Showing 2,141 - 2,160 results of 54,221 for search 'Methil~', query time: 3.96s Refine Results
  1. 2141
  2. 2142
  3. 2143

    Fuzzy Interpolation and Other Interpolation Methods Used in Robot Calibrations by Ying Bai, Nailong Guo, Gerald Agbegha

    Published 2012-01-01
    “…A novel interpolation algorithm, fuzzy interpolation, is presented and compared with other popular interpolation methods widely implemented in industrial robots calibrations and manufacturing applications. …”
    Get full text
    Article
  4. 2144
  5. 2145

    RESEARCH ON ACCELERATED FATIGUE TESTING METHOD OF THE WORM AND GEAR TRANSMISSION by BAI GuoZhen, WANG QiaoRan

    Published 2015-01-01
    “…This paper presented specific calculation method,and analyzed reliability and feasibility of accelerated fatigue of worm and gear.…”
    Get full text
    Article
  6. 2146

    IMPROVED FINITE ELEMENT TRANSFER MATRIX METHOD FOR STRUCTURAL DYNAMICS by LV JianDong, HE Bin, YAO LiKe, FAN QinShan

    Published 2015-01-01
    “…The finite element transfer matrix method provides an efficient means to solve complex engineering problems,the state vector of traditional finite element transfer matrix method usually include linear and angular displacement,resulting in solving the transient dynamic problems has a strong dependence on numerical method. …”
    Get full text
    Article
  7. 2147
  8. 2148

    Coincidence Points of Weaker Contractions in Partially Ordered Metric Spaces by Kuo-Ching Jen, Ing-Jer Lin, Chi-Ming Chen

    Published 2013-01-01
    “…We prove new coincidence point theorems for the -contractions and generalized Meir-Keeler-type --contractions in partially ordered metric spaces. Our results generalize many recent coincidence point theorems in the literature.…”
    Get full text
    Article
  9. 2149

    Automatic method for searching integral distinguishers of ARX block ciphers by Ya HAN, Mingsheng WANG

    Published 2018-05-01
    “…Firstly,based on three subsets division property propagation technique,the propagation function of the K-set and L-set of ARX block ciphers was constructed respectively.All vectors in L-set affected the propagation of K-set when propagate through xored round key operation.With SAT/SMT solver,round reduced integral propagation functions of ARX block ciphers could be established.Finally,by exhausting all possible input integral characteristics with proper data complexity,round reduced integral distinguishers of ARX block ciphers could be found.The proposed method can be used for searching integral distinguishers of ARX block ciphers including SIMON-like family block ciphers,HIGHT,SPECK family block ciphers and LEA effectively.…”
    Get full text
    Article
  10. 2150

    Clustering-based dynamic privacy preserving method for social networks by Yong-hao GU, Jiu-chuan LIN, Da GUO

    Published 2015-11-01
    “…Due to the dynamic characteristics of the social network graph structure,an effective dynamic privacy preserving method was needed.To solve the problems of the existing dynamic privacy preservation methods,such as attacker’s too little background knowledge and the low adaptability to the dynamic characteristics of graph structure,a clustering-based dynamic privacy preservation method was provided.The analysis shows that the proposed method can resist many kinds of background knowledge attacks and has good adaptability to the dynamic characteristics of the social network graph structure.…”
    Get full text
    Article
  11. 2151

    THz-SAR Vibrating Target Imaging via the Bayesian Method by Bin Deng, Xin-yun Wang, Cheng-guang Wu, Yu-liang Qin, Hong-qiang Wang

    Published 2017-01-01
    “…An improved algorithm based on an excellent Bayesian approach, that is, the expansion-compression variance-component (ExCoV) method, has been proposed for reconstructing scattering coefficients of vibrating targets, which provides more robust and efficient initialization and overcomes the deficiencies of sidelobes as well as artifacts arising from the traditional correlation method. …”
    Get full text
    Article
  12. 2152

    GDPR-oriented intelligent checking method of privacy policies compliance by Xin LI, Peng TANG, Xiheng ZHANG, Weidong QIU, Hong HUI

    Published 2023-12-01
    “…The implementation of the EU’s General Data Protection Regulation (GDPR) has resulted in the imposition of over 300 fines since its inception in 2018.These fines include significant penalties for prominent companies like Google, which were penalized for their failure to provide transparent and comprehensible privacy policies.The GDPR, known as the strictest data protection laws in history, has made companies worldwide more cautious when offering cross-border services, particularly to the European Union.The regulation's territorial scope stipulates that it applies to any company providing services to EU citizens, irrespective of their location.This implies that companies worldwide, including domestic enterprises, are required to ensure compliance with GDPR in their privacy policies, especially those involved in international operations.To meet this requirement, an intelligent detection method was introduced.Machine learning and automation technologies were utilized to automatically extract privacy policies from online service companies.The policies were converted into a standardized format with a hierarchical structure.Through natural language processing, the privacy policies were classified, allowing for the identification of relevant GDPR concepts.In addition, a constructed GDPR taxonomy was used in the detection mechanism to identify any missing concepts as required by GDPR.This approach facilitated intelligent detection of GDPR-oriented privacy policy compliance, providing support to domestic enterprises while they provided cross-border services to EU users.Analysis of the corpus samples reveals the current situation that mainstream online service companies generally fail to meet GDPR compliance requirements.…”
    Get full text
    Article
  13. 2153

    Machine Learning Methods for Forecasting Intermittent Tin Ore Production by Nabila Dhia Alifa Rahmah, Budhi Handoko, Anindya Apriliyanti Pravitasari

    Published 2024-10-01
    “…This study's findings show that a serial combination of the Random Forest classification method and CatBoost forecasting can produce accurate tin ore production forecasts for the selected CSD (RMSE = 0.271, MAE = 0.179, MAE = 0.730, F1-score = 0,80). …”
    Get full text
    Article
  14. 2154

    Two Symbol Expansion Methods and Their Application to Reversible Data Hiding by Hyoung Joong Kim, Changhee Kang, Sang-Ug Kang

    Published 2025-01-01
    “…This paper proposes two reversible data hiding methods that utilize symbolization of correlations between adjacent pixels: 1) Haar transform representation and 2) pixel concatenation. …”
    Get full text
    Article
  15. 2155

    Packet Reordering Metrics to Enable Performance Comparison in IP-Networks by Pedro Rodrigues Torres-Jr, Eduardo Parente Ribeiro

    Published 2020-01-01
    “…Despite the existence of several metrics to perform measurements on out-of-order packets, few works have used these metrics for comparative purposes. …”
    Get full text
    Article
  16. 2156
  17. 2157

    Cyclic Mappings and Further Results in B-Metric-Like Spaces by Shengquan Weng, Quanxin Zhu, Baoying Du, Kaibo Shi

    Published 2021-01-01
    “…B-metric-like space is one of the generalized metric spaces; in fact, the research work in B-metric-like spaces is attractive. …”
    Get full text
    Article
  18. 2158

    A Novel Element Detection Method in Audio Sensor Networks by Qi Li, Miao Zhang, Guoai Xu

    Published 2013-02-01
    “…The experiments demonstrate that our proposed method achieves better results compared to the state-of-the-art methods while using smaller online training sets.…”
    Get full text
    Article
  19. 2159
  20. 2160