Showing 3,281 - 3,300 results of 54,221 for search 'Methil~', query time: 4.03s Refine Results
  1. 3281

    APPROACHING THE PATELLOFEMORAL PAIN SYNDROME THROUGH PHYSIOTHERAPEUTIC METHODS VERSUS KINETOTHERAPY by Dobreanu (căs. Ioja) Ioana-Bianca, Cojocariu Adrian

    Published 2023-06-01
    “…Considering the importance of the knee joint in everyday life, both for carrying out daily activities and for carrying out professional activities, we can conclude that its recovery is extremely important.The production mechanisms of the femoro-patellar syndrome are multiple, and this requires the implementation of a recovery program as effective as possible, based on the most accurate and detailed assessment.Regarding the modification of the activity, we are left with a series of contraindications such as; avoiding deep bending of the knee against resistance. …”
    Get full text
    Article
  2. 3282
  3. 3283

    Distributed Cooperative Search Control Method of Multiple UAVs for Moving Target by Chang-jian Ru, Xiao-ming Qi, Xu-ning Guan

    Published 2015-01-01
    “…To reduce the impact of uncertainties caused by unknown motion parameters on searching plan of moving targets and improve the efficiency of UAV’s searching, a novel distributed Multi-UAVs cooperative search control method for moving target is proposed in this paper. …”
    Get full text
    Article
  4. 3284

    Study on DEM Correction Method of Digital Twin Basic Data Baseboard by HONG Minghai, YAN Tao, LIU Hui, WANG Xingjian, JING Na, WANG Shiwei, WEI Wenjie, LI Xinan, FENG Chuqiao

    Published 2023-01-01
    “…DEM is one of the most important digital twin basic data and has played a huge role in water conservancy planning,design,and engineering construction.However,the existence of various DEM errors greatly reduces the credibility of analysis and application results.In particular,the missing value after terrain conversion to DEM greatly limits subsequent DEM-based analysis.Based on the principle of raster calculation,this paper calls the corresponding tool of ArcGIS by Python to correct the missing value at the overlapped area of a certain terrain converted to DEM by using the mean of eight valued pixels around the pixel.The results show that the calculation method is highly applicable,reliable,and fast.The data of the corrected and compared values of 306 NoData pixels in the study area are close to the 1∶1 line;the maximum difference between the corrected and compared values is only 3.55 m,and the medium error value is 0.75,which is far below the standard error limit.Calling Numpy through Python greatly improves the calculation speed (10 s),and ArcGIS currently has no tool for directly correcting this method.In contrast,the DEM correction method proposed in this paper can be processed in batch,without processing failures due to memory limit,which greatly improves the work efficiency and has a strong application value for processing digital twin basic data.…”
    Get full text
    Article
  5. 3285

    Fabrication of Hybrid Organic Photovoltaic Devices Using Electrostatic Spray Method by Zhe-Wei Chiu, Yu-Jen Hsiao, Te-Hua Fang, Liang-Wen Ji

    Published 2014-01-01
    “…Hybrid organic photovoltaic devices (OPVDs) are fabricated using the electrostatic spray (e-spray) method and their optical and electrical properties are investigated. …”
    Get full text
    Article
  6. 3286

    Effects of Milling Methods and Cultivars on Physicochemical Properties of Whole-Wheat Flour by Min Jeong Kang, Mi Jeong Kim, Han Sub Kwak, Sang Sook Kim

    Published 2019-01-01
    “…The aim of the present study was to investigate the influence of milling methods (jet mill (JM) and hammer mill (HM)) and wheat cultivars (Keumkang (K), Jokyung (J), and Anzunbaengi (A)) on physicochemical and dough properties of whole-wheat flour (WWF). …”
    Get full text
    Article
  7. 3287
  8. 3288

    Impacts of Filtration on Contrast-Detail Detectability of an X-ray Imaging System

    Published 2006-01-01
    “…<p>The purpose of this study is to investigate the impacts of added filtration on the contrast-detail detectability of a digital X-ray imaging system for small animal studies. …”
    Get full text
    Article
  9. 3289

    Man against machine: Debates in the expert community on the lethal autonomous systems by A. Yu. Lipova

    Published 2022-01-01
    Subjects: “…lethal autonomous weapons…”
    Get full text
    Article
  10. 3290

    Research on multi-address time-based blockchain covert communication method by Dongyan HUANG, Kun LI

    Published 2023-02-01
    “…Aiming at the problem of low amount of information carried by the existing block timestamp interval hiding method, a multi-address time-based blockchain covert communication method was proposed.Firstly, the ciphertext was split and transmitted by different addresses.The content of the ciphertext fragment was represented by the block timestamp interval of the address.Then the interval of the blocks was read and counted by the receiver where these addresses were located.Finally, the ciphertext was restored by combination.In addition, in view of the lack of concealment measures in the time-based blockchain covert communication system, a method of adjusting the time interval of transaction initiation was proposed to reduce the probability of address specificity caused by covert communication behavior.The experimental results verify that the transmission rate of the proposed method is about n times higher than that of the time-based blockchain covert communication method when n addresses are involved.…”
    Get full text
    Article
  11. 3291

