Showing 941 - 960 results of 54,221 for search 'Methil~', query time: 3.86s Refine Results
  1. 941

    A Survey of Methods for Gas-Lift Optimization by Kashif Rashid, William Bailey, Benoît Couët

    Published 2012-01-01
    “…This paper presents a survey of methods and techniques developed for the solution of the continuous gas-lift optimization problem over the last two decades. …”
    Get full text
    Article
  2. 942

    Kodaira-Spencer anomalies with Stora-Zumino method by Davide Rovere

    Published 2025-01-01
    “…Abstract Holomorphic diffeomorphism anomalies of 2 n-dimensional gravitational theories in Beltrami parametrisation (Kodaira-Spencer anomalies) are computed in the brst framework, using an extension of the Stora-Zumino method. This method, which allows to compute anomalies in a very concise way, makes manifest the topological origin of anomalies. …”
    Get full text
    Article
  3. 943

    Software diversification method based on binary rewriting by Benwei HE, Yunfei GUO, Yawen WANG, Qingfeng WANG, Hongchao HU

    Published 2023-04-01
    “…Software diversity is an effective defense against code-reuse attacks, but most existing software diversification technologies are based on source code.Obtaining program source code may be difficult, while binary files are challenging to disassemble accurately and distinguish between code pointers and data constants.This makes binary file diversification difficult to generate high levels of randomization entropy, and easily compromised by attackers.To overcome these challenges, a binary file oriented software diversification method was proposed based on static binary rewriting technology, namely instruction offset randomization.This method inserted NOP instructions of varying byte lengths before program instructions with a certain probability, reducing the number of unintended gadgets in the program and randomly offsetting the original instruction address.This disrupts the program’s original memory layout and increases the cost of code-reuse attacks.At the same time, an optimization strategy based on hot code was designed for this method.The execution times of basic blocks in binary files were obtained by dynamic pile insertion, so as to adjust the NOP instruction insertion probability in each basic block.The higher the execution frequency, the fewer NOP instructions were inserted into the basic block, which can ensure lower performance overhead and produce higher randomization entropy.In the experimental part, the SPEC benchmark program was used to test the optimized method from the aspects of performance overhead, gadget survival rate and file size.The results show that a 15% insertion probability achieves the best effect, with an average gadget survival rate of less than 1.49%, increasing attackers’ difficulty in reusing the same gadget attack chain.Furthermore, only a 4.1% operation overhead and 7.7% space overhead are added, maintaining high levels of security.…”
    Get full text
    Article
  4. 944
  5. 945
  6. 946

    Video text extraction method based on clustering by SONG Yan1, LIU An-an1, ZHANG Yong-dong1, LIN Shou-xun1

    Published 2009-01-01
    “…A new method for video text extraction in order to overcome the weakness of existing methods was proposed.First,multi-scale text location and text region refinement in text location step were adopted.Then an improved K-means clustering method was used to segment text regions to obtain a binarized image in text segmentation step.Finally,OCR software was used to recognize text.The results of experiment show that the method can effctively used in sensitive words detection in videos from the Internet.…”
    Get full text
    Article
  7. 947
  8. 948
  9. 949

    Early Stroke Prediction Methods for Prevention of Strokes by Mandeep Kaur, Sachin R. Sakhare, Kirti Wanjale, Farzana Akter

    Published 2022-01-01
    “…In India where cases of strokes are rising, there is a need to explore noninvasive cheap methods for the diagnosis of early strokes. Hence, this problem has motivated us to conduct the study presented in this paper. …”
    Get full text
    Article
  10. 950

    Transmitted Waveform Design Based on Iterative Methods by Bin Wang, Jinkuan Wang, Xin Song, Fengming Xin

    Published 2013-01-01
    “…We consider two situations of no clutter and clutter and use Newton method and interior point method to solve the optimization problem. …”
    Get full text
    Article
  11. 951

    Development of the membrane ceiling method for in vitro spermatogenesis by Maki Kamoshita, Hiroki Shirai, Hiroko Nakamura, Tetsuya Kishimoto, Yuki Hatanaka, Daisuke Mashiko, Katsuhiro Esashika, Jingjing Yang, Satoshi Yamasaki, Takehiko Ogawa, Hiroshi Kimura, Masahito Ikawa

    Published 2025-01-01
    “…Testis organ culture using the gas-liquid interphase method has been shown to support spermatogenesis in mice and rats. …”
    Get full text
    Article
  12. 952
  13. 953
  14. 954

    Fuzzy Similar Priority Method for Mixed Attributes by Jinshan Ma, Changsheng Ji, Jing Sun

    Published 2014-01-01
    “…Fuzzy similar priority ratio method is to select the most suitable one to the specific object from feasible alternatives. …”
    Get full text
    Article
  15. 955

    Relative Displacement Method for Track-Structure Interaction by Frank Schanack, Óscar Ramón Ramos, Juan Patricio Reyes, Marcos J. Pantaleón

    Published 2014-01-01
    “…The authors developed an alternative analysis method, which they call the relative displacement method. …”
    Get full text
    Article
  16. 956
  17. 957

    Thoracic Ultrasound in Cattle: Methods, Diagnostics, and Prognostics by Luis F. B. B. Feitoza, Brad J. White, Robert L. Larson

    Published 2025-01-01
    “…Compared to traditional diagnostic methods like auscultation or radiography, TUS provides superior accuracy in detecting both subclinical and advanced respiratory conditions, particularly in high-risk populations. …”
    Get full text
    Article
  18. 958
  19. 959
  20. 960