Showing 1,541 - 1,560 results of 54,221 for search 'Methil~', query time: 4.56s Refine Results
  1. 1541

    Harmonising Theory: Integrating Singing With Grounded Theory Methods by Belinda Densley, Virginia Dickson-Swift, Jane Mills

    Published 2025-01-01
    “…International Journal of Qualitative Methods…”
    Get full text
    Article
  2. 1542

    Efficient method of constructing parameters in R-ate paring by LI Bin, WANG Xin-mei

    Published 2010-01-01
    “…In order to accelerate the computing of Tate paring, a new technique of selection method of parameters (A,B) based on R-ate technique had been proposed. …”
    Get full text
    Article
  3. 1543

    Spatial error concealment method based on tensor voting by GAN Nan, GONG Sheng-rong, WANG Zhao-hui, LIU Chun-ping, LIU Quan

    Published 2011-01-01
    “…As the existing spatial error concealment algorithms is lack of the recovery accuracy in complex texture areas,a spatial error concealment method based on tensor voting was proposed,which extracted structural information by using tensor voting.On this basis,an improved spatial error concealment algorithm which combined with the traditional algo-rithms was further proposed.Firstly the lost marc blocks were classified into three categories,and then the appropriate concealment method was chose to recover the lost macro blocks according to the type of lost macro blocks.Experimental results show that the proposed method improves the recovery accuracy effectively and avoids the edge disorder phe-nomenon,especially in the region with more complex texture,the subjective and objective quality of concealed image is improved greatly.…”
    Get full text
    Article
  4. 1544

    Application of the Moment Of Inertia method to the Critical-Plane Approach by Hao Wu, Marco Antonio Meggiolaro, Jaime Tupiassú Pinho de Castro

    Published 2016-10-01
    “…The Moment-Of-Inertia (MOI) method has been proposed by the authors to solve some of the shortcomings of convex-enclosure methods, when they are used to calculate path-equivalent ranges and mean components of complex non-proportional (NP) multiaxial load histories. …”
    Get full text
    Article
  5. 1545

    Botnet detecting method based on group-signature filter by WANG Jin-song1, LIU Fan1, ZHANG Jian3

    Published 2010-01-01
    “…A botnet detecting method was presented based on group-signature filter,suitable for the traditional signatures matching algorithm.Using multiple member signatures to filter the packets of hosts from Intranet,the proposed method is able to handle the shortened and scattered signatures at a space expense of O(tmn).The simulated experiment proves the correctness and validity of the detecting method.…”
    Get full text
    Article
  6. 1546

    Privacy protection method on time-series data publication by Dong YU, Hai-yan KANG

    Published 2015-11-01
    “…A differential privacy model was proposed based on the sampling filtering and the mechanism of evaluation.Firstly,fixed sampling method was used to sample the original data and the non-sampling data be published directly.Secondly,for the sampling date,utilize the differential privacy mechanism to add the noise.Then,use Kalman to correct the sampling date.Finally,use the mutual information to evaluate data under different sampling intervals.Through the experiment,it is proved that the mechanism can achieve a good balance between the practicality and protective.…”
    Get full text
    Article
  7. 1547

    RSA-based image recognizable adversarial attack method by Yu ZHANG, Hailiang LI

    Published 2021-10-01
    “…Adversarial attack is an important part of deep learning security research.Relying on the RSA signature schemes and RSA encryption schemes in cryptography, an adversarial attack method that adversarial examples can be recognized by a specific classifier is proposed.Through the idea of one pixel attack, the normal image can have the ability to make other classifier misclassify while embedding additional information.It can be used in classifier authorization management, online image anti-counterfeiting, etc.The experiment show that the adversarial examples can be recognized under the specific classifier, and the disturbance noise is difficult to detect by the human eye.…”
    Get full text
    Article
  8. 1548

    Coupling Analysis of Research Methods for Hydrological Model Uncertainty by ZHENG Yanfeng

    Published 2022-01-01
    “…To reduce the average bandwidth of the forecast interval while increasing the interval coverage,this paper conducted a coupling analysis of dual EnKF and GLUE,two methods to research the hydrological model uncertainty and obtained the dual E-G method.Taking the Xin'anjiang model as an example,the paper used three evaluation indicators (i.e.…”
    Get full text
    Article
  9. 1549
  10. 1550

    Research on Low Noise Method of Passenger Car Gearbox by Lihong Jin, Hongquan Dong, Fusheng Zhang

    Published 2020-10-01
    “…The dynamic force of the bearing simulation is used as the excitation of the shell vibration response analysis to analyze the shell vibration characteristics, the shell vibration acceleration is used as the boundary condition, and based on the shell acoustic boundary element model, the modal acoustics transfer method is used to calculate the radiated noise from the sound field outside the casing. …”
    Get full text
    Article
  11. 1551
  12. 1552
  13. 1553

    Existence of Fixed Point Results in 𝐺-Metric Spaces by Zead Mustafa, Wasfi Shatanawi, Malik Bataineh

    Published 2009-01-01
    “…The purpose of this paper is to prove the existence of fixed points of contractive mapping defined on 𝐺-metric space where the completeness is replaced with weaker conditions. …”
    Get full text
    Article
  14. 1554

    Survey of attack graph based network security metric by Hao HU, Yuling LIU, Yuchen ZHANG, Hongqi ZHANG

    Published 2018-09-01
    Subjects: “…network security metric…”
    Get full text
    Article
  15. 1555

    Biochemical methods for producing and characterising recombinant spider silks by Anton Maraldo, Anton Maraldo, James H. Torpey, Sasha L. Evans, Aditya Rawal, Jeffery L. Yarger, Rivka L. Isaacson, Christopher P. Marquis, Christopher P. Marquis, Sean J. Blamires, Sean J. Blamires

    Published 2025-01-01
    “…Techniques such as mass photometry and size exclusion chromatography (SEC) for analysing protein purity and assembly behaviour are thereupon detailed. Finally, we address the role that predictive computational methods play in the future of designing novel and high-performing materials inspired by spidroins.…”
    Get full text
    Article
  16. 1556
  17. 1557

    Research of methods for evaluating the effectiveness of public relations activities by A. A. Sazonov

    Published 2020-12-01
    “…The article is devoted to the study of the main methods of evaluating the effectiveness of activities in the field of public relations. …”
    Get full text
    Article
  18. 1558
  19. 1559

    Evaluation method for autonomous communication and networking capability of UAV by Haitao ZHAO, Shishun GAO, Haijun WANG, Ting YONG, Jibo WEI

    Published 2020-08-01
    “…In order to accurately evaluate the autonomous communication and networking capability of these unmanned system which was instructive to the intelligent collaboration of UAV (unmanned aerial vehicle) system,the research of the UAV system which was adapted to the complex environment with countermeasure possibilities was focused on.The autonomous communication and networking capability of UAV system and their relationship from multiple perspectives was analyzed and modeled,including self-adaptation,self-decision,man-UAV interaction,cyber-physical integration and evolution,and an example was provided to illustrate the detailed evaluation process.The example results show that the proposed method comprehensively consider all the key aspects of the performance evaluation,which can be used to quantitatively evaluate the autonomous communication and networking capability of different UAVs or other unmanned systems.…”
    Get full text
    Article
  20. 1560