Showing 3,021 - 3,040 results of 54,221 for search 'Methil~', query time: 3.84s Refine Results
  1. 3021

    Efficient Sensor Localization Method with Classifying Environmental Sensor Data by Ae-cheoun Eun, Young-guk Ha

    Published 2012-12-01
    “…For indoor localization, methods that use the received signal strength (RSS) of wireless sensors are used instead of a global positioning system because of the lack of availability of a global positioning system for indoor environments. …”
    Get full text
    Article
  2. 3022

    Matrix method for solving linear complex vector functional equations by Ice B. Risteski

    Published 2002-01-01
    “…We give a new matrix method for solving both homogeneous and nonhomogeneous linear complex vector functional equations with constant complex coefficients.…”
    Get full text
    Article
  3. 3023
  4. 3024

    Double Controlled Partial Metric Type Spaces and Convergence Results by Haroon Ahmad, Mudasir Younis, Mehmet Emir Köksal

    Published 2021-01-01
    “…In this paper, we firstly propose the notion of double controlled partial metric type spaces, which is a generalization of controlled metric type spaces, partial metric spaces, and double controlled metric type spaces. …”
    Get full text
    Article
  5. 3025

    Modified Homotopy Perturbation Method for Solving Fractional Differential Equations by A. A. Hemeda

    Published 2014-01-01
    “…This work will present a numerical comparison between the considered method and some other methods through solving various fractional differential equations in applied fields. …”
    Get full text
    Article
  6. 3026

    Prioritization method for frontier DMUs: a distance-based approach by Alireza Amirteimoori, Gholamreza Jahanshahloo, Sohrab Kordrostami

    Published 2004-01-01
    “…Andersen et al. and Mehrabian et al. proposed two methods for ranking efficient units, but both methods break down in some cases. …”
    Get full text
    Article
  7. 3027

    DAMAGE IDENTIFICATION STUDY OF PLATE STRUCTURES BASED ON WAVELET METHOD by LI XuJuan, MIAO BingRong, SHI YanMin, WANG MingYue

    Published 2018-01-01
    “…The study results show that this method is valid for the damage identification of location and damage severity of 2 D plate,which can be expected to provide some thinking and reference value for vehicle structures’ damage identification.…”
    Get full text
    Article
  8. 3028

    An Analytical Method for Calculating Short-Term Space Interception Probability by Wenzhe Ding, Xinhong Li, Hong Yang, Zhibin Zhang, Jiping An

    Published 2019-01-01
    “…However, the Monte Carlo (MC) based simulation method not only consumes a lot of computation time but also theoretically lacks interpretability. …”
    Get full text
    Article
  9. 3029

    THREE-DIMENSIONAL RECONSTRUCTION BY SART METHOD WITH MINIMIZATION OF THE TOTAL VARIATION by S. A. Zolotarev, M. A. Mirzavand

    Published 2015-11-01
    “…The algebraic reconstruction method with simultaneous iterations SART considered in this work as one of the most promising of iterative methods, suitable for the tomographic problems. …”
    Get full text
    Article
  10. 3030

    New Objective Refraction Metric Based on Sphere Fitting to the Wavefront by Mateusz Jaskulski, Andreí Martínez-Finkelshtein, Norberto López-Gil

    Published 2017-01-01
    “…For pupil radii r0≤2 mm, the new metric predicts the equivalent sphere with similar accuracy (<0.1D), however, for r0>2 mm, the mean error of traditional metrics can increase beyond 0.25D, and the MTR remains accurate. …”
    Get full text
    Article
  11. 3031

    A Manual of Methods and Procedures for the Regional Waterway Management System by Robert A. Swett, David A. Fann

    Published 2009-07-01
    “…TP-124, a 91-page illustrated manual by Robert Swett and David Fann, details the procedures that are necessary to complete a Regional Waterway Management System for Florida’s coastal canals and other waterways. …”
    Get full text
    Article
  12. 3032

    Sensitive Bromatometric Methods for the Determination of Sumatriptan Succinate in Pharmaceutical Formulations by K. V. V. Satyanarayana, P. Nageswara Rao

