Showing 1,541 - 1,560 results of 120,517 for search '"Methodism"', query time: 0.20s Refine Results
  1. 1541

    RESEARCH AND DEVELOPMENT OF INSPECTION AND MAINTENANCE METHODS FOR WIND TURBINE GEARBOX by FAN ZhiFeng, SU XuJun, ZHANG Rong, LI FangHuan

    Published 2021-01-01
    “…Wind Turbine Gearbox is an important part of the wind turbine,in the long-term operation will inevitably occur various types of faults,its inspection and maintenance methods will become the focus of scholars. By analyzing the research status of condition monitoring methods and means,fault feature extraction methods and maintenance strategies for wind turbine gearbox,the main problems in the research of inspection and maintenance methods are summarized. …”
    Get full text
    Article
  2. 1542

    Similar text positioning method based on slope-density cluster by Du ZOU, Wen-jun TANG, Wei-jiang LONG, Ling ZHANG

    Published 2013-09-01
    “…Similar text positioning is an important part of plagiarism detection.The existing positioning method directly merges text or fingerprint to obtain similar text.Due to the disturb information in the similar text,the positioning accuracy is poor.The semantic features of the match fingerprints were analyzed,and a cluster method based on slope density for similar text positioning was proposed,which converts the text merge problem into dense sample points clustering problem,and improves the efficiency and accuracy of the positioning.Through the experiment on the PAN public corpus,the result shows it performs better than the PAN10 top three.This method has been used in the South China University of Technology 's feature professional teaching platform to detect the plagiarism of homework.…”
    Get full text
    Article
  3. 1543

    Clients selection method based on knapsack model in federated learning by Jiahui GUO, Zhuoyue CHEN, Wei GAO, Xijun WANG, Xinghua SUN, Lin GAO

    Published 2022-12-01
    “…In recent years, to break down data barriers, federated learning (FL) has received extensive attention.In FL, clientscan complete the model training without uploading the raw data, which protects the user’s data privacy.For the issue of clients’ heterogeneity, the contribution of each client to accelerating convergence of the global model as well as the communication cost in the system was considered, aiming at maximizing the weight change of the client's local training model, a client selection optimization problem in FL under theconstraint ofthe delay foreach training round was solved.Subsequently, two federated learning protocols based on the knapsack model were proposed, namely OfflineKP-FL protocol and OnlineKP-FL protocol.OfflineKP-FL protocol was based on the offline knapsack model to select appropriate clients to participate in the aggregation and update of the global model.In order to reduce the complexity of the OfflineKP-FL protocol, OnlineKP-FL protocol based on the online knapsack model to select clients was proposed.Through simulations, it is found that OfflineKP-FL protocol converges faster than the previously proposed methods in certain cases.Furthermore, compared with OfflineKP-FL protocol and FedCS protocol, underthe proposed OnlineKP-FL protocol, not only does the system select fewer clients per round, but also it can complete the model training in 64.1% of the time required by FedCS protocol to achieve the same accuracy for the global model.…”
    Get full text
    Article
  4. 1544
  5. 1545
  6. 1546

    Diagnosis of mycoplasmosis in chicks by pathological and real time-pcr methods by Mehmet Tuzcu, Murat Özmen, S. Reyhan Karakoç, Nevin Tuzcu, Atila Yoldaş

    “…<p> <b>Materials and Methods:</b> Conjunctiva and tracheal swab samples were taken from broiler chicks with respiratory disease complaints from 3 different breeders were used. …”
    Get full text
    Article
  7. 1547

    Valuing the Recreation Uses of Natural Resources: The Travel Cost Method by Elizabeth F. Pienaar

    Published 2014-03-01
    “…WEC341/UW386: Valuing the Recreation Uses of Natural Resources: The Travel Cost Method (ufl.edu) …”
    Get full text
    Article
  8. 1548

    Explicit Dynamic DDA Method considering Dynamic Contact Force by Jian Zhao, Ming Xiao, Juntao Chen, Dongdong Li

    Published 2016-01-01
    “…This paper proposes an explicit dynamic DDA method considering dynamic contact force, which aims at solving the problems of low efficiency of dynamic contact detection and the simulation of dynamic contact force in the conventional DDA method. …”
    Get full text
    Article
  9. 1549
  10. 1550
  11. 1551

    A congestion control method based on loading-feedback in MTC by Hongguang DUAN, Songpin LU, Lifei WANG, Dan TAN, Jiangqi GAO

