Showing 2,941 - 2,960 results of 54,221 for search 'Methil~', query time: 3.79s Refine Results
  1. 2941

    A Higher Order Iterative Method for Computing the Drazin Inverse by F. Soleymani, Predrag S. Stanimirović

    Published 2013-01-01
    “…A method with high convergence rate for finding approximate inverses of nonsingular matrices is suggested and established analytically. …”
    Get full text
    Article
  2. 2942

    A Methodical Approach to Design and Valuation of Weather Derivatives in Agriculture by Jindrich Spicka, Jiri Hnilica

    Published 2013-01-01
    “…This paper first offers an overview of data sources and then methods of design and valuation of weather derivatives at the regional level. …”
    Get full text
    Article
  3. 2943

    Genetic Programming Method for Satellite System Topology and Parameter Optimization by Jinhui Li, Yunfeng Dong, Ming Xu, Hongjue Li

    Published 2020-01-01
    “…In this paper, a genetic programming method for satellite system design is proposed to simultaneously optimize the topology and parameters of a satellite system. …”
    Get full text
    Article
  4. 2944
  5. 2945

    Modeling of Globoidal Cam Planetary Mechanism by Simulating Motion Method by Liu Beibei, Cao Jujiang, Zhang Yanhua

    Published 2018-01-01
    “…Aiming at the problem of modeling difficult of complex meshing surfaces of globoidal cam planetary mechanism,a method of 3D modeling by using simulated motion method is proposed in order to facilitate the modeling of the mechanism. …”
    Get full text
    Article
  6. 2946

    Research on HMM based link prediction method in heterogeneous network by Rong QIAN, Jianting XU, Kejun ZHANG, Hongyu DONG, Fangyuan XING

    Published 2022-05-01
    “…In order to solve the problem that incomplete mining of structural information and semantic information in heterogeneous networks, a link prediction method combining meta-path-based analysis and hidden Markov model was proposed for link prediction of heterogeneous network.Considering that clustering could effectively capture the structural information of heterogeneous network, the k-means algorithm was improved to obtain the initial clustering center method based on the minimum distance mean square error, and it was applied to the hidden Markov model, first-order cluster hidden markov model (C-HMM<sup>(1)</sup>) link prediction method, and a link prediction method for heterogeneous network with second-order cluster hidden Markov model (C-HMM<sup>(2)</sup>) were designed.Further, considering the feature information of the data, a link prediction method called ME-HMM that combined the maximum entropy model and the second-order Markov model was proposed.The experimental results show that the ME-HMM has higher link prediction accuracy than the C-HMM, and the ME-HMM method has better performance than the C-HMM method because it fully considers the feature information of the data.…”
    Get full text
    Article
  7. 2947

    Esophageal oxyhemoglobin saturation as a resuscitative metric in hemorrhagic shock by Julia Garcia Mancebo, Kristen Sack, Padraic Romfh, Yifeng Peng, John Kheir

    Published 2024-11-01
    “…However, SvO2 monitoring is challenging as it requires an invasive catheter and frequent blood sampling. Non-invasive methods, including near-infrared spectroscopy, have demonstrated low sensitivity to tissue dysoxia.Methods We fabricated a new device that uses resonance Raman spectroscopy (RRS) to quantify oxyhemoglobin saturation (ShbO2) in the esophagus (eShbO2), tongue (tShbO2), and liver (hShbO2). …”
    Get full text
    Article
  8. 2948

    Evaluation method of penetrating jamming effectiveness for cognitive communication protection by Zhiguo SUN, Shuo XIAO, Yijie WU, Shiming LI, Zhenduo WANG

    Published 2023-11-01
    “…In order to support the implementation of “multidimensional orthogonal configured communication protection between communication modules as well as parameters and interference” in cognitive communication countermeasures scenarios, jamming effectiveness requires module level responsiveness.A penetrating jamming effectiveness evaluation method was proposed.Firstly, the core parameters of each signal processing module were selected as evaluation parameters.Secondly, analytic hierarchy process (AHP) and entropy weight method (EWM) were used to determine the weight of indicators.The coordination problem in AHP was solved through expert weight allocation, and the weight allocation problem in EWM was solved through non-uniform mapping.Finally, the subjective and objective weights were weighed through game theory, and the jamming effectiveness was judged by the technique for order preference by similarity to ideal solution (TOPSIS).By conducting evaluation experiments on the jamming performance of the Link16 data link, taking into account multiple aspects such as jamming types, number of jamming frequencies, jamming duration, and system types.Experiment results demonstrate that the penetration-based jamming performance evaluation method not only provides a more intuitive representation of the relationship between evaluation results and metric parameters, but also possesses excellent jamming discrimination capability.…”
    Get full text
    Article
  9. 2949

    Effect of Extraction Methods on Physicochemical and Functional Properties of Nannochloropsis Proteins by Suyan HUANG, Rong CAO, Nan LIU, Yong SUN, Deqing ZHOU, Shanshan WANG

