Showing 2,301 - 2,320 results of 54,221 for search 'Methil~', query time: 3.64s Refine Results
  1. 2301

    Out-of-context misinformation detection method based on stance analysis by YUAN Xin, GUO Jie, QIU Weidong, HUANG Zheng

    Published 2024-04-01
    “…Experimental results indicate that the incorporation of stance analysis significantly enhances the method's detection capabilities. Specifically, the accuracy of this method outperforms the state-of-the-art algorithm that employs Internet evidence for detection by 2.3%.…”
    Get full text
    Article
  2. 2302
  3. 2303

    Research on 5G MEC security assessment system and method by Qiucheng LU, Jinhui TANG, Congying BAO, Hao WU, Yusun FU

    Published 2023-08-01
    “…Multi-access edge computing (MEC) is deployed at the edge of the network, enabling efficient and fast data processing in mobile networks, while also undertaking important security functions, making MEC a prime target for attackers.Therefore, MEC nodes will face huge security risks.How to accurately evaluate and quantify MEC security capabilities is an urgent issue to be solved.For accurately evaluating and quantifying MEC security capabilities, the MEC safety assessment system was proposed in combination with MEC safety risks.The assessment indicators selected in the assessment system comprehensively reflect the basic characteristics of MEC and its complete safety capability.Based on this evaluation system, the MEC security evaluation method was designed by using the analytic hierarchy process (AHP) and fuzzy evaluation, the MEC vulnerability scoring system was creatively proposed, and the evaluation indicators were provided based on the results of MEC vulnerability scoring system, the MEC security capability quantification value was finally calculated.The experimental result proves the effectiveness of the method.…”
    Get full text
    Article
  4. 2304

    Method to improve the performance of network time delay of EPA system by Ning LIU, Chong-quan ZHONG, Yao-yao LIN

    Published 2014-08-01
    “…In order to improve the performance of network-induced time delay of EPA (Ethernet for plant automation) networked control systems, the interacting mechanism between the control and the communication in EPA system was studied and EPA-CS (EPA cooperative scheduling) method was presented. Through setting their mutually cooperative time slices for function blocks that executed the control tasks and data transmission that executed the communication tasks, and through determining the executing time and frequencies of control tasks in their time slices, the method could accomplish the cooperation between control tasks and communication tasks in EPA system. …”
    Get full text
    Article
  5. 2305

    Families of (1,2)-symplectic metrics on full flag manifolds by Marlio Paredes

    Published 2002-01-01
    “…We obtain new families of (1,2)-symplectic invariant metrics on the full complex flag manifolds F(n). For n≥5, we characterize n−3 different n-dimensional families of (1,2)-symplectic invariant metrics on F(n). …”
    Get full text
    Article
  6. 2306

    On Coincidence Theorem in Intuitionistic Fuzzy b-Metric Spaces with Application by Shazia Kanwal, Akbar Azam, Faria Ahmed Shami

    Published 2022-01-01
    “…The concept of intuitionistic fuzzy b-metric spaces (shortly, IFbMS) has been introduced and studied to generalize both the notion of intuitionistic fuzzy metric spaces and fuzzy b-metric spaces. …”
    Get full text
    Article
  7. 2307

    On Convergence of Fixed Points in G-Complete Fuzzy Metric Spaces by Dong Qiu, Shuai Deng

    Published 2014-01-01
    “…We provide some results on the convergence of the sequence of fixed points for some different sequences of contraction mappings or fuzzy metrics in G-complete fuzzy metric spaces with the H-type t-norms. …”
    Get full text
    Article
  8. 2308

    Improvement of N-Acetylcysteine Loaded in PLGA Nanoparticles by Nanoprecipitation Method by Ruth Lancheros, Carlos A. Guerrero, Rubén D. Godoy-Silva

    Published 2018-01-01
    “…The results suggest that besides efficiently entrapping hydrophobic compounds, the nanoprecipitation method also has a high potential as an alternative entrapment method for hydrophilic compounds as well. …”
    Get full text
    Article
  9. 2309

    A Manual of Methods and Procedures for the Regional Waterway Management System by Robert A. Swett, David A. Fann

