Showing 1,501 - 1,520 results of 54,221 for search 'Methil~', query time: 5.64s Refine Results
  1. 1501
  2. 1502

    Kosova’s Goddess on the Throne: Critical Fabulation as an Anthropological Method by Drita Bruqi Kabashi

    Published 2023-12-01
    “…My case study invokes the material object as agent of its own narration through tracking historical processes that destabilize notions of linear time, connecting the past to the present in interesting, sometimes disconcerting, ways. I use the method of critical fabulation, specifically the medium of poetry, to reveal key points of rupture surrounding the goddess’s role as a modern symbol, but also to demonstrate how poetic exercises can serve as alternatives to museum labels. …”
    Get full text
    Article
  3. 1503

    Generative steganography method based on auto-generation of contours by Zhili ZHOU, Meimin WANG, Gaobo YANG, Jianyu ZHU, Xingming SUN

    Published 2021-09-01
    “…To address the problems of limited hiding capacity and inaccurate information extraction in the existing generative steganography methods, a novel generative steganography method was proposed based on auto-generation of contours, which consisted of two main stages, such as the contour generation driven by secret information and the contour-to-image transformation.Firstly, the contour generation model was built based on long short term memory (LSTM) for secret information-driven auto-generation of object contours.Then, a contour-to-image reversible transformation model was constructed based on pix2pix network to obtain the stego-image, and the model also supported the reversible transformations from the stego-image to contours for secret information extraction.Experimental results demonstrate that the proposed method not only achieves high hiding capacity and accurate information extraction simultaneously, but also effectively resists the attacks by steganalysis tools.It performs much better than the state-of-the-art generative steganographic methods.…”
    Get full text
    Article
  4. 1504

    A direct slicing method for optimized lattice structures by Foucault Gilles, Vignat Frederic, Doutre Pierre-Thomas

    Published 2024-01-01
    “…Previous research show that conventional CAD B-Rep methods are highly inefficient to design large lattice structures composed of several thousands of geometric primitives describing struts [2,3]. …”
    Get full text
    Article
  5. 1505

    Method for determining of cytotoxicity based on the release of fluorescent proteins by Dmitry Lifanov, Dulamsuren Zorigt, Evgenya Shabalina, Abdullah Khalil, Konstantin Gorbunov, Elena Petersen

    Published 2025-01-01
    “…This method also makes it possible to independently determine the viability of different lines when used in cocultures. …”
    Get full text
    Article
  6. 1506
  7. 1507
  8. 1508
  9. 1509

    Calculation Method of Gravity Center and Moment of Radial Gate by LAN Qin, DUAN Dongxu, LIAO Yuhai, CHENG Zhong

    Published 2021-01-01
    “…The gravity moment of radial gate is an important factor affecting the opening and closing force.In this paper,the analytical formulas of gravity,gravity center and gravity moment of radial gate are derived theoretically,and the influence of two parameters of its gravity center (radius r<sub>G</sub> and inclination θ<sub>G</sub>) on its opening and closing force are analyzed.On these basis,a simple method for calculating its gravity center is presented.Taking the spillway radial gate and spillway tunnel radial gate of Pankou hydropower station as examples,the rationality and superiority are verified.The results show that compared with the results of empirical formula and 3d model,combination method and rotation method have the advantages of high accuracy and versatility;rotation method is more convenient than the combination method and is an optimal calculation method for gravity center of radial gate.In the two parameters of center of gravity,radius r<sub>G</sub> has a greater influence on the opening and closing force of radial gate,and inclination θ<sub>G</sub> has a less influence on it.The simple calculation formula is suitable for radial gate without local weighting block,which can overcome the disadvantage of complex calculation of rotation method.In order to achieve high precision and efficiency,the applicability and advantages of empirical formula,rotation method and simple method should be comprehensively utilized in the design.…”
    Get full text
    Article
  10. 1510

    Robust identification method of website fingerprinting against disturbance by ZHANG Jingxi, LI Tengyao, TU Yukuan, LUO Xiangyang

    Published 2024-12-01
    “…The existing website fingerprint identification method with the best robustness named RF can maintain good performance against various defense methods, but it is difficult to resist the targeted defense method RF Countermeasure. …”
    Get full text
    Article
  11. 1511
  12. 1512
  13. 1513
  14. 1514

    Machine Learning Methods for Weather Forecasting: A Survey by Huijun Zhang, Yaxin Liu, Chongyu Zhang, Ningyun Li

    Published 2025-01-01
    “…Research on specific tasks such as global weather forecasting, downscaling, extreme weather prediction, and how to combine machine learning methods with physical principles are very active in the current field. …”
    Get full text
    Article
  15. 1515

    Chosen message attacks method against ECC implementations by Peng LUO, Hui-yun LI, Kun-peng WANG, Ya-wei WANG

    Published 2014-05-01
    “…The method applies to the prime filed ECC cryptographic algorithms.…”
    Get full text
    Article
  16. 1516

    A Method of Conversation Analysis in Narrative and Historical Texts by Leila Nowruzpur, Mahdi Mohammadinejad, nafiseh ghorbanpor

    Published 2021-09-01
    “…Conversational analysis is a field in discourse and researchers in this field have proposed methods for conversation analysis that are not comprehensive for all types of texts. …”
    Get full text
    Article
  17. 1517

    Some New Aspects of Metric Fixed Point Theory by Khalil Javed, Fahim Uddin, Hüseyin Işık, Tareq M. Al-shami, Faizan Adeel, Muhammad Arshad

    Published 2021-01-01
    “…In this manuscript, we prove fixed point results in Rm-metric spaces endowed with an amorphous binary relation. …”
    Get full text
    Article
  18. 1518
  19. 1519

    Understanding Methods for Estimating HIV-Associated Maternal Mortality by James E. Rosen, Isabelle de Zoysa, Karl Dehne, Viviana Mangiaterra, Quarraisha Abdool-Karim

    Published 2012-01-01
    “…This paper presents and compares the methods and discusses how they affect estimates at global and regional levels. …”
    Get full text
    Article
  20. 1520

    Network Anomaly Prediction Method Based on Big Data by Xu Cao, Ruitong Cao

    Published 2014-06-01
    “…With the development of the network technology and expansion of the network size,the probability of network anomaly is greatly increased,which makes network management face greater challenges.An important task of network management is network anomaly detection in time based on the data got by network management system (NMS); the performance of network management will be great improved if the network anomaly could be detected before it really happen.A method of network anomaly prediction based on big data was presented,the traditional process act as “first alarm,then solve”was replaced by anomaly prediction process.The result is significant for improving network availability and reliability.…”
    Get full text
    Article