Showing 1,821 - 1,840 results of 120,517 for search '"Methodism"', query time: 0.15s Refine Results
  1. 1821

    A New Method for the Calibration of Site-Related Response Spectra by Xin Han, Shun Yang, Jingshan Bo, Chaoyu Chang, Mei Guo, Yimeng Cai

    Published 2022-01-01
    “…The accuracy of the proposed calibration method is validated against the other four available methods using Qian’a earthquake records and actual engineering examples. …”
    Get full text
    Article
  2. 1822

    An information-DNA based method of information dissemination and evolution on Internet by Panpan LI, Zhengxia XIE, Zengkai WANG, Rui JIN

    Published 2022-11-01
    “…To solve the problem of how to trace the information content dissemination and evolution process on the Internet, an information DNA-based method of information dissemination and evolution on Internet was proposed.Firstly, semantic extraction of Internet information content was performed based on domain knowledge to form a key feature set of information content.Then, using the key feature set of information content, an information DNA construction method based on locally sensitive hashing was proposed.Finally, the usability and effectiveness of the proposed method were verified by public dataset.The problem of traceability of Internet homologous information dissemination and evolution process was solved by using information DNA as the core identifier, which was of great practical significance for the study of Internet information content dissemination, evolution tracing and the governance and guidance of Internet public opinion events.…”
    Get full text
    Article
  3. 1823
  4. 1824

    Methods to Evaluate Peanut Maturity for Optimal Seed Quality and Yield by Ethan T. Carter, Patrick Troy, Diane Rowland, Barry Tillman, Keith Wynne, Krystel Pierre, Michael Mulvaney

    Published 2016-11-01
    “…This 8-page fact sheet discusses maturity assessment methods as well as steps for collecting and evaluating a maturity sample. …”
    Get full text
    Article
  5. 1825

    Simulation on the Self-Compacting Concrete by an Enhanced Lagrangian Particle Method by Jun Wu, Xuemei Liu, Haihua Xu, Hongjian Du

    Published 2016-01-01
    “…The capability and results obtained from this method are discussed.…”
    Get full text
    Article
  6. 1826

    Application of Learning Analytics in Higher Education: Datasets, Methods and Tools by Yu. Yu. Dyulicheva

    Published 2024-06-01
    “…The  accumulation  of  big  educational  data  on  the  platforms  of  universities  and  social media  leads  to  the  need  to  develop  tools  for  extracting  regularities  from  educational  data,  which can be used for understanding the behavioral patterns of students and teachers, improve teaching methods  and  the  quality  of  the  educational  process,  as  well  as  form  sound  strategies  and  policies for  universities  development. …”
    Get full text
    Article
  7. 1827
  8. 1828
  9. 1829

    Research of Automobile Transmission Shaft based on Finite Element Method by Zhong Zifeng, Nie Peng, Lu Jian

    Published 2016-01-01
    “…In order to improve the reliability and rationality of a automobile transmission shaft design,the free modal,torsional stiffness,static strength and fatigue strength of a transmission shaft are analyzed based on the finite element method. The result shows that the first-order natural frequency is 15% higher than the excitation frequency,so the resonance will be effectively avoided. …”
    Get full text
    Article
  10. 1830

    Methods of Collecting User Data in the Process of Building Commercial Website by Dariusz Strzębicki

    Published 2012-06-01
    “…The presented methods are different as regards such criteria as: research type, stage of Website building, method goal, and advantages of the method.…”
    Get full text
    Article
  11. 1831
  12. 1832

    Passive Initialization Method Based on Motion Characteristics for Monocular SLAM by Yu Yang, Jing Xiong, Xiaoyu She, Chang Liu, ChengWei Yang, Jie Li

    Published 2019-01-01
    “…Visual SLAM techniques have proven to be effective methods for estimating robust position and attitude in the field of robotics. …”
    Get full text
    Article
  13. 1833

    Method of constructing an anonymous graph based on information loss estimation by Jie SU, Shuai LIU, Zhi-yong LUO, Guang-lu SUN