    Published 2011-01-01
    “…The two methods are based on the bromination of STS by a known excess of in situ generated bromine followed by determination of unreacted bromine by reacting with a fixed amount of methyl orange (Method A) or indigo carmine (Method B) and measuring the absorbance at 508 or 610 nm. …”
    Get full text
    Article
  13. 3033

    Synthesis of Hyperbranched Polymer Using Slow Monomer Addition Method by Toshifumi Satoh

    Published 2012-01-01
    “…This paper details the synthesis of a well-defined hyperbranched polymer using a slow monomer addition method. …”
    Get full text
    Article
  14. 3034

    A Vs-Based Logistic Regression Method for Liquefaction Evaluation by Xiaofei Yao, Lu Liu, Zhihua Wang, Zhifu Shen, Hongmei Gao

    Published 2021-01-01
    “…The performance of the new formula on liquefaction evaluation is compared with existing liquefaction evaluation methods including the Andrus method and the Chinese code method. …”
    Get full text
    Article
  15. 3035

    Automated Windows domain penetration method based on reinforcement learning by Lige ZHAN, Letian SHA, Fu XIAO, Jiankuo DONG, Pinchang ZHANG

    Published 2023-08-01
    “…Windows domain provides a unified system service for resource sharing and information interaction among users.However, this also introduces significant security risks while facilitating intranet management.In recent years, intranet attacks targeting domain controllers have become increasingly prevalent, necessitating automated penetration testing to detect vulnerabilities and ensure the ongoing maintenance of office network operations.Then efficient identification of attack paths within the domain environment is crucial.The penetration process was first modeled using reinforcement learning, and attack paths were then discovered and verified through the interaction of the model with the domain environment.Furthermore, unnecessary states in the reinforcement learning model were trimmed based on the contribution differences of hosts to the penetration process, aiming to optimize the path selection strategy and improve the actual attack efficiency.The Q-learning algorithms with solution space refinement and exploration policy optimization were utilized to filter the optimal attack path.By employing this method, all security threats in the domain can be automatically verified, providing a valuable protection basis for domain administrators.Experiments were conducted on typical Windows domain scenarios, and the results show that the optimal path is selected from the thirteen efficient paths generated by the proposed method, while also providing better performance optimization in terms of domain controller intrusion, domain host intrusion, attack steps, convergence, and time cost compared to other approaches.…”
    Get full text
    Article
  16. 3036

    Solving Quantum Dynamics with a Lie-Algebra Decoupling Method by Sofia Qvarfort, Igor Pikovski

    Published 2025-01-01
    “…Here, we present a tutorial for how the quantum dynamics of systems can be solved using a Lie-algebra decoupling method. The approach involves identifying a Lie algebra that governs the dynamics of the system, enabling the derivation of differential equations to solve the Schrödinger equation. …”
    Get full text
    Article
  17. 3037

    Research of the two-criteria estimation method for linear regression models by M.P. Bazilevskiy

    Published 2025-01-01
    “…The paper is devoted to the research of the two-criteria estimation method for linear regressions. The first criterion corresponds to the least absolute deviations, the second – to the non-strict ordinary least squares. …”
    Get full text
    Article
  18. 3038

    Fixed Point Theory in α-Complete Metric Spaces with Applications by N. Hussain, M. A. Kutbi, P. Salimi

    Published 2014-01-01
    “…The aim of this paper is to introduce new concepts of α-η-complete metric space and α-η-continuous function and establish fixed point results for modified α-η-ψ-rational contraction mappings in α-η-complete metric spaces. …”
    Get full text
    Article
  19. 3039

    An adjustable bio-sealing method for rock fracture leakage mitigation by Zhihao Dong, Xiaohua Pan, Chaosheng Tang, Chao Lv, Bin Shi

    Published 2025-01-01
    “…The results showed that the RAM-based bio-sealing method can seal and bond the small aperture rock fractures with high efficiency and uniform precipitation by adjusting the CS concentration. …”
    Get full text
    Article
  20. 3040