Showing 2,061 - 2,080 results of 54,221 for search 'Methil~', query time: 4.12s Refine Results
  1. 2061

    Diversity Perceptions in the UK Retail Industry: A Case of Tesco by Walid Ahmed, Asim Majeed, Ayesha Asim

    Published 2023-03-01
    “…It can be argued that with exponential technological changes like the emergence of artificial intelligence, machine learning, the internet of things (IoT), etc. retailers around the world are facing continuous challenges in keeping their business model updated and relevant for sustainable business growth and profitability. …”
    Get full text
    Article
  2. 2062

    Research Progress in Methods to Estimate High-resolution Direction of Arrival by Wei ZHAO, Xuan LI, Chengpeng HAO

    Published 2024-12-01
    “…Then, it analyzes the reasons for the limited resolution of traditional beamforming-based methods and discusses higher-resolution methods such as adaptive beamforming direction spectrum, subspace methods, and compressed sensing. …”
    Get full text
    Article
  3. 2063

    The design of experiments for the transcriptome studies by high-throughput sequencing methods by P. N. Menshanov, N. N. Dygalo

    Published 2016-05-01
    “…The common questions in the design of the highthroughput sequencing experiments using RNA-Seq or Ribo-Seq methods are reviewed. The ENCODE guidelines (2011) as well as the recently published advances in the design of the studies of mammalian, animal and plant transcriptomes are also summarized in this review. …”
    Get full text
    Article
  4. 2064

    Approximation for Transient of Nonlinear Circuits Using RHPM and BPES Methods by H. Vazquez-Leal, K. Boubaker, L. Hernandez-Martinez, J. Huerta-Chua

    Published 2013-01-01
    “…Therefore, in this paper, rational homotopy perturbation method and Boubaker Polynomials Expansion Scheme are applied to a differential equation from a nonlinear circuit. …”
    Get full text
    Article
  5. 2065

    Approximate Method for Solving the Linear Fuzzy Delay Differential Equations by S. Narayanamoorthy, T. L. Yookesh

    Published 2015-01-01
    “…The detailed algorithm of the approach is provided. The approximate solution is compared with the exact solution to confirm the validity and efficiency of the method to handle linear fuzzy delay differential equation. …”
    Get full text
    Article
  6. 2066

    Routing control method of hot standby BRAS in IP MAN by Huanyi WANG, Guofu XIANG

    Published 2016-01-01
    “…With the implementation of“Broadband China”strategy,IP services become more and more diversified,the demand for all kinds of security is also increasing.The key technology of BRAS hot backup and its realization method were introduced,realizing the seamless handover between primary and standby BRAS and effectively controlled the route range in BRAS.The routing was optimized to reduce traffic between interconnect circuits of primary and backup BRAS to improve the utilization efficiency of the circuit.…”
    Get full text
    Article
  7. 2067

    Novel topic detection method for microblog based on SVM filtration by Jun-xia CHENG, Zhi-tang LI, Ming-guang ZOU, Jin XIAO

    Published 2013-09-01
    “…A detection method based on SVM filtration was proposed.The method uses text feature as imported vectors to filtrate microblog news,reducing the amount of calculation greatly.A single-pass clustering algorithm based on the improvement of high-frequency words sorting was proposed,which can detect isolated points commendably.Experimental results show that the method can detect news topics from massive microblog data efficiently.…”
    Get full text
    Article
  8. 2068

    Fast and Sensitive Method for Determination of Domoic Acid in Mussel Tissue by Elena Barbaro, Roberta Zangrando, Carlo Barbante, Andrea Gambaro

    Published 2016-01-01
    “…In this work, we propose a very simple and fast analytical method to determine DA in mussel tissue. The method consists of two consecutive extractions and requires no purification steps, due to a reduction of the extraction of the interfering species and the application of very sensitive and selective HILIC-MS/MS method. …”
    Get full text
    Article
  9. 2069

    Covert Channel Construction Method Based on HTTP Composite Protocols by Longxing Jin, Zijun Liu, Fuquan Huang, Zizhao Lin, Ming Li

    Published 2022-01-01
    “…Experimental results show that this method can resist the detection method based on application signature, protocol fingerprint detection method, and combination model detection method, and has strong concealment. …”
    Get full text
    Article
  10. 2070

