Showing 2,901 - 2,920 results of 54,221 for search 'Methil~', query time: 4.30s Refine Results
  1. 2901

    The Examination of the Concept of Health Literacy through Bibliometric Analysis Method by Dilek Kolca, Selahattin Caner

    Published 2025-01-01
    “…This article provides a general overview of research conducted on the concept of health literacy using bibliometric methods. The Web of Science (WoS) database was utilized as the data source for gathering information. …”
    Get full text
    Article
  2. 2902

    Comparative Study on Different Drying Methods of Fish Oil Microcapsules by Yuqi Pang, Xu Duan, Guangyue Ren, Wenchao Liu

    Published 2017-01-01
    “…This study compared the effects of different drying methods, for example, spray drying (SD), freeze drying (FD), and spray freeze drying (SFD) on the microencapsulation of fish oil. …”
    Get full text
    Article
  3. 2903

    Automatic Optical Path Alignment Method for Optical Biological Microscope by Guojin Peng, Zhenming Yu, Xinjian Zhou, Guangyao Pang, Kuikui Wang

    Published 2024-12-01
    “…The traditional automatic alignment methods for OBMs rely heavily on complex masker-detection techniques. …”
    Get full text
    Article
  4. 2904

    Simulation of a Centrifugal Pump by Using the Harmonic Balance Method by Franco Magagnato, Jinfeng Zhang

    Published 2015-01-01
    “…The harmonic balance method was used for the flow simulation in a centrifugal pump. …”
    Get full text
    Article
  5. 2905

    A Fabrication Method for Memristors with Graphene Top Electrodes and their Characterization by Selin Onay, Ömer Refet Çaylan, Zarife Göknur Büke, Itır Köymen

    Published 2024-03-01
    “…E-beam evaporation and sputtering were used for depositing bottom metal electrodes and active layer respectively. Graphene was produced using the chemical vapor deposition (CVD) method and subsequently transferred using the fishing technique. …”
    Get full text
    Article
  6. 2906

    Research Methods Used in Library and Information Science Theses: An Evaluation by S. Serap Kurbanoğlu

    Published 1996-12-01
    “…A literature analysis and an evaluation are made on the findings of researches which examine the research methods employed in library science and information science dissertations. …”
    Get full text
    Article
  7. 2907
  8. 2908

    METHOD OF FILTER SELECTION FOR SPECLE-NOISE SMOOTHING IN SAR IMAGES by V. V. Starovoitov

    Published 2016-09-01
    “…A method for comparison of different SAR image filtration techniques is presented. …”
    Get full text
    Article
  9. 2909

    Application Method of Smart Dynamic DNS in Huge e-Commerce by Zhiwei Shen, Bingyi Fang

    Published 2014-01-01
    “…First the e-Commerce network architecture was put forward, and a detailed discussion was made on each part of the network architecture, a kind of smart dynamic domain name system and the optimal routing method of user access of e-Commerce were designed, at last the user access to electronic commerce exchange process was given.…”
    Get full text
    Article
  10. 2910

    Adversarial training driven malicious code detection enhancement method by Yanhua LIU, Jiaqi LI, Zhengui OU, Xiaoling GAO, Ximeng LIU, Weizhi MENG, Baoxu LIU

    Published 2022-09-01
    “…To solve the deficiency of the malicious code detector’s ability to detect adversarial input, an adversarial training driven malicious code detection enhancement method was proposed.Firstly, the applications were preprocessed by a decompiler tool to extract API call features and map them into binary feature vectors.Secondly, the Wasserstein generative adversarial network was introduced to build a benign sample library to provide a richer combination of perturbations for malicious sample evasion detectors.Then, a perturbation reduction algorithm based on logarithmic backtracking was proposed.The benign samples were added to the malicious code in the form of perturbations, and the added benign perturbations were culled dichotomously to reduce the number of perturbations with fewer queries.Finally, the adversarial malicious code samples were marked as malicious and the detector was retrained to improve its accuracy and robustness of the detector.The experimental results show that the generated malicious code adversarial samples can evade the detector well.Additionally, the adversarial training increases the target detector’s accuracy and robustness.…”
    Get full text
    Article
  11. 2911

    Method for assessing the theoretical characteristics of small axial hydraulic turbines by D. V. Mylkin, A. V. Volkov, B. M. Orakhelashvili, A. A. Druzhinin, V. Yu. Lyapin

    Published 2023-12-01
    “…This article based on an analysis of existing methods for designing and using a mathematical model of a hydraulic turbine with simplified blades, proposes a method for designing and analyzing the theoretical characteristics of the resulting hydraulic turbine. …”
    Get full text
    Article
  12. 2912
  13. 2913

    The Fruit Recognition and Evaluation Method Based on Multi-Model Collaboration by Mingzheng Huang, Dejin Chen, Dewang Feng

    Published 2025-01-01
    “…In this study, we propose a fruit recognition and evaluation method based on multi-model collaboration. Firstly, the detection model was used to accurately locate and crop the fruit area, and then the cropped image was input into the classification module for detailed classification. …”
    Get full text
    Article
  14. 2914

    Study on Performance Evaluation of Service Supply Chain by Extension Method by Jun Cheng, Qiaoning Yang, Lin Lu

    Published 2021-01-01
    “…The result turns out to be good, which is consistent with the actual situation, indicating that the evaluation system and method are effective and reliable.…”
    Get full text
    Article
  15. 2915
  16. 2916
  17. 2917

    Novel DOA estimation method for coherent wideband LFM signals by Peng,LIUKai-hua LUO, Jie-xiao YU, Yong-tao MA

    Published 2012-03-01
    “…A novel direction of arrival (DOA) estimation method for coherent wideband linear frequency modulation (LFM) signals was proposed.Based on the dechirping property of LFM signal in fractional Fourier domain,a new array data model was constructed,then the matrix reconstruction and MUSIC algorithm were used to estimate the DOA of coherent LFM signals.If there were multiple groups of coherent LFM signals incident,separated them in different energy-concentrated domains first,then carried the DOA estimation on each of the groups.Owing to fully excavating the time-frequency information included in observed signals,this method has good resolution ability and anti-noise performance,and the number of DOA that can be resolved is also increased.In addition,this method has no array redundancy and aperture loss,and can be applied to arbitrary array manifold.Simulation results show that this method can obtain nearly 8dB signal-to-noise ratio gain compared with the conventional method.…”
    Get full text
    Article
  18. 2918

    Synthetic–schematic representation of the model of clinical diagnostic-therapeutic method by Luis Alberto Corona Martínez

    Published 2007-04-01
    “…The use of a systemic approach in the theoretical analysis of the clinical method has allowed the elaboration of an schematic and synthetic representation of the new model of clinical diagnostic- therapeutic method developed from the conception of the medical assistance as a taking decisions process. …”
    Get full text
    Article
  19. 2919
  20. 2920

    Fixed Points for Multivalued Mappings in Uniformly Convex Metric Spaces by A. Kaewcharoen, B. Panyanak

    Published 2008-01-01
    “…The purpose of this paper is to ensure the existence of fixed points for multivalued nonexpansive weakly inward nonself-mappings in uniformly convex metric spaces. This extends a result of Lim (1980) in Banach spaces. …”
    Get full text
    Article