Showing 2,941 - 2,960 results of 209,172 for search 'effective (method OR methods)', query time: 0.77s Refine Results
  1. 2941

    Pre-sorting method of complex system radar signals by Zeheng YUAN, Runlan TIAN, Xiaofeng WANG

    Published 2018-09-01
    “…The overall pulse parameters of complex system radar signals are varied and overlap seriously.The accuracy rate of the method using overall pulse parameter sorting is seriously decreased,but the intra pulse characteristic parameters are relatively stable.A method for pre-sorting radar signals in complex systems was proposed by extracting the phase coefficient of the intra-pulse characteristic parameters of the signal,combining the more stable inter-pulse parameters,and using the improved support vector clustering algorithm.Simulation results show that in the pre-sorting of complex system radar signals,the problem of increasing-batch can be solved effectively and the accuracy of sortingcan be improved.…”
    Get full text
    Article
  2. 2942

    Optimization of operational plans based on BWM-QFD method by YIN Xing, PENG Shaohui, FANG Bing

    Published 2025-02-01
    “…At last, through the case of optimization of operational plans, the effectiveness and the implementability of this method is numerically verified.…”
    Get full text
    Article
  3. 2943

    THE RESEARCH OF USING «THE COST RECOVERY» METHOD IN THE COST MANAGEMENT by Y. Vorontsova, I. Barakhanova

    Published 2017-01-01
    “…The authors described the areas, where the method is applied the most effectively. They considered its integration with other methods, which were combined in different groups and can be used for task of direct counting as well as for optimization task. …”
    Get full text
    Article
  4. 2944

    Delay-aware cross-layer optimization method for FANET by Shaojie WEN, Chuanhe HUANG

    Published 2018-04-01
    “…An asynchronous distributed cross-layer optimization (ADCO) method was proposed to solve the problem of jointly considering real-time routing,rate allocation and power control in FANET (flying ad hoc network).And a delay-constrained cross-layer optimization framework was designed to formally represent proposed problem.Then Lagrangian relaxation and dual decomposition methods was used to divide joint optimization problem into several sub-problems.ADCO allowed each relay node to perform the optimization operation for different sub-problems with local information,and the relay nodes could update the dual variables based on asynchronous update mechanism.The simulation results show that the proposed algorithm can improve the network performance effectively in terms of energy efficiency,packet timeout ratio and network throughput.…”
    Get full text
    Article
  5. 2945

    DYNAMIC METHOD FOR MANAGEMENT OF INVESTMENT FINANCIAL RESOURCES IN AGRICULTURE by M. Dimitrova

    Published 2021-11-01
    “…In order to manage risk effectively, it needs to be clearly identified and valued. …”
    Get full text
    Article
  6. 2946

    SyncPoint based scoring method in IDS evaluation by YANG Wang1, GONG Jian1, WU Xiong1

    Published 2008-01-01
    “…Scoring the true positive rate and the false positive rate is a key component in IDS evaluation.The accuracy of the scoring method affects the effectiveness of the evaluation results.There are two kinds of scoring methods existed,one considering the false positive and the other not.But both of them aren’t accurate enough and don’t scale to the traffic volume increase.The characteristics required by the evaluating window was analyzed,and a SyncPoint based scoring method utilizing the features that the IDS processes the packet in a FIFO queue way was proposed.The theoretical analy-sis and the experiment show that the SyncPoint based scoring method is better than the current methods in accuracy and the scalability.…”
    Get full text
    Article
  7. 2947

    Toxicity analysis of technogenically disturbed territories by phytotesting method by Asfandiyarova Liliya, Khakimova Guzel, Ovsyannikova Inna, Pryanichnikova Valeriya

    Published 2025-01-01
    “…The ammonia method of soda ash production generates environmentally harmful distillery liquid, consisting of solid and liquid phases. …”
    Get full text
    Article
  8. 2948

    Application of the Main Components Method for GNSS Interference Suppression by A. V. Nemov, Le. M. Dang, D. Yu. Tyuftyakov

    Published 2017-06-01
    “…The comprehensive test and the comparative analysis of effectiveness of described methods with the classic gradient method of output fluctuation power minimize under restriction on radiation pattern are completed. …”
    Get full text
    Article
  9. 2949

    Nonlinear material properties of quartz determined by the resonator method by C. K. HRUSKA

    Published 2014-05-01
    “…Attempts to provide least-squares estimates of all 31 independent thrid-order nonlinear electromechanical constants of alpha quartz using the resonator method produce parameters containing third-order elastic constants linearly combined with the remaining three types of electromechanical nonlinearities: electroelastic, electrostrictive and dielectric. …”
    Get full text
    Article
  10. 2950