    Published 2016-11-01
    “…Through analyzing the access efficiency of machine type communication(MTC)devices in LTE-Advanced system,a loading-feedback control method was proposed.The current access load was estimated and the load of next access slot were calculated using the preamble state information,and the access control parameters for MTC device were adjusted based on the load change dynamically.The good performance of the proposed solution was evaluated by computer simulations.The simulation result shows that the proposed scheme can reduce the impact of nearly simultaneous access of a large number of MTC devices on human-to-human(H2H)devices,decrease the number of retransmissions and improve the access success rate effectively.…”
    Get full text
    Article
  12. 1552

    A Hybrid Algorithm of GA + Simplex Method in the WSN Localization by Feng Wang, Cong Wang, ZiZhong Wang, Xue-ying Zhang

    Published 2015-07-01
    “…In order to solve the large-error problem in the third phase and the poor position accuracy of the least square method in the weighted DV-Hop algorithm, a hybrid algorithm of GA + simplex method was proposed in this paper. …”
    Get full text
    Article
  13. 1553

    A Bursting Liability Evaluation Method Based on Energy Transfer by Yukun Hou, Shankun Zhao, Yang Zhao

    Published 2024-01-01
    “…This paper thus presents a method to evaluate the bursting liability as the product of the energy release ratio and energy transfer ratio and provides a definition for the energy transfer index. …”
    Get full text
    Article
  14. 1554

    PCI planning method based on genetic algorithm in LTE network by Panxing LI, Jing WANG

    Published 2016-03-01
    “…In order to avoid local optimum and the consumption on time and strength in traditional manual planning,an method of PCI planning based on genetic algorithm(GA-PCIAS)was proposed,the method took full consideration of the PCI planning principle,and the interference matrix was introduced to fitness function to reduce the interference in planned area.The simulation results in an dense area show that GA-PCIAS can improve RS-SINR (reference signal-signal to interference plus noise ratio)comparing with the classical sequential PCI allocation on small-scale base station.…”
    Get full text
    Article
  15. 1555

    A Perspective on Explainable Artificial Intelligence Methods: SHAP and LIME by Ahmed M. Salih, Zahra Raisi‐Estabragh, Ilaria Boscolo Galazzo, Petia Radeva, Steffen E. Petersen, Karim Lekadir, Gloria Menegaz

    Published 2025-01-01
    “…eXplainable artificial intelligence (XAI) methods have emerged to convert the black box of machine learning (ML) models into a more digestible form. …”
    Get full text
    Article
  16. 1556

    Survey of channel estimation method in delay-Doppler domain for OTFS by Wang XING, Xiaogang TANG, Yiqing ZHOU, Chong ZHANG, Zhengang PAN

    Published 2022-12-01
    “…In order to provide reliable communication service for high-mobility scenarios, 6G can consider DD (delay-Doppler) domain based OTFS (orthogonal time frequency space) as its modulation scheme.By mapping the transmitted symbols onto DD domain and transforming them into TF (time-frequency) domain, OTFS endows all the transmitted symbols with the potential of capturing time-frequency full diversity, effectively improving the performance of communication in time-varying fading channels.Due to the superior properties of DD effective channel, the existing OTFS channel estimation methods were mostly carried out in DD domain.Considering the difference of implementation and application scenarios, existing DD channel estimation methods for OTFS were divided into three categories and overviewed, after which the challenges and potential solutions for current DD channel estimation methods were summarized and analyzed.…”
    Get full text
    Article
  17. 1557

    Location privacy-preserving method in LBS based on Voronoi division by AChun-guang M, HOUChang-li Z, ANGSong-tao Y, HAOYun-long Z

    Published 2015-05-01
    “…In view of low efficiency when the anonymous server faces a large number of users,a cooperative anonymous method is proposed for static and dynamic users respectively.Based on the Voronoi division of the global area,a central server organizes the users in its region to achieve cooperative anonymity,the server needn't construct anonymous region alone for each user,and the burden of the server is reduced.In view of providing actual location when users query from a LBS server,a decrease nearest neighbor query algorithm is proposed.A user's actual location is replaced with a stationary anchor location and gets the points of interest candidate set from the LBS server gradually.By running the algorithm,pre-cise results can be got and avoiding exposure to a user's location privacy.The algorithm can also help to reduce the possi-bility of location inference when the anchor chooses closely to the user.Experiments show that our method can guarantee the user's location privacy,and provide a good working efficiency.…”
    Get full text
    Article
  18. 1558
  19. 1559
  20. 1560