Showing 1,361 - 1,380 results of 54,221 for search 'Methil~', query time: 3.74s Refine Results
  1. 1361

    Engineered Porous Carbon for High Volumetric Methane Storage by J. Romanos, S. Sweany, T. Rash, L. Firlej, B. Kuchta, J.C. Idrobo, P. Pfeifer

    Published 2014-08-01
    “…This paper covers the optimization of methane volumetric storage capacity by controlling the sub-nanometre (<1 nm) and supra-nanometre (1–5 nm) pore volumes. …”
    Get full text
    Article
  2. 1362

    Angular Photometry of Biological Tissue by Ellipsoidal Reflector Method by M. A. Bezuglyi, N. V. Bezuglaya, A. V. Ventsuryk, K. P. Vonsevych

    Published 2019-06-01
    “…Purpose of the research is investigation of the reflectance of biologic tissues by the ellipsoidal reflector method under the variable angle of the incident radiation.The research investigates functional features of improved photometry method by ellipsoidal reflectors. …”
    Get full text
    Article
  3. 1363

    A Method for Improving the Accuracy of Link Prediction Algorithms by Jie Li, Xiyang Peng, Jian Wang, Na Zhao

    Published 2021-01-01
    “…This study proposes a method for improving the accuracy of link prediction. …”
    Get full text
    Article
  4. 1364
  5. 1365

    Analysis of methods for calculating tooth interior fatigue fracture by S. Yu. Lebedev

    Published 2022-04-01
    “…Methods (Findley, V. I. Korotkina, E. I. Tesker and V. …”
    Get full text
    Article
  6. 1366
  7. 1367
  8. 1368
  9. 1369

    MACRONUTRIENT CONTENT OF DRY LEAVES COMPOST BY VERMICOMPOSTING METHOD by Kasam Kasam, Fajri Mulya Iresha, Alhamdy Adytama, Abdul Mutolib, Rofiqul Umam, Felga Zulfia Rasdiana, Ali Rahmat

    Published 2023-09-01
    “…Mismanagement in dry leaves will promote the campus area to look dirty. One method to control the dry leaves waste is the vermicomposting process. …”
    Get full text
    Article
  10. 1370

    Accelerated traffic replay method based on time compression by Shuo WANG, Jun BAI, Bailing WANG, Xu ZHANG, Hongri LIU

    Published 2021-10-01
    “…With the proliferation of network traffic, replaying traffic in a virtual environment faces many problems.In order to meet the requirements of traffic integrity and accuracy in the replay process, an accelerated traffic replay method based on time-compressed was proposed to achieve accelerated replay of real network traffic in a virtual environment.The method prioritized the compression of the largest time interval in the set of time intervals, and reduced the compression of the smaller intervals, thus reducing the traffic spike per unit time caused by time compression, and reducing the packet loss rate of traffic.The effect was measured in terms of packet loss rate, time interval error and similarity.The experiments show that this method has a lower packet loss rate and lower time interval error compared with the isometric compression method, although it performs worse in similarity.…”
    Get full text
    Article
  11. 1371

    Link prediction method based on the similarity of high path by Qiuyang GU, Bao WU, Renyong CHI

    Published 2021-07-01
    “…For the problem that the existing link prediction method has many problems, including low accuracy and low efficiency, a method of high-order path similarity link prediction was proposed.Firstly, the path was used as the judging feature to predict missing links in complex networks, which could make resource allocation more effective and restricts information leakage by punishing public neighbor pairs.Secondly, by using high order paths as judging features, the available long paths between seed nodes would be punished.Finally, several real complex network datasets were used for numerical examples calculation.Experimental results show that the proposed algorithm is more accurate and efficient than other baseline methods.…”
    Get full text
    Article
  12. 1372

    Mimic defense authentication method for physical access control by Qinglei ZHOU, Shaohuan BAN, Yingjie HAN, Feng FENG

