Showing 1,281 - 1,300 results of 54,221 for search 'Methil~', query time: 4.65s Refine Results
  1. 1281
  2. 1282

    A Prediction Method for the RUL of Equipment for Missing Data by Chen Wenbai, Liu Chang, Chen Weizhao, Liu Huixiang, Chen Qili, Wu Peiliang

    Published 2021-01-01
    “…Experiments are carried out on the commercial modular aero-propulsion system simulation (C-MAPSS) dataset to validate the proposed method. The prediction results show that the proposed method outperforms other methods when packet loss occurs, showing significant improvements in the root mean square error (RMSE) and the score function value.…”
    Get full text
    Article
  3. 1283

    Iterative estimation method for random interleaver of Turbo codes by Jun LIU, Jing LI, Pei-dong YU

    Published 2015-06-01
    “…Channel coding parameter analysis meant reversely analyzing and estimating the coding parameters,and was one of the key techniques for intelligent communication,information interception and so on.Since Turbo codes were widely used in communication systems,parameter estimation for their interleavers was of great importance.Focusing on the random interleaver of Turbo codes,an iterative estimation algorithm based on correlation decision between the soft outputs of the Turbo decoder was presented.The algorithm used soft-decisions of the demodulator output sequence.It overcame the shortcomings of existing methods which often aimed at certain interleaving structures only,and suffered from weak robustness since they used hard-decisions.Simulation results show that the proposed algorithm has better performance and relatively lower complexity,especially in low signal-to-noise ratio cases.…”
    Get full text
    Article
  4. 1284

    Digital Empowerment of the Innovation of Ideological and Political Education Methods by Guo Ling

    Published 2024-01-01
    “…In the digital era, ideological and political education plays a leading role in the field of ideology and politics, and it should make use of big data technology to enhance the cohesion and leadership of the mainstream ideology, to enhance the vividness of ideological and political education by adapting educational content and methods, and to gather the power of ideological and political education by taking digital technology as the basis, breaking through the limitations of time and space and the field, and realizing the collection and sharing of high-quality resources.…”
    Get full text
    Article
  5. 1285

    A Survey of Matrix Completion Methods for Recommendation Systems by Andy Ramlatchan, Mengyun Yang, Quan Liu, Min Li, Jianxin Wang, Yaohang Li

    Published 2018-12-01
    “…This article presents a comprehensive survey of the matrix completion methods used in recommendation systems. We focus on the mathematical models for matrix completion and the corresponding computational algorithms as well as their characteristics and potential issues. …”
    Get full text
    Article
  6. 1286

    Method of diversity software protection based on fusion compilation by Xiaobing XIONG, Hui SHU, Fei KANG

    Published 2020-12-01
    “…For the obvious characteristics and single mode of the existing common protection methods,with the help of the LLVM framework,a diversity software protection method based on fusion compilation was proposed.In the proposed method,the target software is encrypted randomly,and deeply integrated with the bunker code at the compilation level,and the encrypted target software is decrypted by memory execution technology.Then it is executed in the form of no process in memory,and the diversified protection effect of the target software is realized by the diversity of the bunker and the randomness of the fusion strategies.A number of commonly used software are selected as the test case,and the proposed method is tested from the aspects of resource cost,protection effect,comparative experiment and so on.Compared with the traditional methods such as obfuscation and packing,the proposed method has great advantages in anti-static analysis and anti-dynamic debugging,and can effectively resist the mainstream methods of reverse analyzing and cracking.…”
    Get full text
    Article
  7. 1287

    Clinical method, ‘’good clinical practices’’, and medical professionalism by Miguel Ángel Moreno Rodríguez

    Published 2010-12-01
    “…It is pointed out that the clinical method is the scientific or experimental method of science applied to the attention of an individual patient, but in this case the experimental stage is replaced by the confrontation with diagnostic technology. …”
    Get full text
    Article
  8. 1288

