Showing 2,181 - 2,200 results of 54,221 for search 'Methil~', query time: 4.68s Refine Results
  1. 2181

    Method to generate attack graphs for assessing the overall security of networks by MAN Da-peng1, ZHOU Yuan2, YANG Wu1, YANG Yong-tian1

    Published 2009-01-01
    “…In order to evaluate the overall security of networks, a new method for generating attack graphs was proposed.The method used breadth-first algorithm to search the dependence of network vulnerabilities.To solve the state explosion problem, the strategies that limited the number of attack steps and the reachability of state nodes were adopted in gener-ating attack graphs.The experimental results show that the generated attack graphs can help security administrators to evaluate the overall security of networks, and the adopted optimization strategies are effective to remove redundant edges and nodes in attack graphs and decrease the system overhead during generating attack graphs.…”
    Get full text
    Article
  2. 2182

    Exact Group Sequential Methods for Estimating a Binomial Proportion by Zhengjia Chen, Xinjia Chen

    Published 2013-01-01
    “…We first review existing sequential methods for estimating a binomial proportion. Afterward, we propose a new family of group sequential sampling schemes for estimating a binomial proportion with prescribed margin of error and confidence level. …”
    Get full text
    Article
  3. 2183
  4. 2184
  5. 2185

    Adaptive user behavior's evaluation method based on network status by You LU, Jun-zhou LUO, Wei LI, Feng YU, Nu XIA

    Published 2013-07-01
    “…This method can construct and dynamically adjust the evaluation indexes and their weight adaptive the actual data. …”
    Get full text
    Article
  6. 2186

    On iterative solution of nonlinear functional equations in a metric space by Rabindranath Sen, Sulekha Mukherjee

    Published 1983-01-01
    “…Given that A and P as nonlinear onto and into self-mappings of a complete metric space R, we offer here a constructive proof of the existence of the unique solution of the operator equation Au=Pu, where u∈R, by considering the iterative sequence Aun+1=Pun (u0 prechosen, n=0,1,2,…). …”
    Get full text
    Article
  7. 2187

    A NEW FAILURE PROBABILITY COMPUTING METHOD FOR MECHANICAL COMPONENTS by ZHANG YanFang, ZHANG YanLin

    Published 2020-01-01
    “…Based on univariate dimension reduction method( UDRM),edgeworth series and the relation of statistical moment,a method for calculation of failure probability of mechanical components is proposed. …”
    Get full text
    Article
  8. 2188
  9. 2189

    ANALYZING THE CRITERIA AFFECTING TRANSITION TO AIRPLANE BY COMPARING DIFFERENT METHODS by Dilaver Tengilimoğlu, İzay Reyhanoğlu

    Published 2022-07-01
    “…This study is important since it compares three different methods for the purpose of criteria determination concerning the choice of transportation modes.…”
    Get full text
    Article
  10. 2190

    Research on networking troubleshooting method based on software defined network by Jia-wei LI, Zhi-ju YANG, Xi-jun LIN, UHai-peng Q

    Published 2016-12-01
    “…Based on the reaserch status of networking troubleshooting in software defined network,a new net-working troubleshooting method was proposed.A TCP packet marked in head field was sent and detailed forward information in every hop would be written in its data filed once the test packet was matched.Taking advantages of the programmable feature of the controller and OpenFlow extensible match,special flow table was designed for matching test-used packet.The analysis module extracted and split the forward information,and thus printed the suspicious network problem which can be used to track and located the problematic network node.The experiment results indicate that the proposed method is fairy efficient.…”
    Get full text
    Article
  11. 2191

    Method for Monitoring the Stator Core of a Powerful Turbo Generator by A. S. Levitskyi, Ie. O Zaitsev, M. V. Panchik

    Published 2021-07-01
    “…The article is devoted to the development of an automatic method and device for monitoring the pressing of the stator core of a powerful turbo generator during its assembling at the manufacturer. …”
    Get full text
    Article
  12. 2192

    Padé-Sumudu-Adomian Decomposition Method for Nonlinear Schrödinger Equation by Metomou Richard, Weidong Zhao

    Published 2021-01-01
    “…The main purpose of this paper is to solve the nonlinear Schrödinger equation using some suitable analytical and numerical methods such as Sumudu transform, Adomian Decomposition Method (ADM), and Padé approximation technique. …”
    Get full text
    Article
  13. 2193
  14. 2194

    The Referenced Vertex Ordering Problem: Theory, Applications, and Solution Methods by Omer, Jérémy, Mucherino, Antonio

    Published 2021-08-01
    “…Our branch-and-bound outperforms other existing solution methods: among 180 instances with 60 vertices, it solves 179 instances to optimality whereas the best existing method is only able to solve 109 of them. …”
    Get full text
    Article
  15. 2195
  16. 2196

    Wardowski Type Contractions and the Fixed-Circle Problem on S-Metric Spaces by Nabil Mlaiki, Ufuk Çelik, Nihal Taş, Nihal Yilmaz Özgür, Aiman Mukheimer

    Published 2018-01-01
    “…In this paper, we present new fixed-circle theorems for self-mappings on an S-metric space using some Wardowski type contractions, ψ-contractive, and weakly ψ-contractive self-mappings. …”
    Get full text
    Article
  17. 2197

    Action recognition method based on fusion of skeleton and apparent features by Hongyan WANG, Hai YUAN

    Published 2022-01-01
    “…Focusing on the issue that traditional skeletal feature-based action recognition algorithms were not easy to distinguish similar actions, an action recognition method based on the fusion of deep joints and manual apparent features was considered.The joint spatial position and constraints was firstly input into the long short-term memory (LSTM) model equipped with spatio-temporal attention mechanism to acquire spatio-temporal weighted and highly separable deep joint features.After that, heat maps were introduced to locate the key frames and joints, and manually extract the apparent features around the key joints that could be considered as an effective complement to the deep joint features.Finally, the apparent features and the deep skeleton features could be fused frame by frame to achieve effectively discriminating similar actions.Simulation results show that, compared with the state-of-the-art action recognition methods, the proposed method can distinguish similar actions effectively and then the accuracy of action recognition is promoted rather obviously.…”
    Get full text
    Article
  18. 2198
  19. 2199
  20. 2200