Showing 1,381 - 1,400 results of 54,221 for search 'Methil~', query time: 3.84s Refine Results
  1. 1381
  2. 1382
  3. 1383
  4. 1384
  5. 1385

    Electrochemical Method for the Assay of Organic Peroxides Directly in Acetonitrile by Vanina Ivanova, Mariya Pimpilova, Maria Stoyanova, Nina Dimcheva

    Published 2025-01-01
    “…Herein, we propose an alternative electrochemical method to the classical iodometric titration method most widely used for determining the PV. …”
    Get full text
    Article
  6. 1386

    Formal modeling and analyzing method for database security policy by Rong WANG, Min ZHANG, Deng-guo FENG, Hao LI

    Published 2015-09-01
    “…Because of the high-level abstraction,insufficient description of database states and constraints,it was difficult to find the tiny flaws in design and implementation.Based on PVS,a method for formal description and analysis of data-base security policy was proposed,which was more close to the actual database,more widely used in reality,and more complete in describing the safe properties,more extendible of the model,and ensure the efficiency of modeling and veri-fication.Finally,this method is applied in the security policy modeling and analyzing of BeyonDB,which is a commer-cial database,find some security risks in the system design,and thereby verify its effectiveness.…”
    Get full text
    Article
  7. 1387

    Block Preconditioned SSOR Methods for -Matrices Linear Systems by Zhao-Nian Pu, Xue-Zhong Wang

    Published 2013-01-01
    “…We present a block preconditioner and consider block preconditioned SSOR iterative methods for solving linear system . When is an -matrix, the convergence and some comparison results of the spectral radius for our methods are given. …”
    Get full text
    Article
  8. 1388
  9. 1389

    Review of Particle Breakage Measurement Methods for Calcareous Sand by Liang-Jie Xu, Ren Wang, Dong-Sheng Xu, Xin-Zhi Wang, Qing-Shan Meng, Chang-Qi Zhu

    Published 2022-01-01
    “…The characteristic particle size measurement method for particle breakage is simple and has limitations. …”
    Get full text
    Article
  10. 1390

    Dimension Estimation Using Weighted Correlation Dimension Method by Yuanhong Liu, Zhiwei Yu, Ming Zeng, Shun Wang

    Published 2015-01-01
    “…Among all the dimension estimation methods, correlation dimension (CD) method is one of the most popular ones, which always assumes that the effect of every point on the intrinsic dimension estimation is identical. …”
    Get full text
    Article
  11. 1391

    Multiply Warped Products with a Semisymmetric Metric Connection by Yong Wang

    Published 2014-01-01
    “…We study the Einstein multiply warped products with a semisymmetric metric connection and the multiply warped products with a semisymmetric metric connection with constant scalar curvature, and we apply our results to generalized Robertson-Walker space-times with a semisymmetric metric connection and generalized Kasner space-times with a semisymmetric metric connection and find some new examples of Einstein manifolds with a semisymmetric metric connection and manifolds with constant scalar curvature with a semisymmetric metric connection.…”
    Get full text
    Article
  12. 1392
  13. 1393

    Measures and optimization methods of communications network energy efficiency by Xiuying NIE

    Published 2019-11-01
    “…Although network played an important role in energy efficiency improvement for many industries,network energy consumption had threatened the sustainable development of network operators,due to the fast increasing of the networks’ energy consumption recent years as the swift development of internet users,internet services and applications.The energy consumption risk faced by network operators,the research development of the measures and optimization methods of network energy efficiency was introduced.The energy efficiency optimization in the future network was finally concluded.…”
    Get full text
    Article
  14. 1394
  15. 1395

    Method of connection establishment between CPE and the cloud platform by UFengchao FU, Yuanbao XIE

    Published 2016-12-01
    “…The main idea of vCPE is to split the CPE into two parts and to make the L3 functions up to the network. Through this method, CPE can be simplified and the difficulty for subscribers to operate and maintain CPE can be reduced. …”
    Get full text
    Article
  16. 1396

    Deception defense method against intelligent penetration attack by Jinyin CHEN, Shulong HU, Changyou XING, Guomin ZHANG

    Published 2022-10-01
    “…The intelligent penetration attack based on reinforcement learning aims to model the penetration process as a Markov decision process, and train the attacker to optimize the penetration path in a trial-and-error manner, so as to achieve strong attack performance.In order to prevent intelligent penetration attacks from being maliciously exploited, a deception defense method for intelligent penetration attack based on reinforcement learning was proposed.Firstly, obtaining the necessary information for the attacker to construct the penetration model, which included state, action and reward.Secondly, conducting deception defense against the attacker through inverting the state dimension, disrupting the action generation, and flipping the reward value sign, respectively, which corresponded to the early, middle and final stages of the penetration attack.At last, the three-stage defense comparison experiments were carried out in the same network environment.The results show that the proposed method can effectively reduce the success rate of intelligent penetration attacks based on reinforcement learning.Besides, the deception method that disrupts the action generation of the attacker can reduce the penetration attack success rate to 0 when the interference ratio is 20%.…”
    Get full text
    Article
  17. 1397
  18. 1398

    ANALYSIS AND TEST METHODS OF SUSPENSION STRUCTURE OF AIRBORNER MISSILE by SONG Lei, ZHANG Jin, WANG CongWei, JIN Ling, XU JunWei

    Published 2019-01-01
    “…First, the inertia release method is used. This method can accurately simulate the boundary conditions of the hang up flight but the ground static test can’t be carried out accordingly. …”
    Get full text
    Article
  19. 1399
  20. 1400