Showing 1,861 - 1,880 results of 120,517 for search '"Methodism"', query time: 0.16s Refine Results
  1. 1861

    Pattern synthesis method for arbitrary arrays with desired mainloble response by Dian-fei PAN, Nai-ping CHENG

    Published 2014-09-01
    “…A pattern synthesis method based on adaptive array theory and convex optimization principle was proposed for arbitrary arrays,especially considering the influence of different orientation on array pattern.Firstly,the array pattern with special sideloble shape is obtained by adaptive array theory method; and then,the mainloble pointing to 0° is taken as reference to determine the pattern mainloble with variant steering angle.Finally,the optimal array pattern synthesis with desired mainloble response is converted to a second-order cone programming problem.The resulting optimization problem is nonconvex and is implemented via iterative algorithms of convex optimization,which can be solved using the second-order cone programming method at each iteration.Taking the method developed can obtain satisfied mainlobe response and less synthesized error in sideloble region.Theoretical analyses and simulation results show that the synthe-sized pattern has the same mainloble performance as the desired mainlabole in different orientation,and also the sideloble can maintain the shape to suppress the dynamic interference.…”
    Get full text
    Article
  2. 1862

    NON-PROBABILISTIC RELIABILITY ANALYSIS METHOD BASED ON INTERVAL ANALYSIS by MA DongJuan, LIU BoYing, LI LingLing

    Published 2015-01-01
    “…when uncertainty information is not enough that it is so difficult to get the parameter probability model,the nonprobabilistic reliability analysis method could be taken into accout. This method described system parameters as interval variables first,measuring the system reliability through the ratio of security domain and the basic interval variables total area. …”
    Get full text
    Article
  3. 1863

    A Novel Secret Sharing Method Based on Binary Sequence by Yexia Cheng, Yuejin Du, Kai Yang, Shen He, Jin Peng, Wen Jiang

    Published 2015-11-01
    “…A novel secret sharing method was proposed based on binary sequence,which was quite different from the traditional secret sharing method.This secret sharing method was based on binary secret sequence using bit operations.The secret here included but not limited to key,message,etc,meanwhile the secret sequence included but not limited to key sequence,message sequence and so on.And two new concepts which were called non-M sequence and non-M sequence rule method were defined.By using the non-M sequence rule method,the elements of sub-secret sequence M' of secret sharing were computed.The method for generating sub-secrets and the method for recovering secret was proposed based on binary sequence.The method was practical and effective.…”
    Get full text
    Article
  4. 1864

    Elaboration of the Method for Safety Assessment of Subsea Pipeline with Longitudinal Buckling by Liudmila Muravyeva, Nikolai Vatin

    Published 2016-01-01
    “…The calculation is based on the probabilistic and statistical method of assessing the pipeline state and operational reliability.…”
    Get full text
    Article
  5. 1865

    Fractional Subequation Method for Cahn-Hilliard and Klein-Gordon Equations by Hossein Jafari, Haleh Tajadodi, Nematollah Kadkhoda, Dumitru Baleanu

    Published 2013-01-01
    “…The fractional subequation method is applied to solve Cahn-Hilliard and Klein-Gordon equations of fractional order. …”
    Get full text
    Article
  6. 1866

    An Improved Recommendation Method Based on Content Filtering and Collaborative Filtering by Lei Fu, XiaoMing Ma

    Published 2021-01-01
    “…First, content-based methods are used to discover users’ existing interests. …”
    Get full text
    Article
  7. 1867

    Fixed start method for repetitive project scheduling with simulated annealing by Francisco Moreno, Eric Forcael, Francisco Orozco, Felipe Baesler, Duzgun Agdas

    Published 2025-01-01
    “…This research deals with the high project completion variability by presenting a new method to decrease such variability in repetitive construction projects. …”
    Get full text
    Article
  8. 1868

    The Z-Transform Method and Delta Type Fractional Difference Operators by Dorota Mozyrska, Małgorzata Wyrwas

    Published 2015-01-01
    “…We take under our consideration the possible solutions via the classical Z-transform method. We stress the formula for the image of the discrete Mittag-Leffler matrix function in the Z-transform. …”
    Get full text
    Article
  9. 1869

    ENDOCRINE DISORDERS IN DOGS: EPIDEMIOLOGY, CLINICAL PRESENTATION, AND DIAGNOSTIC METHODS by Daniela Neagu, Vlad-Emil Luca, Răzvan Codea, Cristian Popovici, Anca Bărbos, Ștefania Dandea, Dragoș Hodor, Alexandra Biriș

    Published 2024-08-01
    “…Comorbidities included pancreatitis (10.86%), hepatomegaly (10.86%), and biliary mucocele (15.21%). Diagnostic methods included glucose monitoring, glycemic curve analysis, and low-dose dexamethasone suppression tests, with imaging (ultrasound) confirming endocrine gland involvement in 50% of Cushing's cases. …”
    Get full text
    Article
  10. 1870

    Transfer Matrix Method to Vibration Analysis of Rotors with Coupler Offsets by Chao-Yang Tsai, Shyh-Chin Huang

    Published 2013-01-01
    “…In this paper a general transfer matrix method (TMM) for rotors containing global and local coupler offset was derived. …”
    Get full text
    Article
  11. 1871

