Showing 1,901 - 1,920 results of 120,517 for search '"Methodism"', query time: 0.20s Refine Results
  1. 1901

    Climatic Zoning of Khuzestan Province Based on Litten Ski Method by Seyede Lale Sadat Asl, Gholamreza Yavari, Farid Ejlali

    Published 2022-03-01
    “…The purpose of this study is to classify the climate of Khuzestan province based on litany-skiing method. The litany-skiing method uses the three basic elements of temperature, precipitation and coefficient. …”
    Get full text
    Article
  2. 1902
  3. 1903

    Generalized Runge-Kutta Method with respect to the Non-Newtonian Calculus by Uğur Kadak, Muharrem Özlük

    Published 2015-01-01
    “…Theory and applications of non-Newtonian calculus have been evolving rapidly over the recent years. As numerical methods have a wide range of applications in science and engineering, the idea of the design of such numerical methods based on non-Newtonian calculus is self-evident. …”
    Get full text
    Article
  4. 1904

    Analytical Comparison of Stop Word Recognition Methods in Persian Texts by Mohammad Samie, Erta Bahmani, Niloofar Mozafari

    Published 2025-01-01
    “…Our findings indicate that the FastText-based approach outperformed the others with a detection accuracy of 96.98, suggesting that this method can lead to the development of an automatic, reliable, and efficient system.…”
    Get full text
    Article
  5. 1905

    Joint channel and impulsive noise estimation method for OFDM systems by Xinrong LYU, Youming LI, Mingchen YU

    Published 2018-03-01
    “…Aiming at the impulsive noise occurring in OFDM systems,an impulsive noise mitigation algorithm based on compressed sensing theory was proposed.The proposed algorithm firstly treated the channel impulse response and the impulsive noise as a joint sparse vector by exploiting the sparsity of both them.Then the sparse Bayesian learning framework was adopted to jointly estimate the channel impulse response,the impulsive noise and the data symbols,in which the data symbols were regarded as unknown parameters.Compared with the existing impulsive noise mitigation methods,the proposed algorithm not only utilized all subcarriers but also did not use any a priori information of the channel and impulsive noise.The simulation results show that the proposed algorithm achieves significant improvement on the channel estimation and bit error rate performance.…”
    Get full text
    Article
  6. 1906
  7. 1907

    Safe hierarchical virtual network mapping method based on clustering by Xie LU, Lei XU, Manjun ZHANG

    Published 2021-09-01
    “…Based on the 5G network environment, a security hierarchical virtual network mapping method based on K-means clustering was proposed.In particular, the idea of node security classification and the combination of K-menas clustering algorithm was involved to solve the key problems of low security and low mapping efficiency existing in current virtual network mapping.Compared with traditional methods, this research method improves the efficiency of virtual node mapping and enhances the network resilience.…”
    Get full text
    Article
  8. 1908
  9. 1909

    Critical analysis of methods for measuring and monitoring of the population life quality by A. A. Golovin

    Published 2022-01-01
    “…Global, subnational and national quality of life assessment methods in relation to measurement tools have been compared and a comparative analysis has been presented in a summary graph.The author’s classification of quality of life management approaches has been presented. …”
    Get full text
    Article
  10. 1910

    Image inpainting forensics method based on dual branch network by Dengyong ZHANG, Huang WEN, Feng LI, Peng CAO, Lingyun XIANG, Gaobo YANG, Xiangling DING

    Published 2022-12-01
    “…Image inpainting is a technique that uses information from known areas of an image to repair missing or damaged areas of the image.Image editing software based on it has made it easy to edit and modify the content of digital images without any specialized foundation.When image inpainting techniques are used to maliciously remove the content of an image, it will cause confidence crisis on the real image.Current researches in image inpainting forensics can only effectively detect a certain type of image inpainting.To address this problem, a passive forensic method for image inpainting was proposed, which is based on a two-branch network.The high-pass filtered convolutional network in the dual branch first used a set of high-pass filters to attenuate the low-frequency components in the image.Then features were extracted using four residual blocks, and two transposed convolutions were performed with 4x up-sampling to zoom in on the feature map.And thereafter a 5×5 convolution was used to attenuate the tessellation artifacts from the transposed convolutions to generate a discriminative feature map on the high-frequency components of the image.The dual-attention feature fusion branch in the dual branch first added a local binary pattern feature map to the image using a preprocessing block.Then the dual-attention convolution block was used to adaptively integrate the image’s local features and global dependencies to capture the differences in content and texture between the inpainted and pristine regions of the image.Additionally, the features extracted from the dual-attention convolution block were fused, and the feature maps were up-sampled identically to generate the discriminative image content and texture on the feature maps.The extensive experimental results show the proposed method improved the F1 score by 2.05% and the Intersection over Union(IoU) by 3.53% for the exemplar-based method and by 1.06% and 1.22% for the deep-learning-based method in detecting the inpainted region of the removed object.Visualization of the results shows that the edges of the removed objects can be accurately located on the detected inpainted area.…”
    Get full text
    Article
  11. 1911

