Showing 2,361 - 2,380 results of 54,221 for search 'Methil~', query time: 3.67s Refine Results
  1. 2361

    Integrated Study of the Dinitrobenzene Electroreduction Mechanism by Electroanalytical and Computational Methods by Andrey S. Mendkovich, Mikhail A. Syroeshkin, Ludmila V. Mikhalchenko, Mikhail N. Mikhailov, Alexander I. Rusakov, Vadim P. Gul'tyai

    Published 2011-01-01
    “…Electroreduction of 1,2-, 1,3-, and 1,4-dinitrobenzenes in DMF has been investigated by a set of experimental (cyclic voltammetry, chronoamperometry, and controlled potential electrolysis) and theoretical methods (digital simulation and quantum chemical calculations). …”
    Get full text
    Article
  2. 2362

    Methods of Control of the Leishmania infantum Dog Reservoir: State of the Art by Michele Podaliri Vulpiani, Luigi Iannetti, Daniela Paganico, Filomena Iannino, Nicola Ferri

    Published 2011-01-01
    “…The real efficacy of seropositive dogs culling as a direct control method is still debated, and the new sensitivity of large part of population considers ethically unacceptable this kind of approach. …”
    Get full text
    Article
  3. 2363

    Structure Preprocessing Method for the System of Unclosed Linear Algebraic Equations by Ling Li, Yongxian Li

    Published 2022-01-01
    “…The complexity of open linear algebraic equations makes it difficult to obtain analytical solutions, and preprocessing techniques can be applied to coefficient matrices, which has become an effective method to accelerate the convergence of iterative methods. …”
    Get full text
    Article
  4. 2364

    FOREIGN FORMS, METHODS AND TOOLS OF REORGANIZATION OF A CREDIT INSTITUTION by Z. Patladze

    Published 2016-02-01
    “…In the article on the example of the United States of America, The United Kingdom of Great Britain and Northern Ireland, France and Germany, are considered foreign forms, methods and tools for the reorganization of a credit institution, draws conclusions about the possibility of using the experience of these countries in the Russian Federation.…”
    Get full text
    Article
  5. 2365
  6. 2366
  7. 2367
  8. 2368

    Solution to an Optimal Control Problem via Canonical Dual Method by Jinghao Zhu, Jiani Zhou

    Published 2009-01-01
    “…The analytic solution to an optimal control problem is investigated using the canonical dual method. By means of the Pontryagin principle and a transformation of the cost functional, the optimal control of a nonconvex problem is obtained. …”
    Get full text
    Article
  9. 2369

    Object detection and tracking in video sequences: formalization, metrics and results by R. P. Bohush, S. V. Ablameyko

    Published 2021-03-01
    “…Based on the considered generalization, an algorithm for tracking people has been developed that uses the tracking through detection method and convolutional neural networks to detect people and form features. …”
    Get full text
    Article
  10. 2370

    Analysis and avoidance method of 5G atmospheric duct interference by Tinglan WANG, Xingzheng LI, Yimin ZUO, Dongchen ZHANG

    Published 2022-04-01
    “…Atmospheric duct effects can produce the remote interference, which will lead to serious problems of the network degradation.Firstly, a detailed analysis of the causes of 5G atmospheric duct interference was achieved through the system principle analysis.Then, a 5G atmospheric duct interference waveform identification algorithm was proposed.Finally, from the aspects of time domain, frequency, air domain, parameter configuration, etc., the avoidance and adjustment method of atmospheric duct interfered cells was proposed.The impact of the atmospheric duct interference is reduced and the quality of 5G networks is ensures.…”
    Get full text
    Article
  11. 2371

    Data hiding method based on color table expansion technique by FEI Ru-chun1, WANG Li-na1, ZHANG Huan-guo1

    Published 2009-01-01
    “…Based on color table expansion technique for indexed images,a data hiding method was proposed,and the se-curity and the hiding capacity were analyzed.The analysis results show that this method has very strong security and very high hiding capacity.Secret data can be hidden in an indexed cover image to generate a stego-image with the same visual effect as the cover image and resumed without distortion from the stego-image if the correct key is used.In addition,the statistical feature of the secret data is completely covered up by using random data,so the stego-image is statistically in-dependent of the secret data.…”
    Get full text
    Article
  12. 2372

    Waste cooking oil pretreatment using microwave and ultrasound methods by Kerras, Halima, Outili, Nawel, Meniai, Abdeslam-Hassen

    Published 2023-06-01
    “…Results showed that the pretreatment methods led to good results where the best biodiesel yield was 98%, obtained with US pretreatment, while MW led to a yield of 96%. …”
    Get full text
    Article
  13. 2373
  14. 2374
  15. 2375
  16. 2376

    The Applicable Dental Age Estimation Methods for Children and Adolescents in Indonesia by Arofi Kurniawan, An’nisaa Chusida, Nur Atika, Tito Krisna Gianosa, Mohammad Denis Solikhin, Mieke Sylvia Margaretha, Haryono Utomo, Maria Istiqomah Marini, Beta Novia Rizky, Beshlina Fitri Widayanti Roosyanto Prakoeswa, Aspalilah Alias, Anand Marya

    Published 2022-01-01
    “…On reviewing these articles, it was found that the Demirjian method, the Willems method, and the Al Qahtani method are useful in this population with higher accuracy than other methods.…”
    Get full text
    Article
  17. 2377

    Optimal Imputation Methods under Stratified Ranked Set Sampling by Shashi Bhushan, Anoop Kumar

    Published 2025-02-01
    “…This paper is fundamental effort to suggest some combined and separate imputation methods in presence of missing data under SRSS. It has been shown that the proposed imputation methods become superior than the mean imputation method, ratio imputation method, Diana and Perri (2010) type imputation method and Sohail et al. (2018) type imputation methods. …”
    Get full text
    Article
  18. 2378

    CAPTCHA as a Visual Performance Metric in Active Macular Disease by Gautam Vangipuram, Aaron Y. Lee, Kasra A. Rezaei, Lisa C. Olmos De Koo, Yewlin E. Chee, Jennifer R. Chao, Catherine Egan, Cecilia S. Lee

    Published 2019-01-01
    “…As visual function is not well measured by Snellen visual acuity (VA) alone, we theorized that CAPTCHA performance may provide additional information on macular disease-related visual dysfunction. Methods. This was designed as a pilot study. Active disease was defined as the presence of either intraretinal fluid (IRF) or subretinal fluid (SRF) on spectral-domain optical coherence tomography. …”
    Get full text
    Article
  19. 2379
  20. 2380

    Virtual machine co-residency method on cloud computing platform by Weijie LIU, Li’na WANG, Danlei WANG, Zhengguang YIN, Nan FU

    Published 2018-11-01
    “…If the attacker wants to compromise a target virtual machine on a cloud platform,the malicious virtual machine must be co-resident with the target.Based on this,a virtual machine co-residency method was proposed.The method combined a co-residency detection scheme based on covert channel construction and an automatic virtual machine flooding strategy,and was evaluated on a well-known domestic cloud platform.Experiment shows that the adaptive covert channel can achieve accuracies of 95%,the proposed detection scheme has strong robustness whose false positive rate is less than 5 ‰,the proposed method is versatile and keeps the virtualization isolation barrier intact,which has great potential threat and should be paid great attention and precaution.…”
    Get full text
    Article