Showing 781 - 800 results of 54,221 for search 'Methil~', query time: 4.31s Refine Results
  1. 781

    Gripping Success Metric for Robotic Fruit Harvesting by Dasom Seo, Il-Seok Oh

    Published 2024-12-01
    “…Recently, computer vision methods have been widely applied to agricultural tasks, such as robotic harvesting. …”
    Get full text
    Article
  2. 782

    Guidance for Processing Beef Jerky in Retail Operations by Keith R. Schneider, Victor Garrido, W. Steve Otwell, Ray Mobley

    Published 2005-04-01
    “… This recommended guidance is for specialty meat products processed at retail, for display and distribution at retail. This document is FSHN05-02, one of a series of the Food Science and Human Nutrition Department, Florida Cooperative Extension Service, IFAS, University of Florida, Gainesville, FL 32611. …”
    Get full text
    Article
  3. 783
  4. 784

    Anomaly Monitoring Method for Key Components of Satellite by Jian Peng, Linjun Fan, Weidong Xiao, Jun Tang

    Published 2014-01-01
    “…This paper presented a fault diagnosis method for key components of satellite, called Anomaly Monitoring Method (AMM), which is made up of state estimation based on Multivariate State Estimation Techniques (MSET) and anomaly detection based on Sequential Probability Ratio Test (SPRT). …”
    Get full text
    Article
  5. 785

    Perturbation Methods for the Eigencharacteristics of Symmetric and Asymmetric Systems by Philip D. Cha, Austin Shin

    Published 2018-01-01
    “…They will be referred to as the straightforward perturbation method, the incremental perturbation method, and the triple product method. …”
    Get full text
    Article
  6. 786

    APPLICATION OF THE METHOD OF LEAN PRODUCTION IN THE SERVICES SECTOR by A. Dmitriev, N. Barkova

    Published 2019-09-01
    “…The explanation of the essence of the method of lean production has been given and its goals. …”
    Get full text
    Article
  7. 787
  8. 788

    Knowledge Graph Completion With Pattern-Based Methods by Maryam Sabet, Mohammadreza Pajoohan, Mohammad Reza Moosavi

    Published 2025-01-01
    “…Experiments have demonstrated that the proposed method is superior to the state-of-the-art methods and that pattern extraction is effective for knowledge graph completion tasks.…”
    Get full text
    Article
  9. 789

    An Improved Speed Sensing Method for Drive Control by Manuel R. Arahal, Manuel G. Satué, Juana M. Martínez-Heredia, Francisco Colodro

    Published 2025-01-01
    “…In modern drive control methods, the actual mechanical speed is needed for both loops. …”
    Get full text
    Article
  10. 790

    On Asymptotic Pointwise Contractions in Modular Metric Spaces by Afrah A. N. Abdou

    Published 2013-01-01
    “…In this paper we study and prove some new fixed points theorems for pointwise and asymptotic pointwise contraction mappings in modular metric spaces.…”
    Get full text
    Article
  11. 791

    Dynamic spectrum access method for femtocells in LTE by Xu-zhou ZUO, Wei-wei XIA, Lian-feng SHEN

    Published 2015-01-01
    “…Dynamic spectrum access method for femtocells in LTE using cognitive radio method to meet the communication requestions was investigated.An uplink sensing method was proposed.By this method,femtocells could not only identify occupied spectrums but also identify service categories of those spectrums.A dynamic spectrum assess method of power control and frequency hopping for femtocells that ensured a low pre-definable performance impact to macro users was proposed.The femtocell could adopt power control to access the spectrum that carried data service while adopt frequency hopping to access the spectrum that carried voice service.Simulation results show that the downlink throughput of the femtocell can be significantly increased by using proposed spectrum access method.…”
    Get full text
    Article
  12. 792

    Intrusion detection method based on machine learning by TIAN Xin-guang1, GAO Li-zhi2, ZHANG Er-yang1

    Published 2006-01-01
    “…A new intrusion detection method was presented based on machine learning for intrusion detection systems using shell commands as audit data.In the method,multiple dictionaries of shell command sequences of different lengths were constructed to represent the normal behavior profile of a network user.During the detection stage,the similarities between the command sequences generated by the monitored user and the sequence dictionaries were calculated.These similarities were then smoothed with sliding windows,and the smoothed similarities were used to determine whether the monitored user’s behaviors were normal or anomalous.The results of the experience show the method can achieve higher detection accuracy and shorter detection time than the instance-based method presented by Lane T.…”
    Get full text
    Article
  13. 793

    MODELS AND METHODS FOR FORMING REGIONAL CORPORATE STRUCTURES by K. Gerasimov

    Published 2019-11-01
    “…The basic models, mechanisms and methods of integration of regional corporate structures have been presented. …”
    Get full text
    Article
  14. 794
  15. 795

    Blasting Energy Analysis of the Different Cutting Methods by Ke Man, Xiaoli Liu, Ju Wang, Xiyong Wang

    Published 2018-01-01
    “…Based on the smooth blasting method, the blasting parameters of the Beishan exploration tunnel have been designed. …”
    Get full text
    Article
  16. 796
  17. 797
  18. 798

    The Metric Dimension of Some Generalized Petersen Graphs by Zehui Shao, S. M. Sheikholeslami, Pu Wu, Jia-Biao Liu

    Published 2018-01-01
    “…In this paper, we first extend the results of the metric dimension of P(n,3) and P(n,4) and study bounds on the metric dimension of the families of the generalized Petersen graphs P(2k,k) and P(3k,k). …”
    Get full text
    Article
  19. 799
  20. 800