Showing 1,501 - 1,520 results of 120,517 for search '"Methodism"', query time: 0.15s Refine Results
  1. 1501
  2. 1502

    Mapping method from human to robot arms with different kinematics by Ke-qiang Bai, Guo-li Jiang, Sibo Cai

    Published 2025-01-01
    “…This method reconstructs the human arm model quickly and maps it to the dual-arm robot model. …”
    Get full text
    Article
  3. 1503
  4. 1504

    Survey on video image reconstruction method based on generative model by Yanwen WANG, Weimin LEI, Wei ZHANG, Huan MENG, Xinyi CHEN, Wenhui YE, Qingyang JING

    Published 2022-09-01
    “…Traditional video compression technology based on pixel correlation has limited performance improvement space, semantic compression has become the new direction of video compression coding, and video image reconstruction is the key link of semantic compression coding.First, the video image reconstruction methods for traditional coding optimization were introduced, including how to use deep learning to improve prediction accuracy and enhance reconstruction quality with super-resolution techniques.Second, the video image reconstruction methods based on variational auto-encoders, generative adversarial networks, autoregressive models and transformer models were discussed emphatically.Then, the models were classified according to different semantic representations of images.The advantages, disadvantages, and applicable scenarios of various methods were compared.Finally, the existing problems of video image reconstruction were summarized, and the further research directions were prospected.…”
    Get full text
    Article
  5. 1505
  6. 1506

    Radio channel estimation method based on quadratic differentials probability by Lijiao WANG, Weiwei DU, Fan LI, Zhisen WANG

    Published 2017-01-01
    “…The fifth generation (5G) mobile communication technology has the characteristics of high speed and large bandwidth,which makes the fading of radio signal in time domain and frequency domain more obviously.With the increase of differential values statistical step and the spatial sampling interval,the channel estimation method based on the differential probability can't track the deep fading area and the peak area was over-tacked.In view of the above problems,a channel estimation method based on quadratic differentials probability was proposed.Firstly,the valley point and peak point of the fading curve were found.Then,the estimated differential values of deep fading area and peak area were improved by quadratic differential probability.Finally,the estimated gains were obtained by the difference operation.Simulation results show that,this method can improve the whole tracking performance effectively and reduce the tracking error.…”
    Get full text
    Article
  7. 1507

    Using the Scientific Method to Engage Mathematical Modeling: An Investigation of pi by Lester A. C. Archer, Karen Ng

    Published 2016-01-01
    “… The purpose of this paper is to explain how to use the scientific method as the framework to introduce mathematical model. …”
    Get full text
    Article
  8. 1508

    FAULT DIAGNOSIS METHOD OF ROLLING BEARING BASED ON EEMD-CNN by LI SiQi, JIANG ZhiJian

    Published 2020-01-01
    “…After calculating a series of indexes of reconstructed signals,using CNN and various methods to diagnose faults. The results shows that the method used in this paper can effectively carry out fault diagnosis. …”
    Get full text
    Article
  9. 1509

    STRUCTURE RELIABILITY CALCULATION METHOD BASED ON IMPROVED NEURAL NETWORK by LI YongHua, CHEN Peng, TIAN ZongRui, CHEN ZhiHao

    Published 2021-01-01
    “…Finally, the reliability calculation results were calculated with the Monte Carlo method. The results show that the proposed method improves the fitting accuracy and gives consideration to the calculation efficiency, which verifies the superiority and feasibility of the proposed method.…”
    Get full text
    Article
  10. 1510
  11. 1511
  12. 1512

    A detection method of Android system vulnerabilities based on matching by iayuan ZHANGJ

    Published 2016-05-01
    “…Android system has occupied the majority share of smart mobile operating systems.However,Android system has worrying security issues.It frequently bursts high-risk vulnerabilities in recent years,which is a big security risk to the majority of Android users.Android system vulnerabilities were studied,and a rapid detection method of Android system vulnerabilities based on matching was proposed.A script-based vulnerability scanning tool was also designed.Through the evaluation of experiments,the tool is running well.…”
    Get full text
    Article
  13. 1513

    Acute enteritis with pelvic SBRT: Influence of bowel delineation methods by Akshay Dinesan, Maneesh Singh, Prachi Mehta, Priyamvada Maitre, Vedang Murthy

    Published 2025-05-01
    “…Methods and materials: In this prospective study, patients with high-risk prostate cancer treated with WP-SBRT were identified. …”
    Get full text
    Article
  14. 1514

