Showing 2,161 - 2,180 results of 54,221 for search 'Methil~', query time: 4.16s Refine Results
  1. 2161
  2. 2162

    Valuing the Recreation Uses of Natural Resources: The Travel Cost Method by Elizabeth F. Pienaar

    Published 2014-03-01
    “…WEC341/UW386: Valuing the Recreation Uses of Natural Resources: The Travel Cost Method (ufl.edu) …”
    Get full text
    Article
  3. 2163
  4. 2164
  5. 2165
  6. 2166
  7. 2167

    Some New Variants of Cauchy's Methods for Solving Nonlinear Equations by Tianbao Liu, Hengyan Li

    Published 2012-01-01
    “…The convergence analysis of the methods is discussed. It is established that the methods have convergence order three. …”
    Get full text
    Article
  8. 2168
  9. 2169
  10. 2170

    Experimental Results of Electron Method for Remote Spacecraft Charge Sensing by M. T. Bengtson, K. T. Wilson, H. Schaub

    Published 2020-03-01
    “…Specifically, the feasibility and accuracy of the electron method is considered for different materials, charge scenarios, and relative geometries. …”
    Get full text
    Article
  11. 2171

    A Population-Based Optimization Method Using Newton Fractal by Soyeong Jeong, Pilwon Kim

    Published 2019-01-01
    “…We propose a deterministic population-based method for a global optimization, a Newton particle optimizer (NPO). …”
    Get full text
    Article
  12. 2172
  13. 2173

    Part-Metric and Its Applications to Cyclic Discrete Dynamic Systems by Wanping Liu, Xiaofan Yang, Stevo Stević, Bratislav Iricanin

    Published 2011-01-01
    “…We adapt the part metric and use it in studying positive solutions of a certain family of discrete dynamic systems. …”
    Get full text
    Article
  14. 2174

    Rolling Bearing Fault Diagnosis Method Based on MCMF and SAIMFE by Dejun Meng, Changyun. Miao, Xianguo Li, Jia Shi, Yi Liu, Jie Li

    Published 2022-01-01
    “…Third, some experiments are completed to demonstrate the effectiveness and superiority of the proposed method. The experimental results show that the proposed method not only has high diagnosis accuracy but also less dependent on the diagnosis model.…”
    Get full text
    Article
  15. 2175

    Method to generate cyber deception traffic based on adversarial sample by Yongjin HU, Yuanbo GUO, Jun MA, Han ZHANG, Xiuqing MAO

    Published 2020-09-01
    “…In order to prevent attacker traffic classification attacks,a method for generating deception traffic based on adversarial samples from the perspective of the defender was proposed.By adding perturbation to the normal network traffic,an adversarial sample of deception traffic was formed,so that an attacker could make a misclassification when implementing a traffic analysis attack based on a deep learning model,achieving deception effect by causing the attacker to consume time and energy.Several different methods for crafting perturbation were used to generate adversarial samples of deception traffic,and the LeNet-5 deep convolutional neural network was selected as a traffic classification model for attackers to deceive.The effectiveness of the proposed method is verified by experiments,which provides a new method for network traffic obfuscation and deception.…”
    Get full text
    Article
  16. 2176

    Liquid Chromatographic Method for Determination of Nisoldipine from Pharmaceutical Samples by Amit Gupta, Ram S. Gaud, S. Ganga

    Published 2010-01-01
    “…The method uses aluminum plates pre-coated with silica gel 60F-254 as stationary phase and cyclohexane-ethyl acetate-toluene (3:3:4, v/v/v) as mobile phase. …”
    Get full text
    Article
  17. 2177

    SDN based e-mail repudiation source restraining method by Zhi-geng HAN, Xia FENG, Geng CHEN

    Published 2016-09-01
    “…With the limitation of controllability of the existing Internet architecture,the existing secure e-mail technology such as certified e-mail can only post detection but cannot source restraining on e-mail repudiation.Based on the idea of control and data separation of software-defined networking technology,by means of bypass attaching customized repudiation restrain unit to the traditional e-mail model.An e-mail repudiation source restraining method was proposed without destroying the existing e-mail structure.After presenting e-mail evidence binding protocol,repudiation behavior detection algorithm,certified reputation evaluation model,and repudiation restraining strategy formation algorithm embedded in repudiation restrain unit,the effectiveness were tested of the proposed method in 4 cross scenarios.The experimental results show that,under the premise of compatibility with the current e-mail system,the method can source restrain e-mail repudiation effectively.…”
    Get full text
    Article
  18. 2178

    Recent methods for the diagnosis and differentiation of ameloblastoma: a narrative review by Ke Hu, Xudong Zhang, Ruixue Chen, Xiangjun Li

    Published 2024-12-01
    “…This review summarises the diagnostic techniques used for the detection of ameloblastoma and the methods for differentiating it from other benign odontogenic tumours to aid in the clinical diagnosis. …”
    Get full text
    Article
  19. 2179

    A Vortex Identification Method Based on Extreme Learning Machine by Jun Wang, Lei Guo, Yueqing Wang, Liang Deng, Fang Wang, Tong Li

    Published 2020-01-01
    “…Global vortex identification methods are of high computational complexity and time-consuming. …”
    Get full text
    Article
  20. 2180

    Uncertainty-Aware Semi-Supervised Method for Pectoral Muscle Segmentation by Yutao Tang, Yongze Guo, Huayu Wang, Ting Song, Yao Lu

    Published 2025-01-01
    “…The experimental results show that our method generalizes well to the test set and outperforms other methods in all evaluation metrics.…”
    Get full text
    Article