    Study on the Finite Element Simulation Method of the Belt Skew by Huang Zhuo, Han Fenglin, Yan Hongzhi, Li Peng

    Published 2017-01-01
    “…The simulation results are consistent with the experimental results,and the effectiveness of the proposed simulation method is proved.…”
    Get full text
    Article
  11. 2951

    IoT business guarantee method based on behavioral portrait by Longgang ZHAO, Hansheng LIU, Feng WANG, Shuang DI

    Published 2021-05-01
    “…IoT terminals have the characteristics of large user base, many manufacturers and numerous scenarios.It is difficult to unify the standard of poor quality and to locate the segment in the routine maintenance process.Aiming at the above phenomenon, a business guarantee method based on behavior portrait was proposed.Firstly, based on the distribution characteristics of key indicators, a fingerprint model of enterprise quality deficit was constructed, and the idea of mean shift clustering in statistical learning was used to realize the accurate construction of quality deficit index system.Then, to solve the problem that it was difficult to distinguish between the measurement terminal and the poor quality terminal, and it was difficult to identify the weak coverage terminal, a single user poor quality behavior portrait was constructed to effectively ensure the accuracy of the model.Finally, the pilot and analysis were carried out in the current network environment to provide reference for the IoT business guarantee.…”
    Get full text
    Article
  12. 2952

    An acoustic method of determination of leakage coordinates in gas pipelines by J. BUTKUS, L. JAKEVIČIUS, O. TUMŠYS

    Published 2014-05-01
    “…The results of experimental investigations are submitted. The method can be effectively used in checking the state of the pipe network as well as for solving the problems of management of the power economy objects and environmental protection.…”
    Get full text
    Article
  13. 2953

    THE CHOICE OF METHOD OF SURGICAL TREATMENT OF OBESITY (review of literature) by Yu. I. Sedletsky, D. I. Vasilevsky

    Published 2019-12-01
    “…However, all currently existing options for surgical correction of obesity have their advantages and disadvantages, ultimately determining the results and side effects of treatment. This circumstance determines the exceptional importance of the correct choice of methods for bariatric surgery. …”
    Get full text
    Article
  14. 2954

    IoT business guarantee method based on behavioral portrait by Longgang ZHAO, Hansheng LIU, Feng WANG, Shuang DI

    Published 2021-05-01
    “…IoT terminals have the characteristics of large user base, many manufacturers and numerous scenarios.It is difficult to unify the standard of poor quality and to locate the segment in the routine maintenance process.Aiming at the above phenomenon, a business guarantee method based on behavior portrait was proposed.Firstly, based on the distribution characteristics of key indicators, a fingerprint model of enterprise quality deficit was constructed, and the idea of mean shift clustering in statistical learning was used to realize the accurate construction of quality deficit index system.Then, to solve the problem that it was difficult to distinguish between the measurement terminal and the poor quality terminal, and it was difficult to identify the weak coverage terminal, a single user poor quality behavior portrait was constructed to effectively ensure the accuracy of the model.Finally, the pilot and analysis were carried out in the current network environment to provide reference for the IoT business guarantee.…”
    Get full text
    Article
  15. 2955
  16. 2956
  17. 2957

    A New Fault Diagnosis Method of Rotating Machinery by Chih-Hao Chen, Rong-Juin Shyu, Chih-Kao Ma

    Published 2008-01-01
    “…An experimental study was performed to evaluate the proposed method and the results show that the method can effectively detect and recognize different kinds of faults of rotating machinery.…”
    Get full text
    Article
  18. 2958

    GNSS interference mitigation method based on deep learning by Feiqiang Chen, Feiqiang Chen, Zhe Liu, Zhe Liu, Long Huang, Long Huang, Yuchen Xie, Yuchen Xie, Binbin Ren, Qin Zhou

    Published 2025-03-01
    “…Our experimental results show that the proposed method effectively suppresses narrowband interference, pulse interference, and chirp interference, demonstrating insensitivity to interference parameters. …”
    Get full text
    Article
  19. 2959

    Turbidity Method for Detecting Mud Content in Base Sand by MA Xu-liang, LIU Ze-yu, LI Da-yong

    Published 2020-12-01
    “…Based on the basic principles of the national standard detection method,uses a turbidity sensor to measure the mud content of the base sand after vortex washing,and develops a rapid detection method and device with short measurement period and high degree of automation. …”
    Get full text
    Article
  20. 2960