Showing 961 - 980 results of 54,221 for search 'Methil~', query time: 5.01s Refine Results
  1. 961

    Improvement of Methods for Analysis of Product Resource-Ability by K. N. Malovik

    Published 2012-04-01
    “…The paper considers development of methods in respect of probability theory of extreme values and its application for estimation of resource characteristics. …”
    Get full text
    Article
  2. 962
  3. 963

    Intrusion detection method for IoT in heterogeneous environment by LIU Jing, MU Zelin, LAI Yingxu

    Published 2024-04-01
    “…Ultimately, experimental results derived from the network intrusion dataset BoT-IoT substantiate that, relative to existing methods, the proposed method notably curtails the time expenditure of resource-constrained clients, and improves processing speed by 20.82%, while enhancing the accuracy of intrusion detection by 0.86% in Non-IID conditions.…”
    Get full text
    Article
  4. 964

    Research on methods of workers’ context description in mines by Shimin FENG, Enjie DING, Zhongyu LIU, Xiao YU, Lei MENG, Zhikai ZHAO

    Published 2019-12-01
    “…The worker’s unsafe behavior is the key cause of mine accidents.The human activity is closely related with the context.Ontology is widely used in computer science in the field of information exchange and knowledge sharing,which contains complex structures and various semantics.Firstly,the research on the description of the miners’ situational information in the mining field was summarized.It introduced the general situation in the field of the Internet of things.The importance and necessity of the description of the state information of mine personnel was presented.It introduced the research background,including semantic web,context description and knowledge representation.After that,the method of information description of mine personnel was described.The ontology model was proposed based on oneM2M international technical specifications.In order to construct this ontology,it was drawed on some of the core concepts of oneM2M Base Ontology.The concept classes,attributes and relationships that are specific to the information description of mine personnel were put forward.The context description of mine personnel proposed was aimed at achieving the purposes of specification information description,data semantic labeling,knowledge sharing and reuse.Finally,the conclusions were drawn and the prospect of using the ontology method for context perception and the miners’ unsafe behavior recognition was presented.…”
    Get full text
    Article
  5. 965
  6. 966
  7. 967

    New Method of Solving the Economic Complex Systems by Ya-Juan Yang, Chung-Cheng Chen, Yen-Ting Chen

    Published 2020-01-01
    “…In this study, the authors first develop a direct method used to solve the linear nonhomogeneous time-invariant difference equation with the same number for inputs and outputs. …”
    Get full text
    Article
  8. 968

    Network traffic classification method basing on CNN by Yong WANG, Huiyi ZHOU, Hao FENG, Miao YE, Wenlong KE

    Published 2018-01-01
    “…Since the feature selection process will directly affect the accuracy of the traffic classification based on the traditional machine learning method,a traffic classification algorithm based on convolution neural network was tailored.First,the min-max normalization method was utilized to process the traffic data and map them into gray images,which would be used as the input data of convolution neural network to realize the independent feature learning.Then,an improved structure of the classical convolution neural network was proposed,and the parameters of the feature map and the full connection layer were designed to select the optimal classification model to realize the traffic classification.The tailored method can improve the classification accuracy without the complex operation of the network traffic.A series of simulation test results with the public data sets and real data sets show that compared with the traditional classification methods,the tailored convolution neural network traffic classification method can improve the accuracy and reduce the time of classification.…”
    Get full text
    Article
  9. 969

    Geometry of Hamiltonian Dynamics with Conformal Eisenhart Metric by Linyu Peng, Huafei Sun, Xiao Sun

    Published 2011-01-01
    “…We characterize the geometry of the Hamiltonian dynamics with a conformal metric. After investigating the Eisenhart metric, we study the corresponding conformal metric and obtain the geometric structure of the classical Hamiltonian dynamics. …”
    Get full text
    Article
  10. 970
  11. 971

    RAP detection method based on AP fingerprint by Qing LI, Ayong YE, Zhiqiang YAO, Aimin CHEN

    Published 2018-05-01
    “…The access point (AP) is an integral part of the infrastructure mode in wireless network.While the attacks caused by rogue AP (RAP) divulge a lot of users' privates in a large extent,such as the user's location information,surfing behavior on the Internet and social relations.A RAP detection algorithm based on AP fingerprint was proposed.The validity of AP was judged by the unforgeability and stability of the parameters of beacon frames.And the feasibility and effectiveness of the proposed method were further verified by scheme comparisons and experimental analysis.…”
    Get full text
    Article
  12. 972
  13. 973

    CURRENT TRENDS ON MATERIALS AND METHODS FOR TEETH WHITENING by Maria Mirabela IANCU, Cristiana Ioana TATIA, Alina ROBU, Marius Lucian VASILESCU, Iulian ANTONIAC, Anca Maria FRATILA

    Published 2024-12-01
    “…The purpose of teeth whitening is the removal of intrinsic or extrinsic discoloration via mechanical or chemical techniques that restore the teeth to their natural shade or lighten it, depending on the chosen method. Both the abrasive particles used in mechanical procedures and the oxidant agents applied in chemical bleaching are effective if they are used according to the stain aetiology, however, the risks associated with these products (e.g. potential tooth wear, sensitivity, damage of the enamel or dentin organic matrix) are not negligible. …”
    Get full text
    Article
  14. 974

    Plant Sources, Extraction Methods, and Uses of Squalene by M. Azalia Lozano-Grande, Shela Gorinstein, Eduardo Espitia-Rangel, Gloria Dávila-Ortiz, Alma Leticia Martínez-Ayala

    Published 2018-01-01
    “…The aim of this review is to provide an overview of SQ to establish research focus with special reference to plant sources, extraction methods, and uses.…”
    Get full text
    Article
  15. 975
  16. 976

    Methods to Test the Compressive Strength of Earth Blocks by Guanqi Lan, Sisi Chao, Yihong Wang, Ying Cui

    Published 2021-01-01
    “…However, there is still much debate on the best method to accurately measure the compressive strength of earth blocks. …”
    Get full text
    Article
  17. 977
  18. 978

    Tauberian conditions for a general limitable method by İbrahim Canak, Ümit Totur

    Published 2006-01-01
    “…Let (un) be a sequence of real numbers, L an additive limitable method with some property, and and different spaces of sequences related to each other. …”
    Get full text
    Article
  19. 979

    Fundamentals and Methods for T- and B-Cell Epitope Prediction by Jose L. Sanchez-Trincado, Marta Gomez-Perosanz, Pedro A. Reche

    Published 2017-01-01
    “…Subsequently, we provide a systematic and inclusive review of the most relevant B- and T-cell epitope prediction methods and tools, paying particular attention to their foundations.…”
    Get full text
    Article
  20. 980

    Construction method of double unicast network coding by Baoxing PU, Zhiyi MO

    Published 2020-09-01
    “…In order to use network coding technology for data transmission in double unicast network,a construction method of double unicast network coding was proposed.The pre-coding strategy was implemented at each source node,the random linear network coding combined to the multi-objective optimization evolutionary algorithm was adopted to design the local coding vector of each channel.At the each sink node,the base vector of zero space of matrix was used to eliminate some information interference,and then the two-level pre-coding strategy was used to control the transmission rate at source.Thus,each sink node could be decoded successfully.With the proposed method,the approximate reachable information rate region of double unicast network coding could be determined and the transmission scheme for each vector in the reachable information rate region could be designed.Theoretical derivation and simulation calculation show the effectiveness of the proposed method.…”
    Get full text
    Article