Showing 1,401 - 1,420 results of 54,221 for search 'Methil~', query time: 4.98s Refine Results
  1. 1401

    Smart Shift Decision Method Based on Stacked Autoencoders by Zengcai Wang, Yazhou Qi, Guoxin Zhang, Lei Zhao

    Published 2018-01-01
    “…Manual calibration and testing on real vehicles are common methods of generating shifting schedules for newly developed vehicles. …”
    Get full text
    Article
  2. 1402

    Progressive active inference method of protocol state machine by Yan PAN, Wei LIN, Yuefei ZHU

    Published 2023-04-01
    “…Protocol state machine active inference is a technique that relies on active automata learning.However, the abstraction of the alphabet and the construction of the mapper present critical challenges.Due to the diversity of messages of the same type, the response types of the same type are different, causing the method of regarding the message types as the alphabet will result in the loss of states or state transitions.To address the issue, message types were refined into subtypes according to the different responses and a progressive active inference method was proposed.The proposed method extracted the state fields from the existing protocol data to construct the initial alphabet and the mapper, and obtained the initial state machine based on active automata learning.It then mutated the existing messages to explore the response sequences, which were inconsistent with the current state machine.The mutated message was regarded as a protocol subtype and added to the alphabet, and a new state machine was inferred progressively based on the new alphabet.In order to reduce the interactions, a pre-response query algorithm was proposed based on prefix matching for the caching mechanism in the active automata learning.The ProLearner tool was utilized to evaluate the proposed method in the context of the SMTP and RSTP protocols.It is verified that the pre-response query method can effectively reduce the number of actual interactions, with an average reduction rate of about 10%.…”
    Get full text
    Article
  3. 1403

    Robust deepfake detection method based on siamese network by LIN Shanhe

    Published 2024-04-01
    “…In response to the need for robust detection, researchers have been developing methods to identify deepfakes. While current detection methods perform well on high-quality images, they often falter when confronted with low-quality or compressed images. …”
    Get full text
    Article
  4. 1404

    Binary image steganography method based on layered embedding by Yuxiang CHENG, Weiming ZHANG, Weixiang LI, Nenghai YU

    Published 2021-10-01
    “…A non-additive distortion binary image steganography method was proposed which divided the cover image into two sub cover images, updated the distortion through delivering influence factor, and used the minimizing distortion codes to achieve message embedding.Compared with the previous additive distortion steganography methods with fixed distortion, the proposed method combined the characteristics of binary images with only black and white pixels.Hence, it facilitated the correlation capture of pixel points and dynamic modification of distortion, improving the visual quality and steganography security of the binary image steganography.…”
    Get full text
    Article
  5. 1405
  6. 1406

    Reliable heuristic mapping method for survivable virtual network by Qiang ZHU, Hui-qiang WANG, Chun-guang MA, Guang-sheng FENG, Hong-wu LV

    Published 2015-07-01
    “…For reliable virtual network mapping problem,virtual network survivability constraints are introduced to ensure that the rest of the mapped virtual network remains connected under a single node failure condition in the substrate network,which makes sure the completeness of the virtual network and continuity of services.In order to reduce cost of the substrate network,the reliable heuristic mapping problem is considered as an integer linear programming model and a reliable heuristic mapping method for survivable virtual network is proposed to solve the problem.The simulation results show that average usage of links is reduced and the success rate,average revenue of mapping,recovery success rate of virtual network are increased compared with the existing reliable mapping algorithms.…”
    Get full text
    Article
  7. 1407

    Treatment methods for sugar rich wastewater: A review by Sadia Fida, Maria Yasmeen, Rabia Adnan, Muhammad Zeeshan

    Published 2025-06-01
    “…Anaerobic methods are more energy-efficient, enabling energy recovery as methane and hydrogen gas while producing less sludge. …”
    Get full text
    Article
  8. 1408
  9. 1409

    STRUCTURAL DAMAGE IDENTIFICATION BY SINGULAR VALUE TRUNCATION METHOD by YANG QiuWei, LU Chen, LI CuiHong

    Published 2019-01-01
    “…The influences of the truncation threshold value and the error level on the calculation result are discussed in detail. In addition, the second calculation using the singular value truncation method by another loading state is proposed in order to further improve the accuracy of the calculation. …”
    Get full text
    Article
  10. 1410
  11. 1411

    Circular thin plates buckling analysis with HRPIM method by Baid Sokayna, Hilali Youssef, Mesmoudi Saïd, Bourihane Oussama

    Published 2025-01-01
    “…The algorithm integrates high-order continuation (HOC) solver and the Hermite-type radial point interpolation method (HRPIM). The in-plane displacement is approximated with RPIM method, while the HRPIM approach is used to compute the transverse component and its derivatives. …”
    Get full text
    Article
  12. 1412

    Justification of the Method of Vehicle Engine Radiator Ultrasonic Cleaning by Baurzhan Moldabaev, Kirill Sinelnikov, Aliya Kukesheva

    Published 2025-01-01
    “…Results confirm the applicability of this method for cleaning the vehicle radiators.…”
    Get full text
    Article
  13. 1413

    Integral Type F-Contractions in Partial Metric Spaces by Vildan Ozturk

    Published 2019-01-01
    “…Partial metric spaces were introduced as a generalization of usual metric spaces where the self-distance for any point need not be equal to zero. …”
    Get full text
    Article
  14. 1414

    Comparison of Machine Learning Methods for the Arterial Hypertension Diagnostics by Vladimir S. Kublanov, Anton Yu. Dolganov, David Belo, Hugo Gamboa

    Published 2017-01-01
    “…Moreover, in the study, different methods of feature extraction are analyzed: statistical, spectral, wavelet, and multifractal. …”
    Get full text
    Article
  15. 1415
  16. 1416

    Method of Infinite System of Equations for Problems in Unbounded Domains by Dang Quang A, Tran Dinh Hung

    Published 2012-01-01
    “…Differently from the above methods we approach to problems in unbounded domains by infinite system of equations. …”
    Get full text
    Article
  17. 1417
  18. 1418
  19. 1419

    Multiscale modeling of reservoir systems using geostatistical methods by Chihi, Hayet, Hammami, Mohamed Amin, Mezni, Imen, Belayouni, Habib, Ben Mammou, Abdallah

    Published 2023-05-01
    “…The original and extended data are then coded and stored in a common georeferenced database. This provides a detailed input for the geostatistical modeling procedures that enabled to precisely capture the varying extent and shape of the hydrogeological units at regional scale.Geophysical data, available along the Jeffara plain, were added as a complement to the Jeffara geodatabase and used to establish the fault network and to build a local architectural model of the coastal aquifer system, based on time-to-depth conversion using kriging with external drift.The results have allowed (i) a major update of the geological configuration of the Jeffara basin, (ii) more precision on the geometries and extent of the stratigraphic sequences and (iii) an accurate prediction of the main characteristics of water reservoirs, i.e. their occurrence, thickness, facies and dynamic properties variation at the basin and reservoir scale. …”
    Get full text
    Article
  20. 1420

    FORMATION OF NANOCRYSTAL STATE IN DETAILS OF CARBON STRUCURAL STEELS by A. A. Andrushevich, G. I. Aniskovich, p L. Kantor, D. V. Kuchuk

    Published 2018-07-01
    “…The conditions of formation of the nanocrystal state of the structure in carbon steels are considered in the article. The methods of research and experimental data on the microstructural structure of the strengthened parts of the working bodies of agricultural machinery made from carbon steels of the lowered hardenability are given. …”
    Get full text
    Article