Showing 2,221 - 2,240 results of 54,221 for search 'Methil~', query time: 4.40s Refine Results
  1. 2221

    Detection and elimination method for deception jamming based on an antenna array by Shuyan Ni, Jianhua Cui, Naiping Cheng, Yurong Liao

    Published 2018-05-01
    “…Considering this, a detection and elimination method for deception jamming is proposed based on a specially designed array for the aircraft. …”
    Get full text
    Article
  2. 2222

    The SSIM index is not a metric and it is badly evaluate the similarity of images by V. V. Starovoitov

    Published 2019-08-01
    “…It acquired the status of an unofficial international standard for assessing image quality in the presence of a template, often referred to as the image quality metric. This article debunks some of the myths that have arisen around this index. …”
    Get full text
    Article
  3. 2223

    Spectral Analysis of Large Finite Element Problems by Optimization Methods by Luca Bergamaschi, Giuseppe Gambolati, Giorgio Pini

    Published 1994-01-01
    “…Recently an efficient method for the solution of the partial symmetric eigenproblem (DACG, deflated-accelerated conjugate gradient) was developed, based on the conjugate gradient (CG) minimization of successive Rayleigh quotients over deflated subspaces of decreasing size. …”
    Get full text
    Article
  4. 2224
  5. 2225

    Interaction based on method for spam detection in online social networks by Kan CHEN, Liang CHEN, Pei-dong ZHU, Yue-shan XIONG

    Published 2015-07-01
    “…In online social networks,advertisements,rumors and malicious links are propagated by spammers arbitrarily.They not only disturb users’usualaccess,but also bring about network security threats and social panics.In an attempt to deal with the spam problems,an information diffusion model was proposed to capture the features of spam propagation.Propagation behaviors are quantitatively analyzed to detect spam messages with a decision tree-based method.The effectiveness of proposed detection model is evaluated with real data from the micro-bloggingnetwork of Sina.The experimental results show that proposed model can effectively detect spams in Sina micro-bloggingnetwork.…”
    Get full text
    Article
  6. 2226

    Hypernetwork link prediction method based on the SCL-CMM model by REN Yuyuan, MA Hong, LIU Shuxin, WANG Kai

    Published 2024-06-01
    “…An effective method for the internal interaction within modeling reality systems is provided by graphs; however, they have been unable to effectively display and capture the high-order heterogeneity that widely exists between multiple entities. …”
    Get full text
    Article
  7. 2227

    Computational Method for Global Sensitivity Analysis of Reactor Neutronic Parameters by Bolade A. Adetula, Pavel M. Bokov

    Published 2012-01-01
    “…The method is illustrated and tested on a two-group cross-section dependent problem. …”
    Get full text
    Article
  8. 2228

    Nonuniformity Correction Method of Infrared Detector Based on Statistical Properties by Li Dandan, Ding Xiang, Chai Mengyang, Ma Chao, Sun Dexin

    Published 2024-01-01
    “…Experiments on simulated noisy and real images show that our method accurately eliminates nonuniform IR noise without causing blurring and provides optimal peak signal-to-noise ratio and structural similarity.…”
    Get full text
    Article
  9. 2229

    Research Progress on High-Intermediate Frequency Extension Methods of SEA by Jintao Su, Ling Zheng, Zhaoxiang Deng, Yuhan Jiang

    Published 2019-01-01
    “…To improve the basic theory of SEA and knowledge of intermediate frequency extension methods, as well as attract the attention of domestic scholars, this paper describes classical SEA and intermediate frequency extension methods. …”
    Get full text
    Article
  10. 2230
  11. 2231
  12. 2232
  13. 2233

    Malnutrition in Chronic Pancreatitis: Causes, Assessment Methods, and Therapeutic Management by Agnieszka Madro

    Published 2020-01-01
    “…The aim of this review paper is recognized if we can improve the nutritional status of patients with CP. Methods. This paper is based on systematic literature review according to the PubMed. …”
    Get full text
    Article
  14. 2234

    An optimized method for counting viral particles using electron microscopy by B. N. Zaitsev, O. S. Taranov, N. B. Rudometova, N. S. Shcherbakova, A. A. Ilyichev, L. I. Karpenko

    Published 2019-05-01
    “…The method includes a concentration of viral particles on the polyethersulfone membrane applied in centrifugal concentrators and subsequent calculation using an electron microscope. …”
    Get full text
    Article
  15. 2235
  16. 2236

    Metrics for Evaluating Telemedicine in Randomized Controlled Trials: Scoping Review by Yuka Sugawara, Yosuke Hirakawa, Masao Iwagami, Ryota Inokuchi, Rie Wakimizu, Masaomi Nangaku

    Published 2025-01-01
    “…Furthermore, the specific metrics that can be used as cross-disciplinary indicators when comparing telemedicine and face-to-face care also remain undefined. …”
    Get full text
    Article
  17. 2237

    An Efficiency Control Method Based on SFSM for Massive Crowd Rendering by Lei Lyu, Jinling Zhang, Meilin Fan

    Published 2018-01-01
    “…This paper proposes a method of efficiency control for massive crowd rendering. …”
    Get full text
    Article
  18. 2238

    LDoS attack detection method based on simple statistical features by Xueyuan DUAN, Yu FU, Kun WANG, Bin LI

    Published 2022-11-01
    “…Traditional low-rate denial of service (LDoS) attack detection methods were complex in feature extraction, high in computational cost, single in experimental data background settings, and outdated in attack scenarios, so it was difficult to meet the demand for LDoS attack detection in a real network environment.By studying the principle of LDoS attack and analyzing the features of LDoS attack traffic, a detection method of LDoS attack based on simple statistical features of network traffic was proposed.By using the simple statistical features of network traffic packets, the detection data sequence was constructed, the time correlation features of input samples were extracted by deep learning technology, and the LDoS attack judgment was made according to the difference between the reconstructed sequence and the original input sequence.Experimental results show that the proposed method can effectively detect the LDoS attack traffic in traffic and has strong adaptability to heterogeneous network traffic.…”
    Get full text
    Article
  19. 2239

    Fault Diagnosis Method of Gear based on Adaptive Demodulated Resonance by Lian Peng, Yang Jianwei, Yao Dechen

    Published 2018-01-01
    “…Firstly,the original signal is decomposed into several IMFs,and the signal is reconstructed by using the correlation coefficient method to highlight the fault characteristic signal. …”
    Get full text
    Article
  20. 2240

    An Energy-Domain IR NUC Method Based on Unsupervised Learning by Ting Li, Xuefeng Lai, Sheng Liao, Yucheng Xia

    Published 2025-01-01
    “…To obtain accurate blackbody temperature, emissivity, and waveband measurements, an energy-domain infrared nonuniformity method based on unsupervised learning is proposed. …”
    Get full text
    Article