Showing 521 - 540 results of 54,221 for search 'Methil~', query time: 4.28s Refine Results
  1. 521

    Asymptotic Methods for Solitary Solutions and Compactons by Ji-Huan He

    Published 2012-01-01
    “…Particular attention is paid throughout the paper to giving an intuitive grasp for the variational approach, the Hamiltonian approach, the variational iteration method, the homotopy perturbation method, the parameter-expansion method, the Yang-Laplace transform, the Yang-Fourier transform, and ancient Chinese mathematics. …”
    Get full text
    Article
  2. 522
  3. 523
  4. 524

    A method of summability of Lagrange interpolation by Detlef H. Mache

    Published 1994-01-01
    “…Therefore we improve with the linear summation method Ln* a result presented in [12] and we also point out a solution for a problem of P.L.Butzer in the proceedings of the Budapest conference in 1980.…”
    Get full text
    Article
  5. 525

    Scientific School “Interactive Methods of Management” by V. N. Knyazev

    Published 2016-03-01
    Subjects: “…interactive methods…”
    Get full text
    Article
  6. 526

    Remarks on Ultrametrics and Metric-Preserving Functions by Prapanpong Pongsriiam, Imchit Termwuttipong

    Published 2014-01-01
    “…Functions whose composition with every metric is a metric are said to be metric-preserving. …”
    Get full text
    Article
  7. 527

    Methods of Changing or Correcting the Date of Birth by Reza Valavioun, Hamid farhami

    Published 2024-06-01
    “…Legal conditions are possible through three references and five methods. One method is to act through the commission to determine the age of the subject of the single article of the law on preserving the validity of registered documents, etc. …”
    Get full text
    Article
  8. 528

    Kernelised reference‐wise metric learning by Meng Wu, Kai Luo, Daijin Li, Jun Zhou

    Published 2017-03-01
    Subjects: “…Kernelised reference wise metric learning…”
    Get full text
    Article
  9. 529

    An Adjustment Method for the Customized Trains of the Railway by Xiaojuan Li, Jiana Shi, Li Yang, Hongwei Wang, Miao Yan

    Published 2020-01-01
    “…In order to establish a comprehensive method for the CT operation plan, the paper proposes an intention survey method to obtain the passenger travel wishes data. …”
    Get full text
    Article
  10. 530

    KPDR : An Effective Method of Privacy Protection by Zihao Shen, Wei Zhen, Pengfei Li, Hui Wang, Kun Liu, Peiqian Liu

    Published 2021-01-01
    “…To solve the problem of user privacy disclosure caused by attacks on anonymous areas in spatial generalization privacy protection methods, a K and P Dirichlet Retrieval (KPDR) method based on k-anonymity mechanism is proposed. …”
    Get full text
    Article
  11. 531
  12. 532

    METHODICAL PROBLEM IN THE RESEARCHES OF EDUCATIONAL HISTORY by Hüseyin ŞİMŞEK

    Published 2009-05-01
    “…The main aim of this study is to attract attention to the methodical problem in research of educational history. …”
    Get full text
    Article
  13. 533

    Methods of Bank Valuation in the Age of Globalization by A. Karminsky, E. Frolova

    Published 2015-06-01
    “…For strategic management residual income-oriented methods most useful when expected cash flows are negative throughout the forecast period. …”
    Get full text
    Article
  14. 534

    Sieve Method for Polynomial Linear Equivalence by Baocang Wang, Yupu Hu

    Published 2013-01-01
    “…By combining the three sieves, we propose a sieve method for the PLE problem. As an application of our sieve method, we show that it is infeasible to construct public key encryption schemes from the PLE problem.…”
    Get full text
    Article
  15. 535
  16. 536

    Design of multi-key encryption method by Yuqing ZHONG, Hao WANG, Zebing LIN, Min WANG, Liye CHEN

    Published 2020-11-01
    “…In order to improve the security in the process of information transmission,the current encryption methods were studied,and the research status was reported which increased the security of encryption by processing the key.According to the principle of segmenting and grouping data in the process of sending and encrypting,a method of multi-key encryption was designed:the segmenting key group and grouping key group were generated by the source key and random number,and the corresponding key was selected for each segmented and grouped data by its sequence number according to the matching algorithm.This method realized the encryption of multi-key in the process of information transmission.Finally,on the one hand,MATLAB was used to test and verify the encryption efficiency of this method.On the other hand,the security of this method was analyzed from the theoretical and mathematical perspective,comparing with the traditional method.It is concluded that this method can increase the security of the traditional method without too much cost much cost.…”
    Get full text
    Article
  17. 537

    Modification of the Quasilinearization Method for the Inverse Problem by Lenka Celechovská-Kozáková

    Published 2007-01-01
    “…We propose a new modification of Bellman's quasilinearization method such that at any iteration step, it works with an approximate solution of the original nonlinear system and with new approximation of parameters α(k+1) which are close enough to the previous ones. …”
    Get full text
    Article
  18. 538
  19. 539
  20. 540

    Methods to Quantify In-Field Nutrient Leaching by Bibek Acharya, Vivek Sharma, Charles Barrett, Sudeep Singh Sidhu, Lincoln Zotarelli, Michael D. Dukes

    Published 2023-01-01
    “… This publication summarizes the basic concepts of three most-used NO3-N leaching quantification methods in field conditions. Written by Bibek Acharya, Vivek Sharma, Charles Barrett, Sudeep Singh Sidhu, Lincoln Zotarelli, and Michael D. …”
    Get full text
    Article