    Published 2020-06-01
    “…To address the security problem of the vulnerability of the authentication methods of traditional physical access control systems,a mimic defense authentication method was designed based on the principle of mimic defense technique and its dynamic heterogeneous redundant architecture (DHR),using mobile 2D code as the interface and dynamic password as the core.First,the actuator pool of the authentication server was constructed.Then,a central controller consisting of functional modules such as input distribution agent,selector and voter was used to dynamically schedule heterogeneous redundant actuators from the actuator pool.Finally,a multimode ruling on the heterogeneous redundant actuator output to determine the authentication result was made by the voter.The experimental results show that the proposed authentication method has higher security and reliability compared to the traditional physical access control system authentication method,and at the same time,it can be used in combination with other authentication methods.…”
    Get full text
    Article
  13. 1373

    Dynamic adaptive offloading method based on WPT-MEC by Lin SU, Xiaochao DANG, Zhanjun HAO, Chunrui RU, Xu SHANG

    Published 2022-12-01
    “…For the dynamic fading time-varying channel state information, a dynamic adaptive offloading (RLDO) method based on WPT-MEC was proposed to solve the task offloading and resource optimization problems for multiple users by combining wireless power transmission (WPT) technology and mobile edge computing (MEC).The wireless power transmission technology can provide energy to wireless end-user (WEU) and effectively alleviate the problem of limited energy supply from conventional batteries.To maximize the resource utilization, a wireless powered MEC network model was designed where the energy collected by the wireless end-user from the wireless access point (AP) was stored in a rechargeable battery, and then this energy was used for task computation or task offloading.The approach performed real-time offloading decisions through a fully connected deep neural networks (DNN) deployed in the MEC server.A fully binary offloading strategy was used for the offloading decision.Simulation results show that the computation rate of the method can still be maintained above 92% in a multi-user time-varying wireless channel-oriented environment.Compared with the basic method, it has great advantages in improving the calculation rate, reducing the delay and energy consumption,and effectively reduces computational complexity.…”
    Get full text
    Article
  14. 1374

    THE EXISTING APPROACHES AND METHODS OF FORECASTING OF DEMAND FOR CONTAINER TRANSPORTATIONS by A. Perminova

    Published 2016-01-01
    “…The methodical principles of the analysis of the object of forecasting are considered. …”
    Get full text
    Article
  15. 1375
  16. 1376

    Tripled Fixed Point Results in Generalized Metric Spaces by Hassen Aydi, Erdal Karapınar, Wasfi Shatanawi

    Published 2012-01-01
    “…We establish a tripled fixed point result for a mixed monotone mapping satisfying nonlinear contractions in ordered generalized metric spaces. Also, some examples are given to support our result.…”
    Get full text
    Article
  17. 1377

    Intelligent terminal device identification method of internet of things by Qingwang XIAO, Jinhua WANG, Yixiang ZHU

    Published 2017-02-01
    “…The correct identification of the terminal of the internet of things is an important prerequisite to establish a secure connection of the internet of things.The identification of the intelligent terminal is particularly important.The device identification method of intelligent terminals in internet of things under the existing technology was investigated.From the perspective of the security of the internet of things,the security problem that the device identification method was too simple to be easily falsified of the existing scheme was analyzed.Combining the achievements of project research in the field of internet of things and the experience of the industry,the identification method of multidimensional device feature information of IoT intelligent terminals was proposed.…”
    Get full text
    Article
  18. 1378

    A Variational Method for Multivalued Boundary Value Problems by Droh Arsène Béhi, Assohoun Adjé

    Published 2020-01-01
    “…In this purpose, we use a variational method which relies on Szulkin’s critical point theory. …”
    Get full text
    Article
  19. 1379
  20. 1380

    Efficient Method to Approximately Solve Retrial Systems with Impatience by Jose Manuel Gimenez-Guzman, M. Jose Domenech-Benlloch, Vicent Pla, Jorge Martinez-Bauset, Vicente Casares-Giner

    Published 2012-01-01
    “…This technique, known as value extrapolation, truncates the infinite state space using a polynomial extrapolation method to approach the states outside the truncated state space. …”
    Get full text
    Article