Showing 1,841 - 1,860 results of 120,517 for search '"Methodism"', query time: 0.17s Refine Results
  1. 1841

    An Algebraic Method on the Eigenvalues and Stability of Delayed Reaction-Diffusion Systems by Jian Ma, Baodong Zheng

    Published 2013-01-01
    “…The eigenvalues and stability of the delayed reaction-diffusion systems are considered using the algebraic methods. Firstly, new algebraic criteria to determine the pure imaginary eigenvalues are derived by applying the matrix pencil and the linear operator methods. …”
    Get full text
    Article
  2. 1842

    New method of text representation model based on neural network by Shui-fei ZENG, Xiao-yan ZHANG, Xiao-feng DU, Tian-bo LU

    Published 2017-04-01
    “…Method of text representation model was proposed to extract word-embedding from text feature.Firstly,the word-embedding of the dual word-embedding list based on dictionary index and the corresponding part of speech index was created.Then,feature vectors was obtained further from these extracted word-embeddings by using Bi-LSTM recurrent neural network.Finally,the sentence vectors were processed by mean-pooling layer and text categorization was classified by softmax layer.The training effects and extraction performance of the combination model of Bi-LSTM and double word-embedding neural network were verified.The experimental results show that this model not only performs well in dealing with the high-quality text feature vector and the expression sequence,but also significantly outperforms other three kinds of neural networks,which includes LSTM,LSTM+context window and Bi-LSTM.…”
    Get full text
    Article
  3. 1843

    A Class of Steffensen-Type Iterative Methods for Nonlinear Systems by F. Soleymani, M. Sharifi, S. Shateyi, F. Khaksar Haghani

    Published 2014-01-01
    “…By considering a frozen Jacobian, we provide a class of m-step methods with order of convergence m+1. A new method named as Steffensen-Schulz scheme is also contributed. …”
    Get full text
    Article
  4. 1844

    Subarrayed Antenna Array Synthesis Using Ternary Adjusting Method by Guolong He, Yafeng Zhan, Yukui Pei, Bin Wu

    Published 2014-01-01
    “…Ternary adjusting method is proposed and combined with particle swarm optimization (PSO) algorithm for subarrayed antenna array synthesis. …”
    Get full text
    Article
  5. 1845
  6. 1846

    Computational Methods for Solving Linear Fuzzy Volterra Integral Equation by Jihan Hamaydi, Naji Qatanani

    Published 2017-01-01
    “…However, according to comparison of these methods, we conclude that the variational iteration method provides more accurate results.…”
    Get full text
    Article
  7. 1847

    Cryopreservation Method for Preventing Freeze-Fracture of Small Muscle Samples by Namrata Ghag, Joshua Tam, Rox Anderson, Nashwa Cheema

    Published 2025-01-01
    “…This method decreased the occurrence of freeze-fractures by an order of magnitude, to ~4%, whereas the traditional method of cryopreservation resulted in ~56% freeze-fracturing.…”
    Get full text
    Article
  8. 1848

    Shortest-Way: An Improved Empirical Transition Method for Signal Coordination by Mingming Zheng, Hongfeng Xu, Kun Zhang, Ronghan Yao

    Published 2017-01-01
    “…Four fundamental insights into transition methods are provided from the perspective of traffic engineers. …”
    Get full text
    Article
  9. 1849

    ABOUT THE APPROACH AND METHOD OF DETERMINING THE VALUE OF ROYALTIES FOR THE DEVELOPMENT OF MINERALS by V. M. Serov, N. A. Moiseenko

    Published 2019-10-01
    “…The author’s approach and the method of determining the value of royalties for the development of mineral resources have been explained in the article. …”
    Get full text
    Article
  10. 1850

    Research on unsupervised domain adaptive bearing fault diagnosis method by WU ShengKai, SHAO Xing, WANG CuiXiang, GAO Jun

    Published 2024-06-01
    “…Then, the feature distributions output of the source domain and the target domain were converged by the method of reversing labels in the generative adversarial network. …”
    Get full text
    Article
  11. 1851
  12. 1852

