Showing 1,001 - 1,020 results of 54,221 for search 'Methil~', query time: 3.97s Refine Results
  1. 1001

    ADAPTIVE METHOD OF STABILIZATION THE AGGLUTINANT SANDS CHARACTERISTICS by O. P. Ponomarenko, S. G. Pelyh

    Published 2005-05-01
    “…The method of stabilization of the sand blend technological characteristics is developed on the basis of flexible control of the mix preparation process taking into account the failures and changes of the technological equipment parameters and also the composition and characteristics of source materials.…”
    Get full text
    Article
  2. 1002

    Qualitative methods: the missing link in orthopaedic research by Samantha Jones, Sarah Tyson

    Published 2025-01-01
    Subjects: “…qualitative methods…”
    Get full text
    Article
  3. 1003
  4. 1004
  5. 1005

    Intelligent Scheduling Method Supporting Stadium Sharing by Lei Fang

    Published 2021-01-01
    “…The booking of the shared stadium can be regarded as a mobile edge computing (MEC) scenario, and the problem can be transformed into task scheduling research under MEC through intelligent scheduling method. When using edge computing (EC) technology for service calculation, the mobile terminal needs to offload the service to the edge computing server. …”
    Get full text
    Article
  6. 1006

    Hybrid Evaluation Method of Bridge Bearing Capacity by Pengzhen Lu, Said M. Easa, Ying Wu, Zhenyi Qi, Yizhou Zhuang

    Published 2024-09-01
    “… This study proposes a new method to assess the bearing capacity of similar bridges while avoiding the disadvantages of costly static loading tests. …”
    Get full text
    Article
  7. 1007

    Enhanced method based on virtual registers rotation by Yan PAN, Wei LIN

    Published 2018-05-01
    “…Sematic attacks based on the data flow analysis bring big challenges to the code obfuscation.Concerning the data flow of virtual machine based (VM-based) code protection,the method transfers the mapping relation between the virtual registers and the op-code of the bytecode during executing,which means the uncertainty and complexity of the data flow during interpretive execution of the bytecode.In addition,three policies are proposed to address the problem that how to choose the length of rotation for each bytecode,which grows complexity of the protection.Finally,a prototype of VRR-VM (virtual machine protection system based on virtual registers rotation) was implemented.Experiment results show that the method is effective and applicable for anti-reversing.…”
    Get full text
    Article
  8. 1008

    Comparison of Mechanical Impedance Methods for Vibration Simulation by Jeffrey A. Gatscher, Grzegorz Kawiecki

    Published 1996-01-01
    “…The ways in which these effects can be considered were evaluated, and comparison of three impedance methods was accomplished based on a cumulative damage criterion. …”
    Get full text
    Article
  9. 1009
  10. 1010

    Application of identification method for control of bearing wear by V. Yu. Kobenko, S. O. Frolov, R. F. Ganeev

    Published 2022-06-01
    “…The work is devoted to the problem of bearings wear control of during their operation. Well-known methods for control the state of bearings to solve this problem are described. …”
    Get full text
    Article
  11. 1011
  12. 1012

    DAMAGE IDENTIFICATION METHOD BASED KRIGING MODEL by MA JingJing, YIN Hong, PENG ZhenRui, DONG KangLi

    Published 2020-01-01
    “…To improve damage identification efficiency,a damage identification method based on Kriging model was proposed. Sample points were chosen based on Latin hypercube sampling,and Kriging model was built using acceleration frequency response functions corresponding to the damage parameters;then,Kriging model with good precision was used to replace the finite element model to participate in the optimization process. …”
    Get full text
    Article
  13. 1013
  14. 1014
  15. 1015

    To the question of the methodic of universities’ scientific potential appreciation by D. Znamenskiy

    Published 2019-09-01
    “…The main purpose of the study is to develop, substantiate and test methods for assessing the scientific potential of universities. …”
    Get full text
    Article
  16. 1016

    Guidance for Processing Smoked Seafood in Retail Operations by Keith R. Schneider, Victor Garrido, W. Steve Otwell, Ray Mobley

    Published 2005-04-01
    “…FSHN0503/FS111: Guidance for Processing Smoked Seafood in Retail Operations (ufl.edu) …”
    Get full text
    Article
  17. 1017
  18. 1018

    On π-Images of Locally Separable Metric Spaces by Tran Van An, Nguyen Van Dung

    Published 2008-01-01
    “…We characterize π-images of locally separable metric spaces by means of covers having π-property. …”
    Get full text
    Article
  19. 1019

    RASP based Web security detection method by Hang YU, Shuai WANG, Huamin JIN

    Published 2020-11-01
    “…At present,the traditional Web security detection methods act on the input and output of the program,which can not prevent malicious code entering the program after being distorted and confused,and it is difficult to meet the new requirements of Web application security protection.Based on the in-depth analysis of the risk of traditional data flow monitoring methods,combined with the technical characteristics of rasp,a Web security detection method based on rasp was proposed.The rasp probe was embedded in the parameters of authority discrimination function,system command execution function and database operation function in Web application,and the change of data flow was detected in real-time at the code interpreter level.This method was implemented based on Java language.It was proved in the laboratory that this method is better than the traditional Web security detection method in accuracy and detection time.Finally,the deployment and application scenarios of this method were analyzed and proposed.…”
    Get full text
    Article
  20. 1020

    The dual integral equation method in hydromechanical systems by N. I. Kavallaris, V. Zisis

    Published 2004-01-01
    “…Some hydromechanical systems are investigated by applying the dual integral equation method. In developing this method we suggest from elementary appropriate solutions of Laplace's equation, in the domain under consideration, the introduction of a potential function which provides useful combinations in cylindrical and spherical coordinates systems. …”
    Get full text
    Article