Showing 1,521 - 1,540 results of 54,221 for search 'Methil~', query time: 4.35s Refine Results
  1. 1521

    DepITCM: an audio-visual method for detecting depression by Lishan Zhang, Lishan Zhang, Zhenhua Liu, Yumei Wan, Yunli Fan, Diancai Chen, Qingxiang Wang, Kaihong Zhang, Yunshao Zheng

    Published 2025-01-01
    “…These results demonstrate that our method outperforms most existing methods in both classification and regression tasks. …”
    Get full text
    Article
  2. 1522
  3. 1523
  4. 1524

    Facies-Constrained Kriging Interpolation Method for Parameter Modeling by Zhenbo Nie, Bo Feng, Huazhong Wang, Chengliang Wu, Rongwei Xu, Chao Ning

    Published 2024-12-01
    “…The FC-Kriging method modifies the Euclidean distance metric used in Kriging so that the distance between two points depends not only on their spatial coordinates but also on their associated facies categories. …”
    Get full text
    Article
  5. 1525

    Data backup methods for mission-critical information systems by S. V. Shaytura, P. N. Pitkevich

    Published 2022-03-01
    “…The study aimed to develop an effective strategy for backing up data for critical enterprise information systems.Methods. The method for solving the problem was to create backup copies of enterprise information systems using a flexible architecture based on the backup—as a service in external cloud structures—in combination with technical resources of the organization.Results. …”
    Get full text
    Article
  6. 1526

    Iterative Splitting Methods for Integrodifferential Equations: Theory and Applications by Jürgen Geiser

    Published 2014-01-01
    “…We present novel iterative splitting methods to solve integrodifferential equations. Such integrodifferential equations are applied, for example, in scattering problems of plasma simulations. …”
    Get full text
    Article
  7. 1527

    Possibility-Based Sizing Method for Hybrid Electric Aircraft by Zin Win Thu, Maxim Tyan, Yong-Hyeon Choi, Mohammad Irfan Alam, Jae-Woo Lee

    Published 2025-01-01
    “…It is crucial to account for uncertainties at the sizing stage to ensure reliable outcomes, highlighting the need for a method that efficiently integrates uncertainty into the process. …”
    Get full text
    Article
  8. 1528

    THE EEMD-RA-KU METHOD ON DIAGNOSIS OF BEARING FAULT by WU GuangHe, DING JianMing, LIN JianHui, ZHAO QiuYuan

    Published 2016-01-01
    “…Aiming at the impact feature in fault signals of the rolling bearings,The improved algorithm diagnosis method EEMD-RA-KU was proposed to capture the impact feature. …”
    Get full text
    Article
  9. 1529

    Method of network slicing deployment based on performance-aware by Kaizhi HUANG, Qirun PAN, Quan YUAN, Wei YOU, Hongbo TANG

    Published 2019-08-01
    “…In order to deal with the performance degradation caused by resource contention due to the sharing of physical resources between VNF in the network slicing,a network slicing deployment method based on performance-awareness was proposed.When deploying network slice instances,first two-phase deployment that mapping virtual nodes was adopted,and then virtual links were mapped.In the virtual nodes mapping phase,the VNF performance influences factor was defined from the perspective of resource supply and demand to quantify the degree of VNF performance impact.Then the sum of the performance influence factors of all VNF on the deployable physical server was found in the network slice instance,the physical server with the smallest sum of performance influence factors was used as the mapping location,and the simulated annealing-discrete particle swarm algorithm was used to find the nodes mapping result.In the virtual links mapping phase,the shortest path algorithm was used to obtain the link mapping result.The simulation results show that the proposed method reduces the impact of other network slices on its own service performance.…”
    Get full text
    Article
  10. 1530

    PyFuzzer:automatic in-memory fuzz testing method by Wei-ming LI, Jun-qing YU, Shao-bo AI