    Published 2016-06-01
    “…A potential attack based on degree information by re-identifying target vertexes from a sequence of published graphs was analyzed.To deal with this kind of attack,a k-anonymous graph stream constructing method based on information loss estimation was provided.Information loss caused by re-constructing graph was controlled by using the method of attributes generalization of nodes and the structure generalization of sub-graph.The disturbance in sub-graph was forbidden to prevent the attack.The method of measuring the information loss of nodes and structures during the anonymous process due to re-construction of graph was defined.A k-anonymity cluster algorithm based on greedy clustering algorithm was build,which realized anonymous partition according to the information loss.Finally,a method of constructing anonymous social network for the evolving social network with the least information loss was provided.The experiments on medical diagnostic data set show that the algorithm of constructing anonymous graph based on the information loss estimation can be used to control the loss of information.…”
    Get full text
    Article
  14. 1834

    Software diversity evaluating method based on gadget feature analysis by Genlin XIE, Guozhen CHENG, Yawen WANG, Qingfeng WANG

    Published 2023-06-01
    “…Software diversity is commonly utilized in scenarios such as software distribution and operating systems to improves system resilience and security.However, existing software diversity evaluation methods are typically based on conventional code features and are relatively limited in scope, which can make it difficult to accurately reflect the security benefits of software diversity.To address this issue, a software diversity evaluation method was proposed from the perspective of ROP attack by analyzing the impact of software diversity on the difficulty of building a gadget attack chain, the attacker’s potentially available computing power, and the attacker’s cost of searching for gadgets in different variants.Metrics for the quality, practicability, and distribution of gadgets were integrated into this method.Testing was conducted using diversity technologies with different granularity.The evaluation results showed that the proposed method could accurately and comprehensively reflect the security gain brought by software diversity.It was observed that software diversity could relocate/modify/delete a large number of gadgets in the software, increasing the cost of attacking different software variants but also leading to different degrees of software expansion.Finally, an analysis and discussion of the advantages and disadvantages of existing diversity techniques were conducted based on the experimental results.…”
    Get full text
    Article
  15. 1835

    Least Square Homotopy Perturbation Method for Ordinary Differential Equations by Mubashir Qayyum, Imbsat Oscar

    Published 2021-01-01
    “…In this study, a new modification of the homotopy perturbation method (HPM) is introduced for various order boundary value problems (BVPs). …”
    Get full text
    Article
  16. 1836

    Life cycle cost-effectiveness estimation and optimization method for satellite by ZHAO Jianyu, WANG Jingyan, CHENG Zhuo, JIAO Jian, CHENG Yao

    Published 2025-02-01
    “…In order to design satellite with low cost and high effectiveness, an optimization method of life cycle cost-effectiveness for satellites is proposed in this paper. …”
    Get full text
    Article
  17. 1837

    Secure data collection method of WSN based on mobile Sink by Chunyu MIAO, Yuan FAN, Hui LI, Kaiqiang GE, Xiaomeng ZHANG

    Published 2021-02-01
    “…At present, WSN data collection method based on mobile Sink has some problems, such as low detection rate of network attack and large memory cost, which makes the network vulnerable to network attack and difficult to be applied in practice.To solve this problem, a secure data collection WSN method of WSN based on mobile Sink was proposed, which used convex hull algorithm of energy perception to identify data collection points, used elliptic encryption algorithm (ECC) to generate key for all nodes in the network, used ElGamal algorithm to realize node identity and message authentication, and used support vector machine (SVM) to identify network attack types.The simulation results show that the proposed secure data collection method has good performance in attack detection rate, memory overhead and packet delivery rate.…”
    Get full text
    Article
  18. 1838
  19. 1839
  20. 1840

    Role of radiological methods of diagnostics at simultaneous pancreas-kidney transplantation by A. V. Pinchuk, I. V. Dmitriev, I. E. Selina, R. Sh. Muslimov, Ye. A. Lapshina, M. V. Parkhomenko, A. S. Kondrashkin

    Published 2015-12-01
    “…To characterize radiological methods of diagnostics of surgical complications after simultateous pankreas-kidney transplantation (SPKT).Material and methods. …”
    Get full text
    Article