Showing 3,321 - 3,340 results of 54,221 for search 'Methil~', query time: 4.06s Refine Results
  1. 3321

    Adaptive Hierarchical Collocation Method for Solving Fractional Population Diffusion Model by Linqiang Yang, Yafei Liu, Hongmei Ma, Xue Liu, Shuli Mei

    Published 2023-01-01
    “…The algorithm’s complexity analysis illustrates the concise function’s efficiency advantage over the original expression when solving time-fractional PDEs. Comparatively, the method exhibits superior numerical performance to alternative wavelet spectral methods like the Shannon–Gabor wavelet.…”
    Get full text
    Article
  2. 3322
  3. 3323

    Invasive Treatment of Lower Limb Varicose Veins - Comparison of Treatment Methods by Ewa Piekarska, Krzysztof Dobrzeniecki, Remigiusz Luter

    Published 2025-01-01
    “…Brief description of the state of knowledge: Numerous methods for treating lower limb varicose veins are available. …”
    Get full text
    Article
  4. 3324

    Some Almost Generalized (ψ,ϕ)-Contractions in G-Metric Spaces by Hassen Aydi, Sana Hadj Amor, Erdal Karapinar

    Published 2013-01-01
    “…In this paper, we introduce some almost generalized (ψ,ϕ)-contractions in the setting of G-metric spaces. We prove some fixed points results for such contractions. …”
    Get full text
    Article
  5. 3325

    A Simple Visualization Method for Three-Dimensional (3D) Network by Sangkwon Kim, Chaeyoung Lee, Jintae Park, Sungha Yoon, Yongho Choi, Junseok Kim

    Published 2021-01-01
    “…As a result, network diagrams appeared in various forms, and methods for visualizing the network information are being developed. …”
    Get full text
    Article
  6. 3326
  7. 3327
  8. 3328
  9. 3329
  10. 3330

    DDoS attack detection method based on conditional entropy and GHSOM in SDN by Junfeng TIAN, Liuling QI

    Published 2018-08-01
    “…Software defined networking (SDN) simplifies the network architecture,while the controller is also faced with a security threat of “single point of failure”.Attackers can send a large number of forged data flows that do not exist in the flow tables of the switches,affecting the normal performance of the network.In order to detect the existence of this kind of attack,the DDoS attack detection method based on conditional entropy and GHSOM in SDN (MBCE&G) was presented.Firstly,according to the phased features of DDoS,the damaged switch in the network was located to find the suspect attack flows.Then,according to the diversity characteristics of the suspected attack flow,the quaternion feature vector was extracted in the form of conditional entropy,as the input features of the neural network for more accurate analysis.Finally,the experimental environment was built to complete the verification.The experimental results show that MBCE&G detection method can effectively detect DDoS attacks in SDN network.…”
    Get full text
    Article
  11. 3331
  12. 3332

    Application of invariant moment method for HAPS ISAR imaging with micro parts by Zhao-qun QI, Xiao-jun JING, Si-qing YOU, Hai-bin SUN

    Published 2013-08-01
    “…To resolve the micromotion in the HAPS(high altitude platform station) ISAR system,the invariant moment method for ISAR imaging with micro parts was proposed.Firstly,invariant moment tool was applied to classify the echoes of different sub-aperture,and then the sub-aperture echoes reducing the quality of image was separated.Finally the remaining echoes were used to do sub-aperture splicing imaging.From the simulation results,the algorithm is proved to be simple and can improve the quality of ISAR image obviously.…”
    Get full text
    Article
  13. 3333

    A New Linearizing Method for Sum of Linear Ratios Problem with Coefficients by Hongwei Jiao, Yongqiang Chen

    Published 2014-01-01
    “…A new linearizing method is presented for globally solving sum of linear ratios problem with coefficients. …”
    Get full text
    Article
  14. 3334

    Some Fixed-Point Results for a -Weak Contraction in -Metric Spaces by Wasfi Shatanawi, Mihai Postolache

    Published 2012-01-01
    “…We introduce the concepts of a -weak contraction mapping of types and and we establish some fixed point theorems for a -weak contraction mapping of types and in complete -metric spaces. Our results generalize several well-known comparable results in the literature.…”
    Get full text
    Article
  15. 3335

    Membership inference attack and defense method in federated learning based on GAN by Jiale ZHANG, Chengcheng ZHU, Xiaobing SUN, Bing CHEN

    Published 2023-05-01
    “…Aiming at the problem that the federated learning system was extremely vulnerable to membership inference attacks initiated by malicious parties in the prediction stage, and the existing defense methods were difficult to achieve a balance between privacy protection and model loss.Membership inference attacks and their defense methods were explored in the context of federated learning.Firstly, two membership inference attack methods called class-level attack and user-level attack based on generative adversarial network (GAN) were proposed, where the former was aimed at leaking the training data privacy of all participants, while the latter could specify a specific participant.In addition, a membership inference defense method in federated learning based on adversarial sample (DefMIA) was further proposed, which could effectively defend against membership inference attacks by designing adversarial sample noise addition methods for global model parameters while ensuring the accuracy of federated learning.The experimental results show that class-level and user-level membership inference attack can achieve over 90% attack accuracy in federated learning, while after using the DefMIA method, their attack accuracy is significantly reduced, approaching random guessing (50%).…”
    Get full text
    Article
  16. 3336

    Approximate Solution of Urysohn Integral Equations Using the Adomian Decomposition Method by Randhir Singh, Gnaneshwar Nelakanti, Jitendra Kumar

    Published 2014-01-01
    “…We apply Adomian decomposition method (ADM) for obtaining approximate series solution of Urysohn integral equations. …”
    Get full text
    Article
  17. 3337

    Assessment of Coumarin Levels in Ground Cinnamon Available in the Czech Retail Market by Jana Blahová, Zdeňka Svobodová

    Published 2012-01-01
    “…The objective of this study was to determine the coumarin content of ground cinnamon purchased from retail markets in the Czech Republic. No sample was labelled with information on the botanical source, but, in some cases, the countries of origin were specified. …”
    Get full text
    Article
  18. 3338

    The Assessment of the Green Development of the Tobacco Industry Using a Multicriteria Method by Giedrė Lapinskiene, Martynas Blazaitis, Dainora Gedvilaite, Neringa Slavinskaite

    Published 2025-02-01
    “…The industry also involves numerous stakeholders, including farmers, manufacturers, distributors, retailers, regulators, and consumers. The aim of this research is to select the most relevant environmental criteria for the green development of the tobacco industry. …”
    Get full text
    Article
  19. 3339

    Use of New Methods to Determine the Inputs Effective in Estimating Soil Temperature by Babak Mohammadi

    Published 2022-09-01
    “…In the main components analysis method, four main components for the synoptic station of Tabriz were selected. …”
    Get full text
    Article
  20. 3340

    Optimization of Process Parameters for ε-Polylysine Production by Response Surface Methods by Maxiaoqi Zhu, Zhicai Zhang, Yiqiuyi Liu, Feng Wang, Lili Xia, Jianwei Xia, Hongming Guo

    Published 2016-01-01
    “…In the present work, we evaluated the ε-PL adsorption performances of HZB-3B and D155 resins and optimized the adsorption and desorption conditions by single-factor test, response surface method, and orthogonal design. The complexes of resin and ε-PL were characterized by SEM and FITR. …”
    Get full text
    Article