Showing 1,761 - 1,780 results of 54,221 for search 'Methil~', query time: 4.87s Refine Results
  1. 1761

    Sawi Decomposition Method for Volterra Integral Equation with Application by M. Higazy, Sudhanshu Aggarwal, Taher A. Nofal

    Published 2020-01-01
    “…In this paper, authors present a new method “Sawi decomposition method” for determining the primitive of Volterra integral equation (V.I.E.) with application. …”
    Get full text
    Article
  2. 1762

    Graph clustering method based on structure entropy constraints by Zhiying ZHANG, Youliang TIAN

    Published 2021-12-01
    “…Aiming at the problem of how to decode the true structure of the network from the network embedded in the large-scale noise structure at the open information sharing platform centered on big data, and furthermore accurate mining results can be obtained in the mining related information process, the method of clustering based on structure entropy was proposed to realize divide the correlation degree of nodes in the graph.A solution algorithm for calculating two-dimensional structural information and a module division algorithm based on the principle of entropy reduction were proposed to divide the nodes in the graph structure to obtain corresponding modules.The K-dimensional structural information algorithm was used to further divide the divided modules to realize the clustering of nodes in the graph structure.An example analysis shows that the proposed graph clustering method can not only reflect the true structure of the graph structure, but also effectively mine the degree of association between nodes in the graph structure.At the same time, the other three clustering schemes are compared, and the experiment shows that this scheme has higher efficiency in execution time and guarantees the reliability of the clustering results.…”
    Get full text
    Article
  3. 1763

    The clinical method and the evidence-based medicine: some considerations by Arelys Falcón Hernández, Víctor René Navarro Machado

    Published 2010-12-01
    “…It helps us clarifying the best way to use and apply "evidence" but it does not replace the clinical method. This article discusses the proper relationship that must be established between the clinical method and the evidence-based medicine in order to provide the appropriate medical care to our patients.…”
    Get full text
    Article
  4. 1764
  5. 1765

    Research on the mobile CDN architecture and the resource scheduling method by Su-fen LI, Yun-yong ZHANG, Bing-yi FANG, Lei XU, Wei XIONG, Jun WU

    Published 2014-11-01
    “…Aimed at network architecture of mobile core network,the deployment method of MCDN service nodes was discussed on the basis of virtualized core net resources and proposes a MCDN network architecture based on the core net resource pool.Then,according to collaborative problem of MCDN resources,a MCDN resource scheduling algorithm based on regional resource co-allocation was proposed,establish a mathematical model of goal programming based on multi-factor resource co-allocation was extablished.Finally,a case study is conducted to demonstrate the feasibility and effectiveness of the proposed approach.…”
    Get full text
    Article
  6. 1766

    Repair for Congenital Macrostomia: Vermilion Square Flap Method by Renuka Dhingra, Asheesh Dhingra, Dipti Munjal

    Published 2014-01-01
    “…We recommend this method for patients with mild to moderate macrostomia.…”
    Get full text
    Article
  7. 1767

    Research on BHAST Test Method for Plastic Encapsulated Microcircuit by Yuege Zhou, Bo Wan, Qingsheng Liu, Jingyang Zhong, Shupeng Li, Tengfei Ma, Wei Guo

    Published 2025-01-01
    “…Compared to metal packaging and ceramic packaging, plastic encapsulated microcircuits (PEMs) have the advantages of light weight and low cost. …”
    Get full text
    Article
  8. 1768

    CSI-based underground personnel behavior identification method by Lei ZHANG, Yue ZHANG, Mingxue LI, Xinguo SHI, Bo ZHAI, Weilong WANG

    Published 2020-12-01
    “…To solve the problem of personnel behavior identification under the condition of dust environment and shielding and to promote the coal mine safety production,a personnel identification method based on the Wi-Fi channel state information (CSI) was proposed.The system used Hampel filter and median filter to process the raw CSI data,and utilized the phase information through a linear correction method.The recognition process was divided into the offline stage and online stage.In the offline stage,different activities data was collected to establish the recognition model.While in the online stage,current actions were recognized according to the recognition model.8 different human activities were set in the experiments and the result indicated that the recognition accuracy of this system could reach 95%.…”
    Get full text
    Article
  9. 1769

