Showing 1,601 - 1,620 results of 120,517 for search '"Methodism"', query time: 0.15s Refine Results
  1. 1601
  2. 1602
  3. 1603

    Critique and Analysis of the Textbook “Comparative Education: Foundation, Principles and Methods by abbas madandararani

    Published 2017-11-01
    “…Writing and preparation of the book "Comparative Education: Foundation, Principles and Methods " shows a deliberate attempt to present this science with respect to its theoretical foundations and principles. …”
    Get full text
    Article
  4. 1604

    An Approximate Quasi-Newton Bundle-Type Method for Nonsmooth Optimization by Jie Shen, Li-Ping Pang, Dan Li

    Published 2013-01-01
    “…In contrast with quasi-Newton bundle methods of Mifflin et al. (1998), we only assume that the values of the objective function and its subgradients are evaluated approximately, which makes the method easier to implement. …”
    Get full text
    Article
  5. 1605

    Video tamper detection method based on nonnegative tensor factorization by Xue-li ZHANG, Tian-qiang HUANG, Jing LIN, Wei HUANG

    Published 2017-06-01
    “…The authenticity and integrity of video authentication is one of the important contents in information security field.A video tampering detection method based on non-negative tensor decomposition was proposed for video inter-frame tampering.First of all,spectral feature of video frame was extracted quickly.The video was described by a three-dimensional tensor which created by the main compression feature.The tensor was factorized by Tucker non-negative decomposition method and then the time dimension matrix was extracted to calculate correlation.Finally,the tampering position was determined by using the Chebyshev’s inequality.Experiments show that this method can detect the video inter-frame tampering quickly and robustly.…”
    Get full text
    Article
  6. 1606

    The comparison of post-proximal gastrectomy digestive tract reconstruction methods by Yang Xia, Nengquan Sheng, Zhigang Wang, Qingchao Zhu

    Published 2025-01-01
    “…This study is to compare the performance of esophagogastrostomy (EG), jejunal interposition (JI), and double tract reconstruction (DTR) on post-PG reconstruction effectiveness. Methods A retrospective study was conducted using the clinical data of 94 PG patients who underwent digestive tract reconstruction by EG (37 patients), JI (29 patients) or DTR (28 patients). …”
    Get full text
    Article
  7. 1607

    Dynamic defense decision method for network real-time confrontation by Qiang LENG, Yingjie YANG, Dexian CHANG, Ruixuan PAN, Ying CAI, Hao HU

    Published 2019-12-01
    “…How to implement defense decision based on network external threat is the core problem of building network information defense system.Especially for the dynamic threat brought by real-time attack,scientific and effective defense decision is the key to construct network dynamic emergency defense system.Aiming at the problem of dynamic defense decision-making,firstly a network survivability game model based on attribute attack graph theory is designed.The attack and defense matrix is used to represent the attack and defense strategy and path,and the attack and defense strength and network survivability quantification method are given.Secondly,the single step and the multi-step attack and defense strategy payoff calculation method is proposed,and the defense decision is based on the attack and defensive strategy payoff.Finally,the effectiveness of the defense decision technology is verified through experiments.…”
    Get full text
    Article
  8. 1608

    Code vulnerability detection method based on graph neural network by Hao CHEN, Ping YI

    Published 2021-06-01
    “…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
    Get full text
    Article
  9. 1609

    Methods for prevention of acute post-endoscopic retrograde cholangiopancreatography pancreatitis by Kamil Jaszczuk, Michał Lipiński, Grażyna Rydzewska

    Published 2020-06-01
    “…This review provides a broader summary of pharmacological methods and techniques aimed at reducing the risk of PEP.…”
    Get full text
    Article
  10. 1610

    A Case-Based Reasoning Method for Remanufacturing Process Planning by Fan Zhou, Zhigang Jiang, Hua Zhang, Yan Wang

    Published 2014-01-01
    “…To assess the usefulness and practicality of the proposed method, an illustrative example is given and the results are discussed.…”
    Get full text
    Article
  11. 1611

    A Comparative Study of Regularization Method in Structure Load Identification by Bingrong Miao, Feng Zhou, Chuanying Jiang, Xiangyu Chen, Shuwang Yang

    Published 2018-01-01
    “…The TSVD based on GCV method has more advantages than the Tikhonov based on L-curve method. …”
    Get full text
    Article
  12. 1612

    Cloud Resource Allocation Method Based on Elastic Resource Adjustment by Bo Yin, Yunyong Zhang, Bingyi Fang, Weibin Feng

    Published 2014-11-01
    “…The proposed method meets the users' satisfaction, effectively realizes the optimization of virtual machine resource cost, increases the cloud service provider revenue.…”
    Get full text
    Article
  13. 1613
  14. 1614
  15. 1615

    Prediction of Chloride Diffusion in Concrete Structure Using Meshless Methods by Ling Yao, Xiaolu Li, Ling Zhang, Lingling Zhang

    Published 2016-01-01
    “…The numerical simulation methods at present mainly involve finite element methods (FEM), which are based on mesh generation. …”
    Get full text
    Article
  16. 1616

    Image generation classification method based on convolution neural network by Qiao-ling LI, Qing-xiao GUAN, Xian-feng ZHAO

    Published 2016-09-01
    “…Using convolution neural network which though convolution and pooling extracting features of high dis-tinguish ability and then make fusion for classification of natural images and scanned documents.Experimental re-sults show that the classification accuracy of the proposed classification method is more than 93% on the SKL image database.The model is highly robust to font sizes and image formats.Through contrast experiment validated that preprocessing of image has a positive effect on the accuracy of the model and the time cost on training.…”
    Get full text
    Article
  17. 1617

    APDL Modeling Method of Accurate Mesh Model of Helical Gear by Tan Jun, Gao Defang, Yang Chao

    Published 2017-01-01
    “…The results of numerical experiment show that the meshing solid model of helical gear generated by the presented method has a good geometric precision,which can guarantee that the simulation results is credible.…”
    Get full text
    Article
  18. 1618
  19. 1619

    Application of Fuzzy theory to project scheduling with critical path method by MH Oladeinde, DO Itsisor

    Published 2013-07-01
    “…The results obtained using the present method is compared with those obtained using other methods used in literature…”
    Get full text
    Article
  20. 1620