    A Novel Balancing Method for Rotor Using Unsupervised Deep Learning by Shun Zhong, Liqing Li, Huizheng Chen, Zhenyong Lu

    Published 2021-01-01
    “…A novel balancing method for rotor based on unsupervised deep learning is proposed in this paper. …”
    Get full text
    Article
  12. 3292
  13. 3293

    Network Planning Method for Capacitated Metro-Based Underground Logistics System by Jianjun Dong, Wanjie Hu, Shen Yan, Rui Ren, Xiaojing Zhao

    Published 2018-01-01
    “…This paper aims at developing a metro system-based ULS network planning method. First, an evaluation model of underground freight volume was proposed considering service capacity, freight flow, and regional accessibility. …”
    Get full text
    Article
  14. 3294

    Strong measurement method of evidence conflict based on earth mover’s distance by Xin WANG, Wei FU

    Published 2022-05-01
    “…Aiming at the problem that the conflict factor k in D-S evidence theory cannot effectively measure the degree of conflict between two bodies of evidence (BoEs), the expected features of evidence conflict strong measurement function (ECSMF) were proposed, and then a new method of evidence conflict measurement based on earth mover’s distance (EMD)was put forward.The same number of focal elements between different BoEs was not required and the evidence conflict with non-singleton propositions could be directly calculate.The proposed method did not require The theory and experiments show that the size of conflict measure proposed can correctly represent the degree of conflict between two BoEs, and has all the expected features of ECSMF, which is an effective method of evidence conflict strong measurement.…”
    Get full text
    Article
  15. 3295

    Malicious code within model detection method based on model similarity by Degang WANG, Yi SUN, Chuanxin ZHOU, Qi GAO, Fan YANG

    Published 2023-08-01
    “…The privacy of user data in federated learning is mainly protected by exchanging model parameters instead of source data.However, federated learning still encounters many security challenges.Extensive research has been conducted to enhance model privacy and detect malicious model attacks.Nevertheless, the issue of risk-spreading through malicious code propagation during the frequent exchange of model data in the federated learning process has received limited attention.To address this issue, a method for detecting malicious code within models, based on model similarity, was proposed.By analyzing the iterative process of local and global models in federated learning, a model distance calculation method was introduced to quantify the similarity between models.Subsequently, the presence of a model carrying malicious code is detected based on the similarity between client models.Experimental results demonstrate the effectiveness of the proposed detection method.For a 178MB model containing 0.375MB embedded malicious code in a training set that is independent and identically distributed, the detection method achieves a true rate of 82.9% and a false positive rate of 1.8%.With 0.75MB of malicious code embedded in the model, the detection method achieves a true rate of 96.6% and a false positive rate of 0.38%.In the case of a non-independent and non-identically distributed training set, the accuracy of the detection method improves as the rate of malicious code embedding and the number of federated learning training rounds increase.Even when the malicious code is encrypted, the accuracy of the proposed detection method still achieves over 90%.In a multi-attacker scenario, the detection method maintains an accuracy of approximately 90% regardless of whether the number of attackers is known or unknown.…”
    Get full text
    Article
  16. 3296

    Catastrophic and violent tornadoes: a detailed review of physical-mathematical models by Sergey A. Arsen’yev, Lev V. Eppelbaum

    Published 2024-11-01
    “… Significant progress has been made in forecasting hazardous atmospheric events such as catastrophic and severe tornadoes (level EF3-EF5). A method for nonstochastic long-term forecasting using the pattern recognition theory and Fourier analysis has recently been developed. …”
    Get full text
    Article
  17. 3297

    Discussion on Automatic Service Open Method Based on Smart TV Terminal by Weijia Shi, Liding Jia, Liangjie Zhu

    Published 2013-04-01
    “…Based on the analysis of the evolution of smart TV terminal,the traditional way of service open by operators and the changes aroused from the appearing of smart TV terminal were introduced.According to the changes above,two alternative ways of automatic service open were presented and compared in detail in order to put forward the suggestions for the way of automatic service open.…”
    Get full text
    Article
  18. 3298
  19. 3299

    Investigating feature extraction by SIFT methods for prostate cancer early detection by Shadan Mohammed Jihad, Ali A. Alsaud, Firas H. Almukhtar, Shahab Kareem, Raghad Zuhair Yousif

    Published 2025-03-01
    “…This research study, therefore, seeks to explore the effectiveness of the SIFT method in improving feature extraction toward the accurate detection of incipient prostate cancer. …”
    Get full text
    Article
  20. 3300

    Transformer-based travel time estimation method for plateau and mountainous environments by Guangjun Qu, Kefa Zhou, Rui Wang, Dong Li, Yingpeng Lu, Zhihong Lv, Dequan Zhao, Aijun Zhang, Qing Zhang

    Published 2025-02-01
    “…The objective of this study is to develop TTE methods that are applicable to wilderness areas characterized by plateau and mountainous topography. …”
    Get full text
    Article