    Published 2025-01-01
    “…Nannochloropsis freeze-thawed extraction protein (NFP), Nannochloropsis enzyme-assisted extraction protein (NEP) and Nannochloropsis alkali extraction protein (NAP) were extracted from the Nannochloropsis powder by using freeze-thawed salt precipitation method, enzyme-assisted extraction method and alkali dissolution acid precipitation method, respectively. …”
    Get full text
    Article
  10. 2950

    A New Aerodynamic Optimization Method with the Consideration of Dynamic Stability by Mi Baigang, Wang Xiangyu

    Published 2021-01-01
    “…Finally, a new aerodynamic optimization method can be built. We take NACA0012 as an example to validate this method. …”
    Get full text
    Article
  11. 2951

    Real-time detection method of smoke based on Wi-Fi by Zhefu WU, Wanli TANG, Cheng CHEN, Luping FANG

    Published 2019-06-01
    “…Fire-related smoke real-time detection method is one of the important means to ensure public safety.A fire smoke detection method based on channel state information of Wi-Fi network was proposed to avoid the high cost of existing fire sensor system or the blind spot of video detection.The method need not require a dedicated fire smoke monitoring device.By studying the influence of fire smoke on wireless transmission signals,the smoke characteristic parameters in the channel state information were extracted and classified by machine learning,thereby realizing the real-time monitoring of environmental fire.The experimental results show that the accuracy of environmental smoke detection based on Wi-Fi channel status information can reach 98.06%.…”
    Get full text
    Article
  12. 2952

    Unmanned roller lateral positioning method for asphalt road construction by Pengju Yue, Xiaohua Xia, Yongbiao Hu, Xuebin Wang, Pengcheng He, Xufang Qin

    Published 2025-01-01
    “…The results indicate that the method excels in extracting the asphalt road boundary. …”
    Get full text
    Article
  13. 2953

    The Cardinal Spline Methods for the Numerical Solution of Nonlinear Integral Equations by Xiaoyan Liu, Jin Xie, Zhi Liu, Jiahuan Huang

    Published 2020-01-01
    “…In this study, an effective technique is presented for solving nonlinear Volterra integral equations. The method is based on application of cardinal spline functions on small compact supports. …”
    Get full text
    Article
  14. 2954

    Convergence and Stability in Collocation Methods of Equation u′(t)=au(t)+bu([t]) by Han Yan, Shufang Ma, Yanbin Liu, Hongquan Sun

    Published 2012-01-01
    “…This paper is concerned with the convergence, global superconvergence, local superconvergence, and stability of collocation methods for u′(t)=au(t)+bu([t]). The optimal convergence order and superconvergence order are obtained, and the stability regions for the collocation methods are determined. …”
    Get full text
    Article
  15. 2955

    Game theory based forwarding control method for social network by Fangfang SHAN, Hui LI, Hui ZHU

    Published 2018-03-01
    “…With the rapid development of mobile communication and internet technology,the social network has become one of the mainstream social means used in people’s daily social life.To maintain and strengthen relationships with friends,users may share personal behavior and feelings through social networks.Forwarding these contents may result in privacy leakage.To help publishers make proper data forwarding decision,the benefits of both sides of the forwarding operation were analyzed,and a game theory based forwarding control method for social network was proposed which could effectively prevent dishonest data forwarding operation.By analyzing the benefits of both sides of forwarding operation and considering historical information,the probability of dishonest data forwarding operation was calculated and it was compared with the threshold set by publisher to make the forwarding decision.The procedure and framework of the game theory based forwarding control method was introduced.The benefits of both sides were defined and analyzed.The game play scenario was presented.Some results of experiments are shown to support that the method is effective and it can protect the security of content in social network.…”
    Get full text
    Article
  16. 2956
  17. 2957

    Analysis of the methods and trends of money laundering by import – export transactions by Ju. M. Beketnova

    Published 2021-10-01
    “…The study of typologies of money laundering is considered by the international anti-money laundering community as one of the areas that ensure the strategic superiority of state bodies in the fight against this phenomenon.The purpose of the study is to identify trends in money laundering in foreign economic transactions and methods of counteraction. The research method is typological analysis. …”
    Get full text
    Article
  18. 2958

    Calculation of coal cleats spacing for methane degassing by image processing by Adel Taheri, Farhang Sereshki, Fatemeh Sadat Rohani

    Published 2025-01-01
    “…Coal bed methane is one of the clean energy sources in the world. …”
    Get full text
    Article
  19. 2959

    DAGAN: A Domain-Aware Method for Image-to-Image Translations by Xu Yin, Yan Li, Byeong-Seok Shin

    Published 2020-01-01
    “…The image-to-image translation method aims to learn inter-domain mappings from paired/unpaired data. …”
    Get full text
    Article
  20. 2960