    Recent trends in user studies: action research and qualitative methods by T.D. Wilson

    Published 1998-01-01
    “…</i> It attempted to set out what was, for the time, a novel perspective on appropriate methodologies for the study of human information seeking behaviour, focusing on qualitative methods and action research, arguing that the application of information research depended up its adoption into the managerial processes of organizations, rather than its self-evident relationship to any body of theory.…”
    Get full text
    Article
  11. 2071

    A Reliable Method for Identification of Antibiotics by Terahertz Spectroscopy and SVM by Jin Guo, Hu Deng, Quancheng Liu, Linyu Chen, Zhonggang Xiong, Liping Shang

    Published 2020-01-01
    “…However, conventional antibiotic identification methods have a low sensitivity and a long detection time. …”
    Get full text
    Article
  12. 2072

    Using artificial intelligence methods for the optimal synthesis of reversible networks by Taras Kyryliuk, Mykhailo Palahuta, Vitaly Deibuk

    Published 2024-11-01
    “…The study focuses on the application of evolutionary artificial intelligence algorithms, specifically genetic algorithms and ant colony optimization algorithms, for the optimal synthesis of reversible circuits. As a result, a detailed description of the key concepts of the improved algorithms, simulation results, and comparison of the two methods is provided. …”
    Get full text
    Article
  13. 2073

    Polynomial estimation method for PN sequence based on reliability accumulation by Song CHEN, Kai-zhi HUANG, Hua ZHAO

    Published 2012-09-01
    “…The issues of insufficient efficiency and poor error-tolerance of current high-order polynomial estimation me-thods under error conditions were studied.By combining the iterative berlekamp-massey(BM)algorithm in GF(2)and the improved Chase algorithm,a novel algorithm based on reliability accumulation was proposed.The sequence soft infor-mation was mapped to sequence reliability as the input information of BM algorithm,and the corresponding output relia-bility of estimated polynomial was accumulated as the rule of correct polynomial.In order to improve the estimation pre-cision,the candidate reliability-accumulated polynomial set were reduced by the characteristics of primitive polynomial in GF(2).The simulation results show that the proposed method is irrelevant with the tapped number of ator poly-nomial,and has a good estimation performance to estimate 17-order polynomials when the sequence BER is 18%.…”
    Get full text
    Article
  14. 2074
  15. 2075

    The Circle Pure Rolling Method for Point Cloud Boundary Extraction by Quanou Yang, Zhihui Li, Zhihui Liu, Xinyu Jiang, Xinglong Gao

    Published 2024-12-01
    “…We introduce a circle rolling method (CRM) for boundary extraction from 2D point clouds. …”
    Get full text
    Article
  16. 2076

    Review on the Method of Compensation Benefit Allocation for Cascade Hydropower Stations by LI Yinghai, WANG Li, LI Qingqing, XIA Qingqing

    Published 2020-01-01
    “…Under the model of cascade rolling development,there are significant compensation benefits in the joint operation of cascade hydropower stations.Scientific and reasonable allocation of compensation benefits becomes the key point to realize joint optimal operation of cascade hydropower stations.This paper first expounds the present situation and existing risk in cascade hydropower station operation management,specifies the compensation benefit types and principles for compensation benefit allocation,summarizes and analyzes the main methods and application examples of compensation benefit allocation of cascade hydropower stations,discusses the applicable conditions and advantages and disadvantages of various methods,analyzes the shortcomings in application examples through existing research,finally proposes the future research direction for allocation of compensation benefits of cascade hydropower stations,so as to provide the reference for sustainable development and utilization of river basin water resources.…”
    Get full text
    Article
  17. 2077
  18. 2078
  19. 2079

    Efficient segment pattern based method for malicious URL detection by Hai-lun LIN, Yan LI, Wei-ping WANG, Yin-liang YUE, Zheng LIN

    Published 2015-11-01
    “…An efficient segment based method for detecting malicious URL was proposed.Firstly it analyzed the annotated malicious URLs in terms of three semantic segments,i.e.…”
    Get full text
    Article
  20. 2080

    Two-Stage Optimization Method for the Bearing Layout of Isolated Structure by Yu Dang, GenXiong Zhao, HongTu Tian, Guobao Li

    Published 2021-01-01
    “…An integer programming method is adopted to optimize the number of each type of isolator. …”
    Get full text
    Article