Showing 3,141 - 3,160 results of 120,517 for search '"Methodism"', query time: 0.13s Refine Results
  1. 3141

    A Least Squares Method for Variance Estimation in Heteroscedastic Nonparametric Regression by Yuejin Zhou, Yebin Cheng, Tiejun Tong

    Published 2014-01-01
    “…Nevertheless, their method only applies to regression models with homoscedastic errors. …”
    Get full text
    Article
  2. 3142
  3. 3143

    Microwave Heating as an Alternative Quarantine Method for Disinfestation of Stored Food Grains by Ipsita Das, Girish Kumar, Narendra G. Shah

    Published 2013-01-01
    “…Contemporary disinfestation methods are chemical fumigation, ionizing radiation, controlled atmosphere, conventional hot air treatment, and dielectric heating, that is, radio frequency and microwave energy, and so forth. …”
    Get full text
    Article
  4. 3144

    Pseudospectral Renormalization Method for Solitons in Quasicrystal Lattice with the Cubic-Quintic Nonlinearity by Nalan Antar

    Published 2014-01-01
    “…We modified the spectral renormalization method as the pseudospectral renormalization method in order to find the localized solutions. …”
    Get full text
    Article
  5. 3145

    HPLC method development for fampridine using Analytical Quality by Design approach by Kovács Béla, Boda Francisc, Fülöp Ibolya, Székely-Szentmiklósi István, Kelemen Éva Katalin, Kovács-Deák Boglárka, Székely-Szentmiklósi Blanka

    Published 2020-12-01
    “…Offering a systematic and multivariate analysis of the analytical procedure, development and validation of HPLC methods using Quality by Design approach are in the limelight of current research trends. …”
    Get full text
    Article
  6. 3146

    Method for generating pseudo random numbers based on cellular neural network by Li-hua DONG, Guo-li YAO

    Published 2016-10-01
    “…To overcome the degradation characteristics of chaos system due to finite precision effect and improve the sta-tistical performance of the random number,a new method based on 6th-order cellular neural network (CNN) was given to construct a 64-bit pseudo random number generation (PRNG).In the method,the input and output data in every iteration of 6th-order CNN were controlled to improved the performance of the random number affected by chaos degradation.Then the data were XORed with a variable parameter and the random sequences generated by a Logistic map,by which the repeat of generated sequences was avoided,and the period of output sequences and the key space were expended.Be-sides,the new method was easy to be realized in the software and could generate 64 bit random numbers every time,thus has a high generating efficiency.Test results show that the generated random numbers can pass the statistical test suite NIST SP800-22 completely and thus has good randomness.The method can be applied in secure communication and other fields of information security.…”
    Get full text
    Article
  7. 3147

    Study on method of distinguishing influence factors for vector modulation errors measurement by Hong FANG, Xin ZHOU, Ke LIU, Xin BIAN

    Published 2012-07-01
    “…In order to distinguish between the intrinsic modulation errors of vector signal generator and the measurement errors of vector signal analyzer,a method based on experimental measurement and analytical calculation was proposed,then numberical simulation and actual measurement were presented for verification.This method can not only improve accuracy and reliability of calibration for vector signal generator and vector signal analyzer,but also provide some theoretical basis for the establishment of traceability in the measurement of digital modulation quality parameters.…”
    Get full text
    Article
  8. 3148

    Research of the Backlash Detection Method of RV40E Precision Reducer by Zhao Daxing, Qin Yuan, Wu Guiming, Li Xixing, Liu Hongdi

    Published 2020-06-01
    “…The bidirectional transmission error method is a dynamic continuous backlash detection method based on transmission error detection. …”
    Get full text
    Article
  9. 3149

    A Modified Bat Algorithm with Conjugate Gradient Method for Global Optimization by Huda I. Ahmed, Eman T. Hamed, Hamsa Th. Saeed Chilmeran

    Published 2020-01-01
    “…The new spectral conjugate gradient algorithm is a modification of the Birgin and Martínez method, a manner to overcome the lack of positive definiteness of the matrix defining the search direction. …”
    Get full text
    Article
  10. 3150

    Webshell malicious traffic detection method based on multi-feature fusion by Yuan LI, Yunpeng WANG, Tao LI, Baoqiang MA

    Published 2021-12-01
    “…Webshell is the most common malicious backdoor program for persistent control of Web application systems, which poses a huge threat to the safe operation of Web servers.For most Webshell detection method based on the request packet data for training, the method for web-based Webshell recognition effect is poorer, and the model of training efficiency is low.In response to the above problems, a Webshell malicious traffic detection method based on multi-feature fusion was proposed.The method was characterized by the three dimensions of Webshell packet meta information, packet payload content and traffic access behavior.Combining domain knowledge, feature extraction of request and response packets in the data stream.Transformed into feature extraction information for information fusion, forming a discriminant model that could detect different types of attacks.Compared with the previous research method, the accuracy rate of the method here in the two classification of normal and malicious traffic has been improved to 99.25%.The training efficiency and detection efficiency have also been significantly improved, and the training time and detection time have been reduced by 95.73% and 86.14%.…”
    Get full text
    Article
  11. 3151

    Efficient Convex Optimization of Reentry Trajectory via the Chebyshev Pseudospectral Method by Chun-Mei Yu, Dang-Jun Zhao, Ye Yang

    Published 2019-01-01
    “…A novel sequential convex (SCvx) optimization scheme via the Chebyshev pseudospectral method is proposed for efficiently solving the hypersonic reentry trajectory optimization problem which is highly constrained by heat flux, dynamic pressure, normal load, and multiple no-fly zones. …”
    Get full text
    Article
  12. 3152

    A comparative study of interpolation methods for the development of ore distribution maps by Mahinaz M. Shawky

    Published 2025-01-01
    “…Therefore, there is no appropriate interpolation method accurate for all cases, each method must be statistically evaluated before each application and essentially based on real data.…”
    Get full text
    Article
  13. 3153
  14. 3154
  15. 3155

    ORGANIZATIONAL - METHODICAL FEATURES OF EVELUATING THE EFFECTIVENESS OF SUSTEMS ECONOMIC SECURITY THE FIRM by M. Vlasenko

    Published 2016-03-01
    “…The study revealed the main methods of ensuring the economic security of the organization, their characteristics and differences from other management techniques. …”
    Get full text
    Article
  16. 3156
  17. 3157
  18. 3158
  19. 3159
  20. 3160

    Multi-channel recovery data flow parallel transmission and control method by ZHANG Bing1, LU Zheng-tian2, LI Tao2

    Published 2009-01-01
    “…In order to shorten the time for disaster recovery, a multi-channel recovery data flow parallel transmission and control(MRPTC)method was presented.First, the connections between the server to be recovered and the several standby servers were established, the difference comparison between the current damaged data and the original intact data(the backup data) was completed, the differences were obtained.Then the different parts of the differences were dynamically downloaded from the standby servers in the parallel mode, these parts were united locally, the whole data was finally obtained, and the fast disaster recovery of the data was achieved.The theoretical analysis and the experiment results show that the proposed method has the features of multi-point collaborative difference recovery, high recovery speed, full bandwidth utilization, and low network requirement.Therefore, this method is a new good approach of fast disaster recovery.…”
    Get full text
    Article