Showing 2,521 - 2,540 results of 54,221 for search 'Methil~', query time: 4.39s Refine Results
  1. 2521

    The cover of randomness: validating implicit methods for the study of sensitive topics by Charles Efferson, Sonja Vogt

    Published 2025-01-01
    “…We review the methods we developed to study female genital cutting in Sudan and sex-selective abortion in Armenia. …”
    Get full text
    Article
  2. 2522
  3. 2523

    Intelligent methods for natural data analysis: application to space weather by O.V. Mandrikova

    Published 2024-02-01
    Subjects: “…data analysis methods…”
    Get full text
    Article
  4. 2524

    Restrictive metric regularity and generalized differential calculus in Banach spaces by Boris S. Mordukhovich, Bingwu Wang

    Published 2004-01-01
    “…We consider nonlinear mappings f:X→Y between Banach spaces and study the notion of restrictive metric regularity of f around some point x¯, that is, metric regularity of f from X into the metric space E=f(X). …”
    Get full text
    Article
  5. 2525

    5G millimeter wave UE test method and analysis by Jian GONG, Yu ZHANG

    Published 2023-02-01
    “…In the 5G millimeter wave UE OTA RF conformance test, EIRP and TRP type of tests are important OTA items.Currently, this method relying on 3GPP-defined random scan to lock the beam to determine the maximum EIRP and TRP, but this method is time-consuming and lacks accuracy.A non-signaling test method was proposed, which could not only achieve more accurate measurements compared with the current EIRP and TRP test methods but also make it possible to use the non-directional OTA site as the measurement environment, further reducing the test cost and time cost, and increasing the flexibility of the test environment selection.…”
    Get full text
    Article
  6. 2526
  7. 2527

    Hybrid Topological Derivative-Gradient Based Methods for Nondestructive Testing by A. Carpio, M.-L. Rapún

    Published 2013-01-01
    “…This paper is devoted to the reconstruction of objects buried in a medium and their material properties by hybrid topological derivative-gradient based methods. After illustrating the techniques in time-harmonic acoustic problems with different boundary conditions and in electrical impedance tomography problems with continuous Neumann conditions, we extend the hybrid method for a realistic model in tomography where the boundary conditions are given at a discrete set of electrodes.…”
    Get full text
    Article
  8. 2528
  9. 2529
  10. 2530
  11. 2531

    Analytical Method Development and Validation of Exemestane Tablet by UV Spectrophotometry by S. Angalaparameswari, V. S. Thiruvengadarajan, N. Amruth Kumar, M. Kutumbarao, S. Ramkanth, C. Madhusudhanachetty

    Published 2012-01-01
    “…The present research work discusses the development and validation of a UV spectrophotometric method for Exemestane. Simple, accurate and cost efficient spectrophotometric method has been developed for the estimation of Exemestane in Tablet dosage form. …”
    Get full text
    Article
  12. 2532

    Characterization of the Strong Metric Subregularity of the Mordukhovich Subdifferential on Asplund Spaces by J. J. Wang, W. Song

    Published 2014-01-01
    “…We mainly present several equivalent characterizations of the strong metric subregularity of the Mordukhovich subdifferential for an extended-real-valued lower semicontinuous, prox-regular, and subdifferentially continuous function acting on an Asplund space.…”
    Get full text
    Article
  13. 2533
  14. 2534

    A secure method of voting and planning based on quadratic voting by Hamid Devisti, Massoud Hadian Dehkordi

    Published 2025-02-01
    “…Little research has been done on the safe implementation of this method. In this paper, we first present a voting method based on $QV$. …”
    Get full text
    Article
  15. 2535
  16. 2536

    Android malware detection method based on deep neural network by Fan CHAO, Zhi YANG, Xuehui DU, Yan SUN

    Published 2020-10-01
    “…Android is increasingly facing the threat of malware attacks.It is difficult to effectively detect large-sample and multi-class malware for traditional machine learning methods such as support vector machine,method for Android malware detection and family classification based on deep neural network was proposed.Based on the comprehensive extraction of application components,Intent Filter,permissions,and data flow,the method performed an effective feature selection to reduce dimensions,and conducted a large-sample detection and multi-class classification for malware based on deep neural network.The experimental results show that the method can conduct an effective detection and classification.The accuracy of binary classification between benign and malicious Apps is 97.73%,and the accuracy of family multi-class classification can reach 93.54%,which is higher than other machine learning algorithms.…”
    Get full text
    Article
  17. 2537
  18. 2538

    A New Method for Predicting the Permeability of Sandstone in Deep Reservoirs by Feisheng Feng, Pan Wang, Zhen Wei, Guanghui Jiang, Dongjing Xu, Jiqiang Zhang, Jing Zhang

    Published 2020-01-01
    “…Capillary pressure curve data measured through the mercury injection method can accurately reflect the pore throat characteristics of reservoir rock; in this study, a new methodology is proposed to solve the aforementioned problem by virtue of the support vector regression tool and two improved models according to Swanson and capillary parachor parameters. …”
    Get full text
    Article
  19. 2539

    New construction method of periodic quasi-complementary sequence set by Xiaoyu CHEN, Chengrui WANG, Fan LIU

    Published 2023-05-01
    “…--math xmlns="http://www.w3.org/1998/Math/MathML"> <msub> <mi>&#x2124;</mi> <mrow> <mi>q</mi><mo stretchy='false'>(</mo><mi>q</mi><mo>&#x2212;</mo><mn>1</mn><mo stretchy='false'>)</mo></mrow> </msub> </math--></inline-formula>.The comparison results show that compared with the existing periodic quasi-complementary sequence sets, the proposed method contains more sequences with the same subsequence length, and can support more users in multi-carrier communication system.…”
    Get full text
    Article
  20. 2540

    Generalized Grad-CAM attacking method based on adversarial patch by Nianwen SI, Wenlin ZHANG, Dan QU, Heyu CHANG, Shengxiang LI, Tong NIU

    Published 2021-03-01
    “…To verify the fragility of the Grad-CAM, a Grad-CAM attack method based on adversarial patch was proposed.By adding a constraint to the Grad-CAM in the classification loss function, an adversarial patch could be optimized and the adversarial image could be synthesized.The adversarial image guided the Grad-CAM interpretation result towards the patch area while the classification result remains unchanged, so as to attack the interpretations.Meanwhile, through batch-training on the dataset and increasing perturbation norm constraint, the generalization and the multi-scene usability of the adversarial patch were improved.Experimental results on the ILSVRC2012 dataset show that compared with the existing methods, the proposed method can attack the interpretation results of the Grad-CAM more simply and effectively while maintaining the classification accuracy.…”
    Get full text
    Article