Showing 1,721 - 1,740 results of 120,517 for search '"Methodism"', query time: 0.17s Refine Results
  1. 1721

    New construction method of periodic quasi-complementary sequence set by Xiaoyu CHEN, Chengrui WANG, Fan LIU

    Published 2023-05-01
    “…--math xmlns="http://www.w3.org/1998/Math/MathML"> <msub> <mi>&#x2124;</mi> <mrow> <mi>q</mi><mo stretchy='false'>(</mo><mi>q</mi><mo>&#x2212;</mo><mn>1</mn><mo stretchy='false'>)</mo></mrow> </msub> </math--></inline-formula>.The comparison results show that compared with the existing periodic quasi-complementary sequence sets, the proposed method contains more sequences with the same subsequence length, and can support more users in multi-carrier communication system.…”
    Get full text
    Article
  2. 1722

    Generalized Grad-CAM attacking method based on adversarial patch by Nianwen SI, Wenlin ZHANG, Dan QU, Heyu CHANG, Shengxiang LI, Tong NIU

    Published 2021-03-01
    “…To verify the fragility of the Grad-CAM, a Grad-CAM attack method based on adversarial patch was proposed.By adding a constraint to the Grad-CAM in the classification loss function, an adversarial patch could be optimized and the adversarial image could be synthesized.The adversarial image guided the Grad-CAM interpretation result towards the patch area while the classification result remains unchanged, so as to attack the interpretations.Meanwhile, through batch-training on the dataset and increasing perturbation norm constraint, the generalization and the multi-scene usability of the adversarial patch were improved.Experimental results on the ILSVRC2012 dataset show that compared with the existing methods, the proposed method can attack the interpretation results of the Grad-CAM more simply and effectively while maintaining the classification accuracy.…”
    Get full text
    Article
  3. 1723

    A social media geolocation method based on comparative learning by Yongchang XU, Shiduo HUANG, Haojun AI

    Published 2023-08-01
    “…Previous work on social media text-based geolocation focused on mapping language semantic space to geospatial space, which ignores the semantic correlation between social media texts and the distance correlation between geographical locations.To take advantage of these correlations, mCLF, a new unsupervised multiple-level contrastive learning framework was proposed, three contrastive learning modules were designed: a semantic learning module, a location learning module, and a cross-learning module.Transformer encoder was used to obtain semantic representation of posts, utilizing unsupervised contrastive learning method to decrease the distance of semantic representations and location representations of posts with near locations, and then fine-tuned the model with supervised method for geographic location regression or classification outputs.Compared with five baseline methods, extensive experiments based on four datasets demonstrate the effectiveness of the proposed framework.…”
    Get full text
    Article
  4. 1724

    ABOUT NECESSITY OF DEVELOPMENT OF ADVANCED METHODS FOR ASSESSMENT OF MATERIALS POROSITY by A. Anisovich, A. Buinitskaya

    Published 2015-04-01
    “…Methods used for porosity and microstructure determination». …”
    Get full text
    Article
  5. 1725
  6. 1726

    Method for calculating the range of an electric motorboat using solar energy by Valentina V. Kaplina

    Published 2025-01-01
    “…Results. We have defined the method for calculating the running time of the electrically driven solar powered boat. …”
    Get full text
    Article
  7. 1727
  8. 1728

    DEVELOPMENT OF SPECTROPHOTOMETRIC METHOD FOR DETERMINATION OF LISINOPRIL IN TABLET DOSAGE FORM by Nataliya Shulyak, Kateryna Budzivula, Lubomyr Kryskiw, Tetiana Kucher

    Published 2022-06-01
    “…The least squares method was used for statistical processing of the results. …”
    Get full text
    Article
  9. 1729
  10. 1730

    Self adaptive method for end-to-end available bandwidth estimation by ZHOU An-fu, LIU Min, LI Zhong-cheng, XIE Gao-gang

    Published 2008-01-01
    “…A low overhead, self adaptive method for end-to-end available bandwidth estimation was proposed. …”
    Get full text
    Article
  11. 1731