    Power emergency assistant decision methods based on CBR by Yongsheng MEN, Shanbao LIU

    Published 2015-12-01
    “…Application of case-based reasoning(CBR)to generate grid infrastructure accidents emergency disposal scheme,can provide auxiliary decision scientific method for emergency people.Through investigation and analysis of the electric accident case,conclude basic situation,disposal process,disposal effect in three aspects of the characteristic attributes presentation framework of power accidents.Search similar case in two methods by means of inductive retrieval and similarity calculation.The determination of membership function of fuzzy attributes by using expert scoring was put forward.Fuzzy attribute similarity by membership functions was calculated and the power accidents case-based reasoning emergency disposal of the auxiliary decision-making process were given.…”
    Get full text
    Article
  9. 1289

    Cloud resource allocation method based on time collaboration by Bo YIN, Yun-yong ZHANG, Zhi-jun WANG, Bing-yi FANG, Wei-bin FENG

    Published 2014-11-01
    “…According to the application in the cloud computing environment load and load change is difficult to predict the amount of real time.A resource allocation method based on cooperative time was designed,the application of this method in the process of operation,according to the load and the task processing time,formulate the resource allocation scheme for multi virtual machine cooperation.The method uses time collaborative to effectively reuse resource,improves the utilization rate of data center resources,and further reduces the cost of operation and maintenance of data center.It has realistic significance to the increase of cloud resource provider profit.…”
    Get full text
    Article
  10. 1290

    Intention embedding method based social bot detection by NIU Hongfeng, LI Jiawei, SONG Yunpeng, CAI Zhongmin

    Published 2024-11-01
    “…Artificial intelligence generated content technology has significantly enhanced the disguise capabilities of social bots, presenting new challenges to existing bot detection methods. By modeling the intentions of social media users through intention representation, a intention embedding method based social bot detection was proposed, thereby avoiding the difficulty of directly detecting bots with enhanced behavioral camouflage at the action level on social platforms. …”
    Get full text
    Article
  11. 1291
  12. 1292

    Performance evaluation metric for statistical learning trading strategies by Jiawei He, Roman N. Makarov, Jake Tuero, Zilin Wang

    Published 2024-12-01
    Subjects: “…multi-class classification metrics…”
    Get full text
    Article
  13. 1293
  14. 1294
  15. 1295
  16. 1296

    Effect of the Synthesis Methods on Hydrophobic Properties of Modified Silicas by Olena V. Goncharuk, Iryna Ya. Sulym, Konrad Terpilowski, Evgeniy M. Pakhlov

    Published 2015-08-01
    “…Composites based on fumed silica with surface hydrophobic groups were synthesized by chemical substitution of silanol groups' proton for trimethylsilyl (TMS) groups, adsorption of poly(dimethylsiloxane) (PDMS) and combined chemical-adsorption methods. Microcalorimetry measurements and values of the wetting contact angle with water (Θ) were obtained to investigate the hydrophobic properties of prepared materials. …”
    Get full text
    Article
  17. 1297

    Opinion mining method on hot topic of micro−blog by Guang-lei ZHANG, Ya-bin XU

    Published 2014-11-01
    “…A method of opinion mining was argued in connection with hot topic of micro-blog.Firstly,opinion sentences are identified by syntactic dependencies templates and support vector machine (SVM).Secondly,the opinion words can be get in opinion sentences by syntactic dependencies and lexical relations,thus they can be displayed clearly.Finally,the experiment proves the effectiveness of this method.…”
    Get full text
    Article
  18. 1298
  19. 1299

    The Alternating Direction Method of Multipliers for Sufficient Dimension Reduction by Sheng Ma, Qin Jiang, Zaiqiang Ku

    Published 2024-01-01
    “…The minimum average variance estimation (MAVE) method has proven to be an effective approach to sufficient dimension reduction. …”
    Get full text
    Article
  20. 1300