Showing 2,961 - 2,980 results of 54,221 for search 'Methil~', query time: 3.75s Refine Results
  1. 2961
  2. 2962

    Damage Detection Method for High-Strength Aramid Conveyor Belts by Ling Yang, Yimin Wang, Di Miao, Xiaoxian Duan

    Published 2025-01-01
    “…Since the traditional methods of detection perform poorly in efficiency and accuracy, a new method of damage detection is proposed based on the FCSA - YOLOv10 model in this paper for high-strength aramid conveyor belts. …”
    Get full text
    Article
  3. 2963
  4. 2964

    Multidimensional detection and dynamic defense method for link flooding attack by Yang WANG, Guangming TANG, Cheng LEI, Dong HAN

    Published 2019-08-01
    “…Aiming at the shortcomings of the existing link flooding attack defense methods,a multi-dimensional index detection algorithm is proposed,which performs multi-dimensional detection on the abnormal forwarding links through the five-dimensional elements of connection length,low-speed ratio of data packets,uniformity of data packet distance,average low-speed ratio of data packets,and change rate of low-speed ratio of data packets,thus effectively solving the problem of high false alarm rate of the existing detection methods.Furthermore,a controller switch dynamic deployment method based on coloring theory is proposed,which solves the problem of difficult to be actually deployed in the actual environment with limited switch variant types existing in the existing defense mitigation mechanisms.Experimental analysis show the feasibility of the proposed method.…”
    Get full text
    Article
  5. 2965

    Analysing Methods of Measuring the Level of Development Based on the Experimental Data by Farzad Karimi, Mostafa Ahmadvand, Ali Heidari

    Published 2018-06-01
    “…This study aims at identifying optimal method for masuring degree and level of development with resprct to models commonly used (Taxonomy, TOPSIS, Moris, SAW, and VIKOR). …”
    Get full text
    Article
  6. 2966

    Transforming Weakness into Strength: Improving Unreliable Malware Detection Methods by Pavel Novak, Vaclav Oujezsky

    Published 2024-12-01
    “…The core contribution lies in introducing a sequence-based detection method that contextualizes unreliable IoCs to improve accuracy and reduce false positives. …”
    Get full text
    Article
  7. 2967

    Parametrically excited nonlinear systems: a comparison of two methods by A. F. El-Bassiouny

    Published 2002-01-01
    “…The results obtained by the two methods are in excellent agreement. Numerical solutions are carried out and graphical representations of the results are presented and discussed.…”
    Get full text
    Article
  8. 2968
  9. 2969

    A Partition Spatial Filtering Method for Acoustic Array Configuration by Zhihong Liu, Xilong Zhang, Zunmin Liu, Chuijie Yi, Ming Ma

    Published 2021-01-01
    “…The performance of the method is examined numerically and experimentally, which is compared with the other methods. …”
    Get full text
    Article
  10. 2970
  11. 2971

    Intelligent Computer Technology-Driven Mural Pattern Recognition Method by Wenqing Wei, Lei Gao

    Published 2022-01-01
    “…The experimental results show that the improved algorithm can reduce the recognition error; enhance the edge, texture, and structure information of the reconstructed mural image; and enrich the detail information of the reconstructed mural image.…”
    Get full text
    Article
  12. 2972

    Covid-19 pandemic data analysis using tensor methods by Dipak Dulal, Ramin Goudarzi Karim, Carmeliza Navasca

    Published 2024-03-01
    “…Finally, we demonstrate the efficacy of the methods by applying the techniques to the New Jersey Covid-19 case tensor data.…”
    Get full text
    Article
  13. 2973

    Research on the high precision hydraulic column stress monitoring method by Jianzhuo Zhang, Chuanxu Wan, Jie Wang, Ce Chen, Tao Wang, Kai Xu

    Published 2025-01-01
    “…To address these issues, a high-precision stress mapping method of hydraulic column is proposed. The hydraulic column loss function was constructed to guide the data-driven model training, and the cylinder stress mechanism model was established by using the elastic–plastic theory of thick-walled cylinder. …”
    Get full text
    Article
  14. 2974
  15. 2975
  16. 2976

    Helpful Details for Commercial Propagation of Woody Plant Stem Cuttings by Thomas H. Yeager

    Published 2017-03-01
    “… This three-page fact sheet provides details that are very important for successful propagation of woody plant stem cuttings, such as sanitation, quality of cuttings, the time of year/day to take cuttings, stem size diameter and length of cutting, location of cuts/terminal bud removal, and environmental conditions. …”
    Get full text
    Article
  17. 2977

    Comparison of the Effects of Different Decontamination Methods on Staphylococcus Aureus Biofilm by Ece Açıkgöz Alparslan, Ufuk Bağcı, Ayşegül Kurt

    Published 2024-12-01
    “… Purpose: The current in-vitro study aims to compare the effectiveness of various mechanical decontamination modalities in the elimination of Staphylococcus aureus biofilm from titanium surfaces using qualitative and quantitative techniques.Materials and methods: A total of 48 titanium discs were inoculated with Staphylococcus aureus and randomly allocated into four experimental groups consisting of control, plastic curettes (PC), ultrasonic-driven plastic tips (UPT), and ultrasonic-driven stainless-steel tips (UST). …”
    Get full text
    Article
  18. 2978
  19. 2979
  20. 2980

    A multipath error cancellation method based on antenna jitter by Jiyang Liu, Feixue Wang, Xiaomei Tang, Sixin Wang, Muzi Yuan

    Published 2025-02-01
    “…The results indicate that the proposed method enhances robustness and applicability across various environments compared to traditional approaches. …”
    Get full text
    Article