai, Shengxian Wang, Weijie Ji

    Published 2025-01-01
    “…The experimental results show that compared with existing state-of-the-art techniques, the proposed method exhibits better performance in terms of key performance metrics.…”
    Get full text
    Article
  17. 1477

    Programmable data processing method and system design for polymorphic network by Jinlin WANG, Li’nan JING, Xiao CHEN, Jiali YOU

    Published 2022-04-01
    “…Aiming at the problems of compatible with multiple route identification, network protocols and network application data processing faced by multimodal networks, a programmable data processing method compatible with multiple modes was proposed.Through the mode recognition and classify module to identify packets of different network modes, the data type, offset and length were used to represent multiple types of data, and the modal data processing pipeline was formed by using the matching action data table with selectable matching algorithm and processing action to process data of different types of network.A prototype system for data processing of polymorphic network was implemented and verified by using the proposed method.Experimental results show that the modal data processing pipeline can isolate the network of different modes and ensure the performance independence, the type of matching algorithm and the length of the processed data will affect the forwarding performance of the system, while the type of data will not.…”
    Get full text
    Article
  18. 1478

    New Spectrophotometric and Fluorimetric Methods for Determination of Fluoxetine in Pharmaceutical Formulations by Ibrahim A. Darwish, Sawsan M. Amer, Heba H. Abdine, Lama I. Al-Rayes

    Published 2009-01-01
    “…New simple and sensitive spectrophotometric and fluorimetric methods have been developed and validated for the determination of fluoxetine hydrochloride (FLX) in its pharmaceutical formulations. …”
    Get full text
    Article
  19. 1479
  20. 1480

    Hamming Distance Method with Subjective and Objective Weights for Personnel Selection by R. Md Saad, M. Z. Ahmad, M. S. Abu, M. S. Jusoh

    Published 2014-01-01
    “…Multicriteria decision making (MCDM) is one of the methods that popularly has been used in solving personnel selection problem. …”
    Get full text
    Article