    Magnesium Borate Synthesis by Microwave Energy: A New Method by Azmi Seyhun Kipcak, Emek Moroydor Derun, Sabriye Piskin

    Published 2013-01-01
    “…In this study, magnesium borate minerals are synthesized using boric acid and magnesium oxide with a new method of microwave, and the synthesized minerals are characterized by various analysis techniques. …”
    Get full text
    Article
  12. 1732

    A Sensitive Validated Spectrophotometric Method for the Determination of Flucloxacillin Sodium by R. Singh Gujral, S. Manirul Haque, P. Shanker

    Published 2009-01-01
    “…A simple and sensitive spectrophotometric method has been proposed for the determination of flucloxacillin sodium. …”
    Get full text
    Article
  13. 1733

    Effect of caffeine ingestion on anaerobic capacity quantified by different methods. by Lucyana Arcoverde, Rodrigo Silveira, Fabiano Tomazini, André Sansonio, Romulo Bertuzzi, Adriano Eduardo Lima-Silva, Victor Amorim Andrade-Souza

    Published 2017-01-01
    “…The AC was estimated by MAOD, alternative MAOD, critical power, and gross efficiency methods. Caffeine had no effect on exercise endurance during the supramaximal bout (caffeine: 131.3 ± 21.9 and placebo: 130.8 ± 20.8 s, P = 0.80). …”
    Get full text
    Article
  14. 1734

    An Improved Peak Sidelobe Reduction Method for Subarrayed Beam Scanning by Hang Hu, Xuepeng Luan, Guanglei Zhang, Ke Song, Weihui Liu, Chenghu Mou

    Published 2015-01-01
    “…Simulation results demonstrate the validity of the introduced methods.…”
    Get full text
    Article
  15. 1735

    Internet traffic classification method based on behavior feature learning by Zhen LIU, Ruoyu WANG

    Published 2016-06-01
    “…The connection graph based internet traffic classification method can reflect the connectivity behavior between hosts.Thus,it has high stability.But the heuristic rules summarized for traffic classification are generally incomplete,and they difficultly obtain high classification accuracy.Host communication behavior model and BOF method was researched,and a set of host connection related behavior features (HCBF)was extracted from the multiple flows with the same {destination IP,destination port and transport protocol}.To evaluate the performance of HCBF,it was compared with the existing feature set on the respect of basic classification performance and classification stability.The experiments were carried out on the traffic collected in the traditional and mobile networks.Results show that HCBF out performs existing feature sets.…”
    Get full text
    Article
  16. 1736

    “Green” Synthesis of Metallic Nanoparticles by Sonoelectrochemical and Sonogalvanic Replacement Methods by Оrest Kuntyi, Galyna Zozulya, Andriy Kytsya

    Published 2021-01-01
    “…The main features of the “green” synthesis of metallic nanoparticles (MNPs) by the sonoelectrochemical methods are manufacturability, environmental friendliness, and the possibility of controlling the geometry of the forming particles. …”
    Get full text
    Article
  17. 1737

    Relaxed Viscosity Approximation Methods with Regularization for Constrained Minimization Problems by Lu-Chuan Ceng, Hong-Kun Xu, Ching-Feng Wen

    Published 2013-01-01
    “…We introduce a new relaxed viscosity approximation method with regularization and prove the strong convergence of the method to a common fixed point of finitely many nonexpansive mappings and a strict pseudocontraction that also solves a convex minimization problem and a suitable equilibrium problem.…”
    Get full text
    Article
  18. 1738

    Stability Analysis of θ-Methods for Neutral Multidelay Integrodifferential System by Y. Xu, J. J. Zhao, Z. N. Sui

    Published 2007-01-01
    “…A necessary and sufficient condition of stability for its analytic solutions is considered. The improved θ-methods are developed. Some numerical stability properties are obtained and numerical experiments are given.…”
    Get full text
    Article
  19. 1739

    SQLite Encryption Method for Embedded Databases Based on Chaos Algorithm by Junlong Shi

    Published 2023-01-01
    “…The initial value y0 determines the encryption method of the nonlinear function. Taking the integer variable (int) as an example, the value range is -231~231. …”
    Get full text
    Article
  20. 1740