Showing 2,961 - 2,980 results of 209,172 for search 'effective (method OR methods)', query time: 0.89s Refine Results
  1. 2961
  2. 2962

    Superposition Method for Structural Topology Optimization of Rigid Manipulator by Xiaorui Liu, Peixiang He, Guanghui Xie

    Published 2021-11-01
    “…In this method,a single optimal topology corresponding to different angular positions is superimposed,so as to have better comprehensive effect at all angular positions. …”
    Get full text
    Article
  3. 2963

    The Multi-Method Approach to Building the Model of Personnel Competences by O. M. Sharipova

    Published 2020-10-01
    “…The author puts forward the multi-method approach to designing the model of competences at the enterprise based on grouping of different methods of plotting the competence model and appraisal of personnel, shows advantages of using this mech anism, which can lead to max validity of the model. …”
    Get full text
    Article
  4. 2964

    Integration Aspects of Using the ABC-method in Trade Organization by I. V. Bagaev, L. M. Garifullina

    Published 2019-01-01
    “…Under these conditions Russian companies were forced to pay closer attention to generation of management accounting information, the quality of which largely determines the effectiveness of their decisions. In its turn, improvement of the quality of information calls for modifying the standard methods or using the new methods of processing information such as “Activity-based costing” (ABC method). …”
    Get full text
    Article
  5. 2965

    Robust deepfake detection method based on siamese network by LIN Shanhe

    Published 2024-04-01
    “…The simplicity, effectiveness, and adaptability of the proposed method to different backbone networks were further substantiated through ablation experiments.…”
    Get full text
    Article
  6. 2966
  7. 2967
  8. 2968

    Trajectory privacy protection method based on location obfuscation by Shaobo ZHANG, Qin LIU, Guojun WANG

    Published 2018-07-01
    “…In the process of continuous queries,a method of trajectory privacy protection based on location obfuscation was proposed to solve the problem that K-anonymity was difficult to guarantee user privacy in third party architectrue.Firstly,the (G-1) query obfuscation locations through the location prediction was obtained and the dummy location selection mechanism,and then sent them together with the user’s real query location to different anonymizers to form cloaking regions and sent them to the LBS server for queries,and the query results were returned to the user by different anonymizers.In this method,the user’s real query location was confused by the location obfuscation,and the attacker couldn’t deduce the user’s trajectory from a single anonymizer or the LBS server.The method can enhance the privacy of the user’s trajectory and can effectively solve the performance bottleneck in the single anonymizer structure.Security analysis shows the security of the proposed approach,and experiments show this method can reduce the number of interactions between the user and the LBS server and the overhead of the single anonymizer.…”
    Get full text
    Article
  9. 2969

    METHOD OF EVALUATION OF THE EFFICIENCY OF TELECOMMUNICATION NETWORK MANAGEMENT SYSTEM by Eduard N. Bovda, Oksana G. Gavriluk, Оleksandr M. Guk

    Published 2018-08-01
    “…Indicators of the effectiveness of routing methods are considered as three groups of indicators, which are divided into global, local and operational financial. …”
    Get full text
    Article
  10. 2970

    Method for determining amylose content of fresh rice sample by ZHONG Lian-jin, CHENG Fang-min

    Published 2002-01-01
    “…Based on the effects of pH and sample concentration on determination of amylose content of rice sample, a new method for the determination was developed. …”
    Get full text
    Article
  11. 2971

    CIPP Evaluation Method for the Scout Extracurricular Program Management by Aditya Wibowo, Jajang Dede Mulyani

    Published 2024-10-01
    “…This research aims to determine the management of the scouting extracurricular program and evaluate the management. The research method is descriptive qualitative research with data collection methods through interviews, observation, and documentation. …”
    Get full text
    Article
  12. 2972

    A Corner Detection Method for Noisy Checkerboard Images by Hui Liu, Ligen Shan, Jiahao Feng, Shuanghao Wang

    Published 2025-05-01
    “…This makes the proposed method particularly advantageous for camera calibration in special scenarios where noise or contamination in checkerboard images is unavoidable.…”
    Get full text
    Article
  13. 2973

    Research on LACP Multi-Active Detection and Processing Method by Peiying Wang, Zhihui Xiao, Benyuan Li

    Published 2013-05-01
    “…Based on this,a fast multi-active detection method was described,which could detect multi-active quickly,and an efficient multi-active processing method was also proposed,which could effectively guarantee the normal operation of network business.…”
    Get full text
    Article
  14. 2974

    CAPTCHA Recognition Method Based on CNN with Focal Loss by Zhong Wang, Peibei Shi

    Published 2021-01-01
    “…By testing the CNKI CAPTCHA, Zhengfang CAPTCHA, and randomly generated CAPTCHA, the experimental results show that the proposed method has a better recognition effect and robustness for three different datasets, and it has certain advantages compared with traditional deep learning methods. …”
    Get full text
    Article
  15. 2975

    A New Method to Improve the Magnetic Gear Torque by Jing Libing, Zhang Ting, Lin Ying, Cheng Jia, Xie Lihui

    Published 2018-01-01
    “…The two dimensional( 2 D) finite element( FE) method is used to simulate the modified magnetic gear model,and the electromagnetic field and electromagnetic torque of the magnetic gear are calculated. …”
    Get full text
    Article
  16. 2976

    Visual Place Recognition Method Based on Attention Mechanism by DAI Tian-hong, YANG Xiao-yun, SONG Jie-qi

    Published 2022-04-01
    “…Testing experiments on two typical place recognition datasets show that the method combined with the attention mechanism can effectively distinguish between the regions related to place recognition and the unrelated regions in the image, and it can improve the accuracy and robustness of recognition in scenes with changes in appearance and viewpoints.…”
    Get full text
    Article
  17. 2977

    Multiparameter Control Strategy and Method for Cutting Arm of Roadheader by Pengjiang Wang, Yang Shen, Xiaodong Ji, Kai Zong, Weixiong Zheng, Dongjie Wang, Miao Wu

    Published 2021-01-01
    “…The simulation analysis in SIMULINK showed that the response time was reduced, proving the robustness of the method. In addition, experimental studies verified the good control effect of the method under different cutting states. …”
    Get full text
    Article
  18. 2978

    A New Method for Joint Sparse DOA Estimation by Jinyong Hou, Changlong Wang, Zixuan Zhao, Feng Zhou, Huaji Zhou

    Published 2024-11-01
    “…To tackle the issue of poor accuracy in single-snapshot data processing for Direction of Arrival (DOA) estimation in passive radar systems, this paper introduces a method for judiciously leveraging multi-snapshot data. …”
    Get full text
    Article
  19. 2979

    A Gradual Adversarial Training Method for Semantic Segmentation by Yinkai Zan, Pingping Lu, Tingyu Meng

    Published 2024-11-01
    “…In this paper, we propose a gradual adversarial training (GAT) method for remote sensing image segmentation. Our method incorporates a domain-adaptive mechanism that dynamically modulates input data, effectively reducing adversarial perturbations. …”
    Get full text
    Article
  20. 2980

    Fast Scanning Method Based on Multi-point Focusing by LU Yi, ZHANG Xue-yuan, HE Yong-jun

    Published 2020-02-01
    “…Experiments show that this method can reduce the number of focus searching effectively and improve the scanning efficiency.…”
    Get full text
    Article