    Magnetostatic Active Contour Model with Classification Method of Sparse Representation by Guoqi Liu, Yifei Dong, Ming Deng, Yihang Liu

    Published 2020-01-01
    “…In this paper, a magnetostatic active contour model with a classification method of sparse representation is proposed. First, rough edge information is obtained with some edge detectors. …”
    Get full text
    Article
  15. 1515

    SECONDARY FEEDBACK RIDGE ESTIMATION METHOD FOR STRUCTURAL DAMAGE DETECTION by LI Cui, ZHU XueKun, YU JiSheng, WU XiaoShun

    Published 2024-08-01
    “…To overcome the ill⁃posed least square problem in sensitivity equations,a secondary feedback ridge estimation method was proposed to detect structural damages based on modal flexibility changes.Modal eigenvalues and mode shapes were utilized to assemble the modal flexibility matrix,which was used to establish linear equations for detecting elemental damage severities by modal flexibility changes.During the damage localization stage,damage sites were primarily assessed using the non⁃negative least square method and the feedback ridge technique.Since the damage localization results obtained by the two methods were typically disturbed by different undamaged elements,suspicious damaged elements were comprehensively determined by taking the intersection of the two sets of damage localization results.At the damage quantification stage,the diagonal entries of the regularization matrix corresponding to suspicious elements were decreased and the diagonal entries associated with other elements were augmented.Then the second feedback ridge estimation was conducted to accomplish damage quantification.The numerical analysis of a simply supported beam indicates that the proposed method is more robust in resisting noise,compared with the non⁃negative least square method and feedback ridge estimation technique.Regardless of whether it is damage localization or damage quantification,the proposed method demonstrates higher reliability in detecting accuracy.…”
    Get full text
    Article
  16. 1516

    Out-of-context misinformation detection method based on stance analysis by YUAN Xin, GUO Jie, QIU Weidong, HUANG Zheng

    Published 2024-04-01
    “…Experimental results indicate that the incorporation of stance analysis significantly enhances the method's detection capabilities. Specifically, the accuracy of this method outperforms the state-of-the-art algorithm that employs Internet evidence for detection by 2.3%.…”
    Get full text
    Article
  17. 1517
  18. 1518

    Research on 5G MEC security assessment system and method by Qiucheng LU, Jinhui TANG, Congying BAO, Hao WU, Yusun FU

    Published 2023-08-01
    “…Multi-access edge computing (MEC) is deployed at the edge of the network, enabling efficient and fast data processing in mobile networks, while also undertaking important security functions, making MEC a prime target for attackers.Therefore, MEC nodes will face huge security risks.How to accurately evaluate and quantify MEC security capabilities is an urgent issue to be solved.For accurately evaluating and quantifying MEC security capabilities, the MEC safety assessment system was proposed in combination with MEC safety risks.The assessment indicators selected in the assessment system comprehensively reflect the basic characteristics of MEC and its complete safety capability.Based on this evaluation system, the MEC security evaluation method was designed by using the analytic hierarchy process (AHP) and fuzzy evaluation, the MEC vulnerability scoring system was creatively proposed, and the evaluation indicators were provided based on the results of MEC vulnerability scoring system, the MEC security capability quantification value was finally calculated.The experimental result proves the effectiveness of the method.…”
    Get full text
    Article
  19. 1519

    Method to improve the performance of network time delay of EPA system by Ning LIU, Chong-quan ZHONG, Yao-yao LIN

    Published 2014-08-01
    “…In order to improve the performance of network-induced time delay of EPA (Ethernet for plant automation) networked control systems, the interacting mechanism between the control and the communication in EPA system was studied and EPA-CS (EPA cooperative scheduling) method was presented. Through setting their mutually cooperative time slices for function blocks that executed the control tasks and data transmission that executed the communication tasks, and through determining the executing time and frequencies of control tasks in their time slices, the method could accomplish the cooperation between control tasks and communication tasks in EPA system. …”
    Get full text
    Article
  20. 1520

    Improvement of N-Acetylcysteine Loaded in PLGA Nanoparticles by Nanoprecipitation Method by Ruth Lancheros, Carlos A. Guerrero, Rubén D. Godoy-Silva

    Published 2018-01-01
    “…The results suggest that besides efficiently entrapping hydrophobic compounds, the nanoprecipitation method also has a high potential as an alternative entrapment method for hydrophilic compounds as well. …”
    Get full text
    Article