Showing 2,841 - 2,860 results of 54,221 for search 'Methil~', query time: 3.83s Refine Results
  1. 2841

    New Catalytic Method for the Synthesis of 2,7-Dicycloalkyl-hexaazaperhydropyrenes by Elena Rakhimova, Victor Kirsanov, Radik Zainullin, Askhat Ibragimov, Usein Dzhemilev

    Published 2016-01-01
    “…An efficient method for the synthesis of 2,7-dicycloalkyl-2,3a,5a,7,8a,10a-hexaazaperhydropyrenes by the NiCl2·6H2O-catalyzed ring transformation reaction of 1,3,5-tricycloalkyl-1,3,5-triazines with 1,4,5,8-tetraazadecalin has been successfully developed.…”
    Get full text
    Article
  2. 2842

    Novel continuous identity authentication method based on mouse behavior by Cong YI, Jun HU

    Published 2022-10-01
    “…With the rapid development of Internet technologies, security issues have always been the hot topics.Continuous identity authentication based on mouse behavior plays a crucial role in protecting computer systems, but there are still some problems to be solved.Aiming at the problems of low authentication accuracy and long authentication latency in mouse behavior authentication method, a new continuous identity authentication method based on mouse behavior was proposed.The method divided the user’s mouse event sequence into corresponding mouse behaviors according to different types, and mined mouse behavior characteristics from various aspects based on mouse behaviors.Thereby, the differences in mouse behavior of different users can be better represented, and the authentication accuracy can be improved.Besides, the importance of mouse behavior features was obtained by the ReliefF algorithm, and on this basis, the irrelevant or redundant features of mouse behavior were removed by combining the neighborhood rough set to reduce model complexity and modeling time.Moreover binary classification was adopted.The algorithm performed the training of the authentication model.During identity authentication, the authentication model was used to obtain a classification score based on the mouse behavior collected each time, and then the user’s trust value was updated in combination with the trust model.When the user’s trust value fell below the threshold of the trust model, it might be judged as illegal user.The authentication effect of the proposed method was simulated on the Balabit and DFL datasets.The results show that, compared with the methods in other literatures, this method not only improves the authentication accuracy and reduces the authentication latency, but also has a certain robustness to the illegal intrusion of external users.…”
    Get full text
    Article
  3. 2843
  4. 2844
  5. 2845

    Optimization Model and Method of Variable Speed Limit for Urban Expressway by Shubin Li, Tao Wang, Hualing Ren, Baiying Shi, Xiangke Kong

    Published 2021-01-01
    “…The urban expressway network is the main part of the urban traffic network carrying most of the city’s traffic pressure for its continuity and rapidity, but the control method of the traffic flow was too simple to other control methods in application in addition to the ramp control and the fixed speed control. …”
    Get full text
    Article
  6. 2846

    Method of structural reliability analysis based on boundary distribution functions by S. A. Solovev, A. A. Soloveva

    Published 2023-10-01
    “…The research is aimed at the development of methods for assessing and analyzing the structural reliability of elements of building structures in practical tasks when statistical data about random variables may be incomplete or limited. …”
    Get full text
    Article
  7. 2847
  8. 2848

    Analysis method on the properties of social networks of internet nuisance communities by WANG Bo, GUO Jie, QIU Weidong, HUANG Zheng

    Published 2024-06-01
    “…Given the characteristics of these organizations, which include being distant from domestic supervision and possessing strong concealment and camouflage abilities, a social network characteristic analysis method was proposed for Internet public hazards organizations. …”
    Get full text
    Article
  9. 2849

    Method of node distribution for heterogeneous WMSN based on load balancing by Yong-hong ZHU, En-jie DING

    Published 2015-10-01
    “…Multiple hop transmission in wireless sensor networks(WSN)would bring the energy hole problem near the sink.It proved that the energy hole problem would appear in any position in heterogeneous wireless multimedia sensor networks and propose a method of the node distribution based on load balancing to solve the problem.The energy consumption was analyzed on the basis of considering the data compression ratio and the energy consumed for data transmission and processing.It proved that in heterogeneous WMSN the energy consumption of data processing would affect the node distribution and define a word that profit of data processing.The simulation results show that the energy utilization rate and the survival time of the network can be effectively improved by using the method proposed.…”
    Get full text
    Article
  10. 2850

    Selectable Implant Removal Methods due to Mechanical and Biological Failures by Jong-Bin Lee

