Showing 1,561 - 1,580 results of 120,517 for search '"Methodism"', query time: 0.16s Refine Results
  1. 1561

    Fine-grained privacy operation control method for layout documents by Peijie YIN, Fenghua LI, Ben NIU, Haiyang LUO, Bin KUANG, Lingcui ZHANG

    Published 2023-05-01
    “…In view of the problem of privacy information disclosure caused by uncontrolled forwarding in the context of frequent exchange of privacy information, a fine-grained privacy operation control method for layout documents was proposed, which could achieve differentiated fine-grained privacy operation control according to the requirements of the sharer during the sharing process of privacy information.For the received multimodal layout document, the existing privacy operation control strategy was extracted, which combined the current sharer’s use attribute and the receiver’s privacy protection ability and other factors.The privacy operation control strategy was generated iteratively, and an abstract control strategy generation algorithm framework was given.Based on the iterative privacy operation control strategy and combined with specific operation scenarios, the differentiated data-masking control, exchange boundary control and local use control were carried out for different modes of information components, and the abstract privacy operation control algorithm framework was given.A prototype system for privacy operation control of OFD (open fixed-layout document) was developed to verify the above algorithms.The generation and delivery of iterative privacy operation control strategy based on friendship, as well as the differential data-masking control, exchange boundary control and local use control of OFD were implemented in the instant messaging system.…”
    Get full text
    Article
  2. 1562

    Method for Identifying Abnormal Hot Spots on the Surface of Composite Insulators by LIU Yao

    Published 2024-12-01
    “…【Objective】To avoid the operational risk of high-voltage transmission lines caused by thermal faults of composite insulators, a method for identifying abnormal hot spots on the surface of composite insulators is studied.…”
    Get full text
    Article
  3. 1563
  4. 1564

    Gear Fault Diagnosis Method Based on Deep Transfer Learning by Liu Shihao, Wang Xiyang, Gong Tingkai

    Published 2023-05-01
    “…Aiming at the problem of insufficient gear fault samples, a fault diagnosis method of transfer learning based on Hilbert-Huang spectrum and pre-trained VGG16 model is proposed. …”
    Get full text
    Article
  5. 1565
  6. 1566
  7. 1567

    Fourier Spectral Method for a Class of Nonlinear Schrödinger Models by Lei Zhang, Weihua Ou Yang, Xuan Liu, Haidong Qu

    Published 2021-01-01
    “…The Fourier spectral method is applied to approximate the spatial direction, and fourth order exponential time-differencing Runge-Kutta method is used to discrete temporal direction. …”
    Get full text
    Article
  8. 1568

    Integrated Study of the Dinitrobenzene Electroreduction Mechanism by Electroanalytical and Computational Methods by Andrey S. Mendkovich, Mikhail A. Syroeshkin, Ludmila V. Mikhalchenko, Mikhail N. Mikhailov, Alexander I. Rusakov, Vadim P. Gul'tyai

    Published 2011-01-01
    “…Electroreduction of 1,2-, 1,3-, and 1,4-dinitrobenzenes in DMF has been investigated by a set of experimental (cyclic voltammetry, chronoamperometry, and controlled potential electrolysis) and theoretical methods (digital simulation and quantum chemical calculations). …”
    Get full text
    Article
  9. 1569

    Methods of Control of the Leishmania infantum Dog Reservoir: State of the Art by Michele Podaliri Vulpiani, Luigi Iannetti, Daniela Paganico, Filomena Iannino, Nicola Ferri

    Published 2011-01-01
    “…The contemporary use of direct and indirect methods is even more effective in reducing seroprevalence in dogs.…”
    Get full text
    Article
  10. 1570

    Structure Preprocessing Method for the System of Unclosed Linear Algebraic Equations by Ling Li, Yongxian Li

    Published 2022-01-01
    “…The complexity of open linear algebraic equations makes it difficult to obtain analytical solutions, and preprocessing techniques can be applied to coefficient matrices, which has become an effective method to accelerate the convergence of iterative methods. …”
    Get full text
    Article
  11. 1571

    FOREIGN FORMS, METHODS AND TOOLS OF REORGANIZATION OF A CREDIT INSTITUTION by Z. Patladze

    Published 2016-02-01
    “…In the article on the example of the United States of America, The United Kingdom of Great Britain and Northern Ireland, France and Germany, are considered foreign forms, methods and tools for the reorganization of a credit institution, draws conclusions about the possibility of using the experience of these countries in the Russian Federation.…”
    Get full text
    Article
  12. 1572
  13. 1573
  14. 1574
  15. 1575

    Solution to an Optimal Control Problem via Canonical Dual Method by Jinghao Zhu, Jiani Zhou

    Published 2009-01-01
    “…The analytic solution to an optimal control problem is investigated using the canonical dual method. By means of the Pontryagin principle and a transformation of the cost functional, the optimal control of a nonconvex problem is obtained. …”
    Get full text
    Article
  16. 1576

    Analysis and avoidance method of 5G atmospheric duct interference by Tinglan WANG, Xingzheng LI, Yimin ZUO, Dongchen ZHANG

    Published 2022-04-01
    “…., the avoidance and adjustment method of atmospheric duct interfered cells was proposed.The impact of the atmospheric duct interference is reduced and the quality of 5G networks is ensures.…”
    Get full text
    Article
  17. 1577

    Data hiding method based on color table expansion technique by FEI Ru-chun1, WANG Li-na1, ZHANG Huan-guo1

    Published 2009-01-01
    “…Based on color table expansion technique for indexed images,a data hiding method was proposed,and the se-curity and the hiding capacity were analyzed.The analysis results show that this method has very strong security and very high hiding capacity.Secret data can be hidden in an indexed cover image to generate a stego-image with the same visual effect as the cover image and resumed without distortion from the stego-image if the correct key is used.In addition,the statistical feature of the secret data is completely covered up by using random data,so the stego-image is statistically in-dependent of the secret data.…”
    Get full text
    Article
  18. 1578

    Waste cooking oil pretreatment using microwave and ultrasound methods by Kerras, Halima, Outili, Nawel, Meniai, Abdeslam-Hassen

    Published 2023-06-01
    “…Results showed that the pretreatment methods led to good results where the best biodiesel yield was 98%, obtained with US pretreatment, while MW led to a yield of 96%. …”
    Get full text
    Article
  19. 1579
  20. 1580