    Uncertainty analysis of varying inertia estimation based on Bayesian method by Dongdong Li, Wei Hua, Yang Mi

    Published 2025-04-01
    “…The Bayesian inertia estimation method (BIEM) is proposed to estimate power system varying inertia and quantify estimation uncertainty from a Bayesian statistical and modeling perspective. …”
    Get full text
    Article
  13. 1853

    Research on the backbone network cache method based on application-awareness by Chun-jing HAN, Ye YANG, Hong-lei LYU, Jing-guo GE, Tong LI, Yun-jie LIU

    Published 2017-12-01
    “…Based on over 900 million HTTP requests from an ISP backbone network,the HTTP characteristic of different content types from a wide range of perspectives was analyzed,including request composition,size,popularity and temporal dynamics,and an application-aware backbone network cache method was proposed,referred to as AACM.The experiment results show that in the case of a slight increase in cache space,the hit ratio of the online-video increases 15%, and the total source traffic and cache I/O load reduced by about half.…”
    Get full text
    Article
  14. 1854
  15. 1855

    SDN security control and forwarding method based on cipher identification by Xi QIN, Guodong TANG, Chaowen CHANG

    Published 2018-02-01
    “…Aimed at the limited matching fields and the lack of effective data source authentication mechanism in the software defined networking (SDN),a SDN security control forwarding method based on cipher identification was proposed.First,the cipher identification was generated according to the user identity,file attributes or business content and other characteristics,and the data stream was marked by the cipher identification and signed with the private key based on the cipher identification.Then,when the data stream entered and left the network,the forwarding device verified its signature to ensure the authenticity of the data.At the same time,the cipher identification was designed as a matching item recognized by the forwarding device,and the network forwarding behavior was defined based on the cipher identification,so a fine-grained network control capability could be formed based on people,things,and business flow.Finally,the validity of the method is verified by experimental analysis.…”
    Get full text
    Article
  16. 1856

    Method of Prevent the for Years for a Change of Precision Punching Die by Tian Shaojie, Hu Zhongcheng, Liu Jing

    Published 2016-01-01
    “…The method and parameters of heat treatment of dies are as follows. …”
    Get full text
    Article
  17. 1857

    Container escape detection method based on heterogeneous observation chain by Yuntao ZHANG, Binxing FANG, Chunlai DU, Zhongru WANG, Zhijian CUI, Shouyou SONG

    Published 2023-01-01
    “…Aiming at the problem of high false negative rate in container escape detection technologies, a real-time detecting method of heterogeneous observation was proposed.Firstly, the container escape behavior utilizing kernel vulnerabilities was modeled, and the critical attributes of the process were selected as observation points.A heterogeneous observation method was proposed with “privilege escalation” as the detection criterion.Secondly, the kernel module was adopted to capture the attribute information of the process in real time, and the process provenance graph was constructed.The scale of the provenance graph was reduced through container boundary identification technology.Finally, a heterogeneous observation chain was built based on the process attribute information, and the prototype system HOC-Detector was implemented.The experiments show that HOC-Detector can successfully detect all container escapes using kernel vulnerabilities in the test dataset, and the increased runtime overhead is less than 0.8%.…”
    Get full text
    Article
  18. 1858
  19. 1859

    Application of Local Fractional Homotopy Perturbation Method in Physical Problems by Nabard Habibi, Zohre Nouri

    Published 2020-01-01
    “…It is difficult for nonlinear models to obtain the closed form of the solution, and in many cases, only an approximation of the real solution can be obtained. The perturbation method is a wave equation solution using HPM compared with the Fourier series method, and both methods results are good agreement. …”
    Get full text
    Article
  20. 1860

    Interrogating the Traditional Methods of Crime Control of the Alago Ethnic Group by Ado Ahmad IBRAHIM

    Published 2022-11-01
    “… This study investigates the Alago traditional methods of crime control. The analysis in the research is predicated on social control theory as the theoretical based. …”
    Get full text
    Article