    Explicit Solution of Telegraph Equation Based on Reproducing Kernel Method by Mustafa Inc, Ali Akgül, Adem Kiliçman

    Published 2012-01-01
    “…We propose a reproducing kernel method for solving the telegraph equation with initial conditions based on the reproducing kernel theory. …”
    Get full text
    Article
  12. 1912

    CS-based data collection method for airborne clustering WSN by HOUWei Z, INGBo J, UANGYi-feng H, IAOXiao-xuan J, UJia-xing H, IANGWei L

    Published 2015-05-01
    “…A data acquisition scheme which was suitable for airborne clustering WSN was proposed.On the one hand,this scheme adopts the random compressive sampling could reduce the amount of sampling data of the cluster nodes ef-fectively,and greatly reducing the hardware requirements of the cluster nodes; on the other hand,put forward a MP re-construction method based on composite chaotic-genetic algorithm expressly,which combined the excellent local searching characteristics of chaos theory with the powerful global search ability of genetic algorithm,could improve the signal reconstruction performance of the cluster head or Sink effectively.The experimental results show that,by dimin-ishing the sampling frequency to 1/8 of the original sampling frequency,this random compressive sensing scheme can dramatically reduce the sampling quantity,and the reconstruction precision can reach 10<sup>-7</sup>magnitude.This random com-pressive sensing scheme provides a useful idea for practical WSN.…”
    Get full text
    Article
  13. 1913

    Cross-language refactoring detection method based on edit sequence by Tao LI, Dongwen ZHANG, Yang ZHANG, Kun ZHENG

    Published 2024-12-01
    “…Aiming at the problems of unreliable commit message caused by developers not consistently recording refactoring operations, and language singularityin deep learning-based refactoring detection methods, a cross-language refactoring detection method RefCode was proposed. …”
    Get full text
    Article
  14. 1914
  15. 1915

    Analysis of Random Difference Equations Using the Differential Transformation Method by Şeyma Şişman, Mehmet Merdan

    Published 2024-01-01
    “…The differential transformation method (DTM) is one of the best methods easily applied to linear and nonlinear difference equations with random coefficients. …”
    Get full text
    Article
  16. 1916

    Data processing method for telecom data based on projection pursuit by Jinming ZHAO

    Published 2016-12-01
    “…Based on this, a data processing method based on projection pursuit was proposed. The result demonstrates the effectiveness of the scheme.…”
    Get full text
    Article
  17. 1917

    SDN security prediction method based on bayesian attack graph by Yanshang YIN, Tongpeng SUO, Ligang DONG, Xian JIANG

    Published 2021-11-01
    “…Existing researchers use threat modeling and security analysis system to evaluate and predict SDN (software defined network) security threats, but this method does not consider the vulnerability utilization of SDN controller and the location of devices in the network, so the security evaluation is not accurate.In order to solve the above problems, according to the probability of device vulnerability utilization and device criticality, combined with PageRank algorithm, a algorithm to calculate the importance of each device in SDN was designed; according to SDN attack graph and Bayesian theory, a method to measure the success probability of device being attacked was designed.On this basis, a SDN security prediction method based on Bayesian attack graph was proposed to predict the attacker's attack path.Experimental results show that this method can accurately predict the attacker's attack path and provide more accurate basis for security defense.…”
    Get full text
    Article
  18. 1918

    Adaptive Dual-Polarization Filtering Method for Countering Active Jamming by Qiang Zhang, Rui Zhou, Xianbo Shi, Yixin Zhao

    Published 2020-01-01
    “…In order to counter active jamming, an adaptive polarization filtering method based on dual polarization radar is put forward. …”
    Get full text
    Article
  19. 1919

    An Efficient Compact Difference Method for Temporal Fractional Subdiffusion Equations by Lei Ren, Lei Liu

    Published 2019-01-01
    “…In this paper, a high-order compact finite difference method is proposed for a class of temporal fractional subdiffusion equation. …”
    Get full text
    Article
  20. 1920

    Method of individual communication transmitter identification based on maximum correntropy by Zhe TANG, Ying-ke LEI

    Published 2016-12-01
    “…To measure the similarity between the fine features of communication transmitters, a method of individual communication transmitter identification based on maximum correntropy was put forward. …”
    Get full text
    Article