Showing 621 - 640 results of 54,221 for search 'Methil~', query time: 4.42s Refine Results
  1. 621
  2. 622

    Implementing Inquiry-Based Teaching Methods by Anna J. Warner, Brian E. Myers

    Published 2009-01-01
    “…AEC395/WC076: Implementing Inquiry-Based Teaching Methods (ufl.edu) …”
    Get full text
    Article
  3. 623

    School teenager knowledge on contraceptive methods by Mariane Cristina Carlucci Molina, Patrica Grazieli Silverio Stoppiglia, Christine Baccarat de Godoy Martins, Lidiane Cristina da Silva Alencastro

    Published 2015-01-01
    “…The study aimed evaluation of the knowledge on contraceptive methods and their utilization among adolescents of the secondary grade of public schools in Cuiaba-MT. …”
    Get full text
    Article
  4. 624
  5. 625
  6. 626

    Secure controlling method for scalable botnets by Qiang LIU, Pengfei LI, Zhangjie FU

    Published 2023-02-01
    “…., internet of things (IoT) devices.Future botnets will become more cross-platform and stealthy, which introduces severe security risks to cyberspace.Therefore, in-depth research on botnets can offer study targets to corresponding defensive studies, which is very meaningful for designing an architecture to secure the next-generation cyberspace.Hence, an HTTP-based scalable botnet framework was proposed to address the problems of compatibility, stealthiness and security.Specifically, the framework adopted a centralized controlling model.Moreover, it used the HTTP protocol as the designed botnet’s communication protocol and block encryption mechanisms based on symmetric cryptography to protect the botnet’s communication contents.Furthermore, a secure control mechanism for multi-platform botnets was designed.In particular, the proposed mechanism utilized source-level code integration and cross-compilation techniques to solve the compatibility challenge.It also introduced encrypted communication with dynamic secret keys to overcome the drawbacks of network traffic regularity and ease of analysis in traditional botnets.Moreover, it designed server migration and reconnection mechanisms to address the weakness of single-point-failure in centralized botnet models.Simulation results in three experimental scenarios with different levels of botnet controllability show that there is a linear relationship between the size of a botnet and the service overhead of the related C&C servers.In addition, under the condition of the same botnet scale, a higher level of controllability introduces a higher throughput and a greater system overhead.The above results demonstrate the effectiveness and the practical feasibility of the proposed method.…”
    Get full text
    Article
  7. 627

    Lie Group Method of the Diffusion Equations by Jian-Qiang Sun, Rong-Fang Huang, Xiao-Yan Gu, Ling Yu

    Published 2014-01-01
    “…The ordinary differential equations are solved by Lie group method and the explicit Runge-Kutta method. Numerical results showed that Lie group method is more stable than the corresponding explicit Runge-Kutta method.…”
    Get full text
    Article
  8. 628
  9. 629

    Multifractal Framework Based on Blanket Method by Milorad P. Paskaš, Irini S. Reljin, Branimir D. Reljin

    Published 2014-01-01
    “…The first two measures (proposed Methods 1 and 3) support model of image with embedded dimension three, while the other supports model of image embedded in space of dimension three (proposed Method 2). …”
    Get full text
    Article
  10. 630

    Peano compactifications and property S metric spaces by R. F. Dickman

    Published 1980-01-01
    Subjects: “…property S metrics…”
    Get full text
    Article
  11. 631

    Hybrid Method for Point Cloud Classification by Abdurrahman Hazer, Remzi Yildirim

    Published 2025-01-01
    “…In this study, we introduce a novel hybrid ResPOL method that integrates a bidirectional architecture with a newly developed Patch-Offset Lambda (POL) mechanism for feature extraction from point cloud data. …”
    Get full text
    Article
  12. 632

    Hyperbolic Metric Spaces and Stochastic Embeddings by Chris Gartland

    Published 2025-01-01
    “…Stochastic embeddings of finite metric spaces into graph-theoretic trees have proven to be a vital tool for constructing approximation algorithms in theoretical computer science. …”
    Get full text
    Article
  13. 633

    Mergeable adaptive tile coding method by Meng-yu SHI, Quan LIU, Qi-ming FU

    Published 2015-02-01
    “…In order to solve many unnecessary division,mergence supported adaptive tile coding algorithm was presented which would eliminate the unnecessary division.Simulation is conducted on mountain car problem with discrete actions and continuous state space Results show that the proposed method can eliminate the influence of false division in the traditional tile coding method and achieve a more accurate adaptive partition of continuous state space.A higher convergence rate is achieved at the same time.…”
    Get full text
    Article
  14. 634
  15. 635
  16. 636
  17. 637
  18. 638
  19. 639
  20. 640

    A Critique on the Book “The Mixed Method Research” by Mustafa Hamadani

    Published 2020-07-01
    Subjects: “…research method…”
    Get full text
    Article