    Published 2013-09-01
    “…Fuzz Testing is an effective method to mine all kinds of vulnerabilities.But the main drawbacks to current fuzz testing tools are:firstly,it produces high volume testing data and it’s extraordinary time consumption; secondly,if the accessing needs authentication,the greatest part of test data will be abandoned.PyFuzzer,a novel automatic in-memory fuzz testing tool combining static analysis,dynamic analysis and in-memory fuzz testing,was presented.The tool is highly automatic and effective.Compared with 4n FTP Fuzzer in testing WarFTPD and Serv-U,PyFuzzer can discover all vulnerabilities and improve test efficiency greatly.…”
    Get full text
    Article
  11. 1531

    Method for router online security risk assessment quantification by Jun-gang YANG, Li LIANG, Gu-jing LIU, Qian ZHANG, Chang-qing ZHANG

    Published 2013-11-01
    “…The experiment results show the method is effective in calculating the quantitive risk of the router and helpful for administrators to assess security risks.…”
    Get full text
    Article
  12. 1532

    CIP Method of Characteristics for the Solution of Tide Wave Equations by Yafei Nie, Kai Fu, Xianqing Lv

    Published 2018-01-01
    “…The CIP-MOC (Constrained Interpolation Profile/Method of Characteristics) is proposed to solve the tide wave equations with large time step size. …”
    Get full text
    Article
  13. 1533
  14. 1534
  15. 1535

    Wind Turbine Aerodynamic Performance by Lifting Line Method by Horia Dumitrescu, Vladimir Cardos

    Published 1998-01-01
    “…Predictions are, shown to compare favorably with existing numerical data from more involved free wake methods, but require less computational effort. Thereby, the present method may be a very useful tool for calculating the aerodynamic loads on horizontal-axis wind turbine blades.…”
    Get full text
    Article
  16. 1536

    REGULATION AND ROLLING QUALITY CONTROL ON THE BASIS OF STATISTICAL METHODS by A. N. Polobovets, S. V. Matveeva

    Published 2009-05-01
    “…It is shown that introduction of statistical method of control will allow to reduce efforts for production, delivery of the samples to the laboratory of mechanical testing, and to reduce the expenses as well.…”
    Get full text
    Article
  17. 1537

    Random 2D Composites and the Generalized Method of Schwarz by Vladimir Mityushev

    Published 2015-01-01
    “…This method is related to the traditional method based on the average probabilistic values involving the n-point correlation functions. …”
    Get full text
    Article
  18. 1538

    The New Method of Sensor Data Privacy Protection for IoT by Yue Wu, Liangtu Song, Lei Liu

    Published 2021-01-01
    “…This article introduces the new method of sensor data privacy protection method for IoT. …”
    Get full text
    Article
  19. 1539

    Trajectory privacy protection method based on location obfuscation by Shaobo ZHANG, Qin LIU, Guojun WANG

    Published 2018-07-01
    “…In the process of continuous queries,a method of trajectory privacy protection based on location obfuscation was proposed to solve the problem that K-anonymity was difficult to guarantee user privacy in third party architectrue.Firstly,the (G-1) query obfuscation locations through the location prediction was obtained and the dummy location selection mechanism,and then sent them together with the user’s real query location to different anonymizers to form cloaking regions and sent them to the LBS server for queries,and the query results were returned to the user by different anonymizers.In this method,the user’s real query location was confused by the location obfuscation,and the attacker couldn’t deduce the user’s trajectory from a single anonymizer or the LBS server.The method can enhance the privacy of the user’s trajectory and can effectively solve the performance bottleneck in the single anonymizer structure.Security analysis shows the security of the proposed approach,and experiments show this method can reduce the number of interactions between the user and the LBS server and the overhead of the single anonymizer.…”
    Get full text
    Article
  20. 1540

    A New Method of Network Index Data Forecast by Zhigang Ni

    Published 2013-03-01
    “…As the expansion of communication industry, the network data tends to be diverse, comp1ex and numerous.Therefore, the management and optimization become more and more difficu1t.And the index data forecast requires higher and higher accuracy.How to manage the network data effective1y and comprehensive1y turns to be a capita1 issue.A new method of network index data forecast was studied.…”
    Get full text
    Article