    Analysis and Selection Method for Radar Echo Features in Challenging Scenarios by Yunlong Dong, Xiao Luo, Hao Ding, Ningbo Liu, Zheng Cao

    Published 2025-01-01
    “…In addressing the issue of weak target detection at sea, most existing feature detection methods are designed for scenarios with low sea states and small grazing angles. …”
    Get full text
    Article
  12. 1872

    Bursty-link-aware adaptive link quality estimation method by Ting-pei HUANG, Dong LI, Zhao-liang ZHANG, Li CUI

    Published 2012-06-01
    “…A bursty-link-aware and adaptive link quality estimation method,named EasiLQE,was proposed.The beacon packets are sent by nodes in a long-term period to probe the link quality.Meanwhile,nodes passively measure the mean value of RSSI of received packets.If the mean value of RSSI is lower than a certain threshold,the EasiLQE initiates the link quality estimation process in a short-term period.Finally,the EasiLQE uses error-based filter to estimate the link quality in future.The experimental results show that the EasiLQE can react quickly and accurately to persistent link quality changes in a short time,and also can smooth the occasional link quality fluctuations,which are not acute,to keep the link quality estimator stable,and decrease the estimation costs.…”
    Get full text
    Article
  13. 1873

    Study on Identification Method for Parameter Uncertainty Model of Aero Engine by Jie Bai, Shuai Liu, Wei Wang

    Published 2019-01-01
    “…According to this problem, the identification method for the parameter uncertain linear model of the aero engine was proposed. …”
    Get full text
    Article
  14. 1874

    Encrypted traffic classification method based on convolutional neural network by Rongna XIE, Zhuhong MA, Zongyu LI, Ye TIAN

    Published 2022-12-01
    “…Aiming at the problems of low accuracy, weak generality, and easy privacy violation of traditional encrypted network traffic classification methods, an encrypted traffic classification method based on convolutional neural network was proposed, which avoided relying on original traffic data and prevented overfitting of specific byte structure of the application.According to the data packet size and arrival time information of network traffic, a method to convert the original traffic into a two-dimensional picture was designed.Each cell in the histogram represented the number of packets with corresponding size that arrive at the corresponding time interval, avoiding reliance on packet payloads and privacy violations.The LeNet-5 convolutional neural network model was optimized to improve the classification accuracy.The inception module was embedded for multi-dimensional feature extraction and feature fusion.And the 1*1 convolution was used to control the feature dimension of the output.Besides, the average pooling layer and the convolutional layer were used to replace the fully connected layer to increase the calculation speed and avoid overfitting.The sliding window method was used in the object detection task, and each network unidirectional flow was divided into equal-sized blocks, ensuring that the blocks in the training set and the blocks in the test set in a single session do not overlap and expanding the dataset samples.The classification experiment results on the ISCX dataset show that for the application traffic classification task, the average accuracy rate reaches more than 95%.The comparative experimental results show that the traditional classification method has a significant decrease in accuracy or even fails when the types of training set and test set are different.However, the accuracy rate of the proposed method still reaches 89.2%, which proves that the method is universally suitable for encrypted traffic and non-encrypted traffic.All experiments are based on imbalanced datasets, and the experimental results may be further improved if balanced processing is performed.…”
    Get full text
    Article
  15. 1875

    FUNCTIONAL BEAM RESEARCH METHODS IN THE DIAGNOSIS OF ABNORMAL MOBILITY OF KIDNEY by A. G. Tonyan, A. S. Tatevosyan, A. A. Khalapyan, V. L. Medvedev, A. V. Pomortsev

    Published 2015-10-01
    “…Development of functional radiological methods of diagnosis of pathological mobility of the kidney and its complications.Research methods. …”
    Get full text
    Article
  16. 1876

    Rapid Determination of the S-N Curve for Steel by means of the Thermographic Method by Adam Lipski

    Published 2016-01-01
    “…The paper presents a thermographic method of accelerated determination of the S-N curve. …”
    Get full text
    Article
  17. 1877

    Evolution-Operator-Based Single-Step Method for Image Processing by Yuhui Sun, Peiru Wu, G. W. Wei, Ge Wang

    Published 2006-01-01
    “…This work proposes an evolution-operator-based single-time-step method for image and signal processing. The key component of the proposed method is a local spectral evolution kernel (LSEK) that analytically integrates a class of evolution partial differential equations (PDEs). …”
    Get full text
    Article
  18. 1878

    On the Potential of Least Squares Response Method for the Calibration of Superconducting Gravimeters by Mahmoud Abd El-Gelil, Spiros Pagiatakis, Ahmed El-Rabbany

    Published 2012-01-01
    “…In the time domain, we use the weighted linear regression method whereas in the frequency domain we use the least squares response method. …”
    Get full text
    Article
  19. 1879

    Research on cutting mechanism and process optimization method of gear skiving by Peng Wang, Yuanchao Ni, Xiaoqiang Wu, Jiaxue Ji, Geng Li, Jiahao Wu

    Published 2025-02-01
    “…Then, an orthogonal experiment is designed and the method of range analysis is employed to evaluate the significance of each process parameter. …”
    Get full text
    Article
  20. 1880