    Published 2009-07-01
    “…TP-124, a 91-page illustrated manual by Robert Swett and David Fann, details the procedures that are necessary to complete a Regional Waterway Management System for Florida’s coastal canals and other waterways. …”
    Get full text
    Article
  10. 2310

    M-Polynomial and NM-Polynomial Methods for Topological Indices of Polymers by Mohammed Yasin H, M. Suresh, Zebene G. Tefera, Samuel A. Fufa

    Published 2024-01-01
    “…This study addresses the limitations of conventional methods in dealing with dynamic molecular structures, focusing on the neighborhood M-polynomial (NM-polynomial), a pivotal polynomial for calculating degree-based TIs. …”
    Get full text
    Article
  11. 2311
  12. 2312

    Application Study of Sigmoid Regularization Method in Coke Quality Prediction by Shaohong Yan, Hailong Zhao, Liangxu Liu, Qiaozhi Sang, Peng Chen, Jie Li

    Published 2020-01-01
    “…A regularized network training method based on Sigmoid function is designed considering that redundancy of network structure may lead to the learning of undesired noise, in which weights having little impact on performance and leading to overfitting are removed in terms of computational complexity and training errors. …”
    Get full text
    Article
  13. 2313

    Boundedness of Commutators of Marcinkiewicz Integrals on Nonhomogeneous Metric Measure Spaces by Guanghui Lu, Shuangping Tao

    Published 2015-01-01
    “…Let (X,d,μ) be a metric measure space satisfying the upper doubling condition and geometrically doubling condition in the sense of Hytönen. …”
    Get full text
    Article
  14. 2314

    User filtering based campus WLAN user clustering method by Yi-hong QIU, Ting-juan YAO, Feng-lin QIN, Lian-sheng GE

    Published 2014-10-01
    “…With the widespread of smart terminals such as smart phones and smart pads,using MAC address as user identification in campus wireless local area network (WLAN) user clustering research cannot exactly represent user behavior.An user filtering based user clustering is proposed.This method filters users’ behavior data by their degree of activeness,and then further conducts clustering analysis of campus WLAN user behavior.The experimental result verifies the effectiveness of the proposed method.…”
    Get full text
    Article
  15. 2315
  16. 2316

    Hybrid Steepest-Descent Methods for Triple Hierarchical Variational Inequalities by L. C. Ceng, A. Latif, C. F. Wen, A. E. Al-Mazrooei

    Published 2015-01-01
    “…We introduce and analyze a relaxed iterative algorithm by combining Korpelevich’s extragradient method, hybrid steepest-descent method, and Mann’s iteration method. …”
    Get full text
    Article
  17. 2317
  18. 2318

    Different Methods for Measurements and Estimation of Pulse Wave Velocity are not Interchangeable by Vladimir Prelević, Ana Jelaković, Kristina Gašparović, Danira Bažadona, Josipa Josipović, Mia Dubravčić-Došen, Danilo Radunović, Marija Domislović, Bojan Jelaković

    Published 2024-08-01
    “…Arterial stiffness has been measured in the office with SphygmoCor and 24 h with two oscillometric methods (Mobil-O-Graph and Arteriograph). ePWV was calculated using validated equation. …”
    Get full text
    Article
  19. 2319

    Research of the Method of Parameter Identification and Error Compensation of Industrial Robot by Qi Fei, Ping Xueliang, Liu Jie, Jiang Yi

    Published 2015-01-01
    “…Aiming at the lower absolute positioning accuracy of robot,the compensation method of establishing the robot kinematics error model through D- H method is put forward. …”
    Get full text
    Article
  20. 2320

    Evaluation method for network invulnerability based on shortest route number by RAO Yu-ping, LIN Jing-yu, HOU De-ting

    Published 2009-01-01
    “…Fully connecting network has the best invulnerability,and also the shortest route numbers between nodes is important for network invulnerability.Therefore,by calculating shortest route numbers and comparing the topology dif-ference between target network and fully-connecting network,a method based on the shortest route numbers was pro-posed for evaluating network invulnerability.Further more,a method to evaluate node importance was proposed with it.The more the efficient shortest routes between one node and others,the more important the node was.Also,a method for calculating shortest way numbers between nodes was put forward because it is the key to evaluate model that is to calcu-late shortest route numbers.…”
    Get full text
    Article