Showing 1,941 - 1,960 results of 120,517 for search '"Methodism"', query time: 0.19s Refine Results
  1. 1941

    Optical fiber eavesdropping detection method based on machine learning by Xiaolian CHEN, Yi QIN, Jie ZHANG, Yajie LI, Haokun SONG, Huibin ZHANG

    Published 2020-11-01
    “…Optical fiber eavesdropping is one of the major hidden dangers of power grid information security,but detection is difficult due to its high concealment.Aiming at the eavesdropping problems faced by communication networks,an optical fiber eavesdropping detection method based on machine learning was proposed.Firstly,seven-dimensions feature vector extraction method was designed based on the influence of eavesdropping on the physical layer of transmission.Then eavesdropping was simulated and experimental feature vectors were collected.Finally,two machine learning algorithms were used for classification detection and model optimization.Experiments show that the performance of the neural network classification is better than the K-nearest neighbor classification,and it can achieve 98.1% eavesdropping recognition rate in 10% splitting ratio eavesdropping.…”
    Get full text
    Article
  2. 1942
  3. 1943

    Reservoir ecological health assessment Methods: A systematic review by Esi Esuon Biney, Charles Gyamfi, Anthony Yaw Karikari, Deborah Darko

    Published 2025-02-01
    “…This systematic literature review examined comprehensive methods for assessing the aquatic ecological health of artificial water reservoirs covering studies conducted globally from 1998 to 2023. …”
    Get full text
    Article
  4. 1944

    A New Scalar Quantization Method for Digital Image Watermarking by Yevhen Zolotavkin, Martti Juhola

    Published 2016-01-01
    “…In contrast to other known quantization methods, the detailed method here stipulates asymmetric distribution of quantized samples. …”
    Get full text
    Article
  5. 1945

    METHOD OF MAKING MANAGEMENT DECISION ON FINANCING THE ECONOMIC SECURITY OF ORGANIZATION by M. Vlasenko

    Published 2017-01-01
    “…There is a dependence of the value of averted damage from resource investments in building and maintaining the desired level of economic security, in a view of this, is found their optimum value. The method takes into account a number of requirements to build economic security, which further allows you to integrate it into the overall organization of the control loop. …”
    Get full text
    Article
  6. 1946

    Nano-Sized Ultrasound Contrast Agent: Salting-Out Method by Margaret A. Wheatley, John Lewandowski

    Published 2010-03-01
    “…We describe the development of an echogenic, nano-sized polylactic acid UCA by adaptation of a salting-out method. The viscosity of the initial colloidal suspension (concentration and molecular weight of protective colloid [polyvinyl alcohol (PVA)] and concentration of polymer) was key in determining particle size and polydispersity (increasing viscosity increased both). …”
    Get full text
    Article
  7. 1947
  8. 1948

    Ranking Influential Nodes in Complex Networks with Information Entropy Method by Nan Zhao, Jingjing Bao, Nan Chen

    Published 2020-01-01
    “…On the basis of the k-shell method, we propose an improved multiattribute k-shell method by using the iterative information in the decomposition process. …”
    Get full text
    Article
  9. 1949

    Uniqueness, Born Approximation, and Numerical Methods for Diffuse Optical Tomography by Kiwoon Kwon

    Published 2013-01-01
    “…If a priori information of the optical coefficient is known, DOT is reformulated to find a perturbation of the optical coefficients inverting the Born expansion which is an infinite series expansion with respect to the perturbation and the a priori information. Numerical methods for DOT are explained as methods inverting first- or second-order Born approximation or the Born expansion itself.…”
    Get full text
    Article
  10. 1950

    Reliability Assessment Based on GO Method of Metro Traction System by Qi Gong, Bingzhi Chen, Yonghua Li, Pengpeng Zhi

    Published 2020-01-01
    “…A reliability assessment method based on the GO method of the MTS is proposed. …”
    Get full text
    Article
  11. 1951

    Research on Self-Monitoring Method for Anomalies of Satellite Atomic Clock by Lei Feng, Guotong Li

    Published 2016-01-01
    “…Now, method based on PLL has been used successfully in China’s newest BeiDou navigation satellite.…”
    Get full text
    Article
  12. 1952
  13. 1953
  14. 1954

    A Cost-Sensitive Ensemble Method for Class-Imbalanced Datasets by Yong Zhang, Dapeng Wang

    Published 2013-01-01
    “…In imbalanced learning methods, resampling methods modify an imbalanced dataset to form a balanced dataset. …”
    Get full text
    Article
  15. 1955

    Analysis of Optimal RAP Content Based on Discrete Element Method by Lei Wang, Xiucheng Yang

    Published 2022-01-01
    “…Methods of recycling a large amount of waste asphalt mixture generated in pavement maintenance and decreasing the waste of existing resources are one of the problems that will be solved in the future. …”
    Get full text
    Article
  16. 1956

    Bifurcation Analysis with Aerodynamic-Structure Uncertainties by the Nonintrusive PCE Method by Linpeng Wang, Yuting Dai, Chao Yang

    Published 2017-01-01
    “…The uncertain limit cycle oscillation (LCO) and bifurcation are simulated in the time domain with the stochastic PCE method. Bifurcation diagrams with uncertainties were quantified. …”
    Get full text
    Article
  17. 1957
  18. 1958

    AN EXPERIMENT ON THE PROPOSED ONLINE ASSESSMENT AND EXAMINATION METHOD AT DALAT UNIVERSITY by Thi Thu Phuong Ta, Bao Tuyen Huynh, Phuoc Huy Dang

    Published 2024-06-01
    “…Along with online teaching are methods of online assessments and examinations. The biggest challenges to online assessments and examinations are internet speed, authentication of the examinee’s identity, and test authenticity, especially for classes with large numbers of students. …”
    Get full text
    Article
  19. 1959

    METHOD AND ALGORITHMS OF CALCULATION OF PARAMETERS OF RELIABILITY IN ACCORDANCE WITH MULTIVARIATE DATA by E. M. Farhadzadeh, A. Z. Muradaliyev, T. K. Rafiyeva, S. A. Abdullayeva

    Published 2017-01-01
    “…The originality of methods consists in application of an fiducial approach. …”
    Get full text
    Article
  20. 1960

    Personalized trajectory privacy preserving method based on graph partition by Jing YANG, Bing ZHANG, Jian-pei ZHANG, Jing XIE

    Published 2015-03-01
    “…Experiment results on synthetic dataset show the effectiveness and reasonableness of proposed method.…”
    Get full text
    Article