    A novel, rapid, quantitative method for face discrimination. by Kerri Walter, Peter Bex

    Published 2024-01-01
    “…Face discrimination ability has been widely studied in psychology, however a self-administered, adaptive method has not yet been developed. In this series of studies, we utilize Foraging Interactive D-prime (FInD) in conjunction with the Basel Face Model to quantify thresholds of face discrimination ability both in-lab and remotely. …”
    Get full text
    Article
  10. 1770
  11. 1771

    On Bernstein Polynomials Method to the System of Abel Integral Equations by A. Jafarian, S. Measoomy Nia, Alireza K. Golmankhaneh, D. Baleanu

    Published 2014-01-01
    “…In order to confirm the reliability and accuracy of the proposed method, some weakly Abel integral equations systems with comparisons are solved in detail as numerical examples.…”
    Get full text
    Article
  12. 1772
  13. 1773

    TAX JURISDICTION OF COMMUNES IN POLAND AND METHODS OF ITS IMPLEMENTATION by Dorota Burzyńska

    Published 2022-12-01
    “…The aim of the study was to determine the possibility of using methods of implementing the tax gov-ernance of municipalities in the field of local taxes and to assess the importance of using government for the financial planning of the municipality in the conditions of the financial crisis. …”
    Get full text
    Article
  14. 1774

    A Frequency Selection Method Based on the Pole Characteristics by Songyan Yang, Weibo Deng, Qiang Yang, Guangxin Wu, Ying Suo

    Published 2013-01-01
    “…The simulation result of a large number of ship targets shows remarkable rise in average recognition rate by using this method, compared with the average recognition rate of randomly selected frequency.…”
    Get full text
    Article
  15. 1775

    De-anonymiation method for networks based on DeepLink by Pei WANG, Yan JIA, Aiping LI, Qianyue JIANG

    Published 2020-08-01
    “…Existing de-anonymization technologies are mainly based on the network structure.To learn and express network structure is the key step of de-anonymization.The purpose of the user identity linkage is to detect the same user from different social networking platforms.DeepLink is a cross-social network user alignment technology.It learns the structural of the social networks and align anchor nodes through deep neural networks.DeepLink was used to identify de-anonymization social networks,and the results outperforms the traditional methods.…”
    Get full text
    Article
  16. 1776
  17. 1777

    Studies of Connected Networks via Fractional Metric Dimension by Hassan Zafar, Muhammad Javaid, Ebenezer Bonyah

    Published 2022-01-01
    “…In this paper, we study the latest form of metric dimension called fractional metric dimension of some connected networks such as circular diagonal ladder, double sun flower, and double path networks.…”
    Get full text
    Article
  18. 1778

    Guidance for Processing Fresh-cut Produce in Retail Operations by Keith R. Schneider, Victor Garrido, W. Steve Otwell, Ray Mobley

    Published 2005-04-01
    “…FSHN0505/FS113: Guidance for Processing Fresh-cut Produce in Retail Operations (ufl.edu) …”
    Get full text
    Article
  19. 1779

    Contrast Expansion Method for Elastic Incompressible Fibrous Composites by Piotr Drygaś, Vladimir Mityushev

    Published 2017-01-01
    “…Contrast parameter expansion of the elastic fields for 2D composites is developed by Schwarz’s method and by the method of functional equations for the case of circular inclusions. …”
    Get full text
    Article
  20. 1780

    A Conjugate Gradient Method for Unconstrained Optimization Problems by Gonglin Yuan

    Published 2009-01-01
    “…A hybrid method combining the FR conjugate gradient method and the WYL conjugate gradient method is proposed for unconstrained optimization problems. …”
    Get full text
    Article