    Published 2017-01-01
    “…The 70-year-old male and 66-year-old female who had discomfort on posterior implants region came to Department of Periodontology. Conventional method using trephine bur and the new, nontraumatic method using a fixture removal kit were used for implant removal, respectively. …”
    Get full text
    Article
  11. 2851

    Convergence Rates of Gradient Methods for Convex Optimization in the Space of Measures by Chizat, Lénaïc

    Published 2023-01-01
    “…We study the convergence rate of Bregman gradient methods for convex optimization in the space of measures on a $d$-dimensional manifold. …”
    Get full text
    Article
  12. 2852

    Compression strategies selection method based on classification of HBase data by Hai-yan WANG, Cai-hang FU

    Published 2016-04-01
    Subjects: “…compression strategies selection method…”
    Get full text
    Article
  13. 2853
  14. 2854

    Research on Face Recognition Method by Autoassociative Memory Based on RNNs by Qi Han, Zhengyang Wu, Shiqin Deng, Ziqiang Qiao, Junjian Huang, Junjie Zhou, Jin Liu

    Published 2018-01-01
    “…Finally, simulation results on two experiments show the feasibility and performance of the proposed face recognition method.…”
    Get full text
    Article
  15. 2855

    Automatic exploitation generation method of write-what-where vulnerability by Huafeng HUANG, Purui SU, Yi YANG, Xiangkun JIA

    Published 2022-01-01
    “…To solve the problem that the current vulnerability automatic exploitation generation methods cannot automatically generate control-flow-hijacking exploitation from write-what-where, a method of automatic exploitation generation for write-what-where was proposed.First, the write-what-where vulnerability was detected based on the memory address control strength dynamic taint analysis method.Then, the vulnerability exploitation elements were searched based on the vulnerability exploitation modes, and the exploitation of write-what-where vulnerability was generated automatically by constraint solving.The experimental results show that the proposed method can effectively detect write-what-where vulnerability, search exploitation elements, and automatically generate the control-flow-hijacking exploitation from write-what-where.…”
    Get full text
    Article
  16. 2856

    STUDY OF TOWING DELTA PLATE BEARING STRESS CALCULATION METHODS by LIN FengMei, GU YuJiong

    Published 2018-01-01
    “…When the gap of pin and hole△R = 0,the average bearing stress formula can be adopted; when the ratio of gap between the hole and pin to radius of the pin λ≥0. 02,in order to save cost for FEA analysis the Hertz formula can be adopted if no other more accurate calculation methods are available The computing error between the Hertz formula and FEA is less than 10%.…”
    Get full text
    Article
  17. 2857

    Evaluating Remote Sensing Metrics for Land Surface Phenology in Peatlands by Michal Antala, Anshu Rastogi, Marcin Stróżecki, Mar Albert-Saiz, Subhajit Bandopadhyay, Radosław Juszczak

    Published 2024-12-01
    “…We assessed the accuracy of LSP retrieval by simple remote sensing metrics against LSP derived from gross primary production and canopy chlorophyll content time series. …”
    Get full text
    Article
  18. 2858

    Backdoor defense method in federated learning based on contrastive training by Jiale ZHANG, Chengcheng ZHU, Xiang CHENG, Xiaobing SUN, Bing CHEN

    Published 2024-03-01
    “…In response to the inadequacy of existing defense methods for backdoor attacks in federated learning to effectively remove embedded backdoor features from models, while simultaneously reducing the accuracy of the primary task, a federated learning backdoor defense method called ContraFL was proposed, which utilized contrastive training to disrupt the clustering process of backdoor samples in the feature space, thereby rendering the global model classifications in federated learning independent of the backdoor trigger features.Specifically, on the server side, a trigger generation algorithm was developed to construct a generator pool to restore potential backdoor triggers in the training samples of the global model.Consequently, the trigger generator pool was distributed to the participants by the server, where each participant added the generated backdoor triggers to their local samples to achieve backdoor data augmentation.Experimental results demonstrate that ContraFL effectively defends against various backdoor attacks in federated learning, outperforming existing defense methods.…”
    Get full text
    Article
  19. 2859
  20. 2860

    Research of the Method of Determining k Value in VMD based on Kurtosis by Wu Wenxuan, Wang Zhijian, Zhang Jiping, Ma Weijin, Wang Junyuan

    Published 2018-01-01
    “…The feasibility of the method is verified by the actual fault signal,a new thinking of the research for VMD is proposed.…”
    Get full text
    Article