Showing 2,681 - 2,700 results of 54,221 for search 'Methil~', query time: 4.47s Refine Results
  1. 2681

    Subarrayed Antenna Array Synthesis Using Ternary Adjusting Method by Guolong He, Yafeng Zhan, Yukui Pei, Bin Wu

    Published 2014-01-01
    “…Ternary adjusting method is proposed and combined with particle swarm optimization (PSO) algorithm for subarrayed antenna array synthesis. …”
    Get full text
    Article
  2. 2682
  3. 2683
  4. 2684

    Computational Methods for Solving Linear Fuzzy Volterra Integral Equation by Jihan Hamaydi, Naji Qatanani

    Published 2017-01-01
    “…However, according to comparison of these methods, we conclude that the variational iteration method provides more accurate results.…”
    Get full text
    Article
  5. 2685

    Cryopreservation Method for Preventing Freeze-Fracture of Small Muscle Samples by Namrata Ghag, Joshua Tam, Rox Anderson, Nashwa Cheema

    Published 2025-01-01
    “…This method decreased the occurrence of freeze-fractures by an order of magnitude, to ~4%, whereas the traditional method of cryopreservation resulted in ~56% freeze-fracturing.…”
    Get full text
    Article
  6. 2686
  7. 2687

    Shortest-Way: An Improved Empirical Transition Method for Signal Coordination by Mingming Zheng, Hongfeng Xu, Kun Zhang, Ronghan Yao

    Published 2017-01-01
    “…Four fundamental insights into transition methods are provided from the perspective of traffic engineers. …”
    Get full text
    Article
  8. 2688

    ABOUT THE APPROACH AND METHOD OF DETERMINING THE VALUE OF ROYALTIES FOR THE DEVELOPMENT OF MINERALS by V. M. Serov, N. A. Moiseenko

    Published 2019-10-01
    “…The author’s approach and the method of determining the value of royalties for the development of mineral resources have been explained in the article. …”
    Get full text
    Article
  9. 2689

    Research on unsupervised domain adaptive bearing fault diagnosis method by WU ShengKai, SHAO Xing, WANG CuiXiang, GAO Jun

    Published 2024-06-01
    “…Then, the feature distributions output of the source domain and the target domain were converged by the method of reversing labels in the generative adversarial network. …”
    Get full text
    Article
  10. 2690
  11. 2691

    Uncertainty analysis of varying inertia estimation based on Bayesian method by Dongdong Li, Wei Hua, Yang Mi

    Published 2025-04-01
    “…The Bayesian inertia estimation method (BIEM) is proposed to estimate power system varying inertia and quantify estimation uncertainty from a Bayesian statistical and modeling perspective. …”
    Get full text
    Article
  12. 2692

    Research on the backbone network cache method based on application-awareness by Chun-jing HAN, Ye YANG, Hong-lei LYU, Jing-guo GE, Tong LI, Yun-jie LIU

    Published 2017-12-01
    “…Based on over 900 million HTTP requests from an ISP backbone network,the HTTP characteristic of different content types from a wide range of perspectives was analyzed,including request composition,size,popularity and temporal dynamics,and an application-aware backbone network cache method was proposed,referred to as AACM.The experiment results show that in the case of a slight increase in cache space,the hit ratio of the online-video increases 15%, and the total source traffic and cache I/O load reduced by about half.…”
    Get full text
    Article
  13. 2693

    Debt Brake: Putting the Potential Output Estimation Method to the Test by ZG Überblick

    Published 2022-11-01
    “…Abstract The coalition agreement of the federal government states that there needs to be a review of the details of the debt brake, especially the rules for determining the production potential. …”
    Get full text
    Article
  14. 2694

    SDN security control and forwarding method based on cipher identification by Xi QIN, Guodong TANG, Chaowen CHANG

    Published 2018-02-01
    “…Aimed at the limited matching fields and the lack of effective data source authentication mechanism in the software defined networking (SDN),a SDN security control forwarding method based on cipher identification was proposed.First,the cipher identification was generated according to the user identity,file attributes or business content and other characteristics,and the data stream was marked by the cipher identification and signed with the private key based on the cipher identification.Then,when the data stream entered and left the network,the forwarding device verified its signature to ensure the authenticity of the data.At the same time,the cipher identification was designed as a matching item recognized by the forwarding device,and the network forwarding behavior was defined based on the cipher identification,so a fine-grained network control capability could be formed based on people,things,and business flow.Finally,the validity of the method is verified by experimental analysis.…”
    Get full text
    Article
  15. 2695

    Method of Prevent the for Years for a Change of Precision Punching Die by Tian Shaojie, Hu Zhongcheng, Liu Jing

    Published 2016-01-01
    “…The method and best heat treatment process to prevent the"for years for a change"of precision punching dies are presented. …”
    Get full text
    Article
  16. 2696

    Container escape detection method based on heterogeneous observation chain by Yuntao ZHANG, Binxing FANG, Chunlai DU, Zhongru WANG, Zhijian CUI, Shouyou SONG

    Published 2023-01-01
    “…Aiming at the problem of high false negative rate in container escape detection technologies, a real-time detecting method of heterogeneous observation was proposed.Firstly, the container escape behavior utilizing kernel vulnerabilities was modeled, and the critical attributes of the process were selected as observation points.A heterogeneous observation method was proposed with “privilege escalation” as the detection criterion.Secondly, the kernel module was adopted to capture the attribute information of the process in real time, and the process provenance graph was constructed.The scale of the provenance graph was reduced through container boundary identification technology.Finally, a heterogeneous observation chain was built based on the process attribute information, and the prototype system HOC-Detector was implemented.The experiments show that HOC-Detector can successfully detect all container escapes using kernel vulnerabilities in the test dataset, and the increased runtime overhead is less than 0.8%.…”
    Get full text
    Article
  17. 2697
  18. 2698

    Application of Local Fractional Homotopy Perturbation Method in Physical Problems by Nabard Habibi, Zohre Nouri

    Published 2020-01-01
    “…It is difficult for nonlinear models to obtain the closed form of the solution, and in many cases, only an approximation of the real solution can be obtained. The perturbation method is a wave equation solution using HPM compared with the Fourier series method, and both methods results are good agreement. …”
    Get full text
    Article
  19. 2699

    Interrogating the Traditional Methods of Crime Control of the Alago Ethnic Group by Ado Ahmad IBRAHIM

    Published 2022-11-01
    “… This study investigates the Alago traditional methods of crime control. The analysis in the research is predicated on social control theory as the theoretical based. …”
    Get full text
    Article
  20. 2700

    Pattern synthesis method for arbitrary arrays with desired mainloble response by Dian-fei PAN, Nai-ping CHENG

    Published 2014-09-01
    “…A pattern synthesis method based on adaptive array theory and convex optimization principle was proposed for arbitrary arrays,especially considering the influence of different orientation on array pattern.Firstly,the array pattern with special sideloble shape is obtained by adaptive array theory method; and then,the mainloble pointing to 0° is taken as reference to determine the pattern mainloble with variant steering angle.Finally,the optimal array pattern synthesis with desired mainloble response is converted to a second-order cone programming problem.The resulting optimization problem is nonconvex and is implemented via iterative algorithms of convex optimization,which can be solved using the second-order cone programming method at each iteration.Taking the method developed can obtain satisfied mainlobe response and less synthesized error in sideloble region.Theoretical analyses and simulation results show that the synthe-sized pattern has the same mainloble performance as the desired mainlabole in different orientation,and also the sideloble can maintain the shape to suppress the dynamic interference.…”
    Get full text
    Article