Showing 3,801 - 3,820 results of 209,172 for search 'effective (method OR methods)', query time: 0.80s Refine Results
  1. 3801

    An inexpensive method to measure latent toxoplasmosis and its behavioral consequences by Anja Achtziger, Carlos Alós-Ferrer, Michele Garagnani

    Published 2025-04-01
    “…We propose a psychological diagnostic method for latent toxoplasmosis using response times, hence enabling large-scale tests of psychological, psychiatrical, and behavioral effects. …”
    Get full text
    Article
  2. 3802

    Laboratory Study on Rockburst Control by Step Method in Deep Tunnel by Chao Ren, Xiaoming Sun, Dongqiao Liu, Jinkun Yang

    Published 2025-04-01
    “…In terms of rockburst control technology, it is generally believed that optimizing the section design and adopting the step method can effectively suppress the occurrence of rockburst, but there is no literature to explain the reasons for adopting this method from the experimental point of view. …”
    Get full text
    Article
  3. 3803

    Research of the Law and Control Method of Automatic Shift for Engineering Vehicle by Ying Chen

    Published 2019-07-01
    “…It shows that the improved BP neural network control method can effectively control vehicle automatic shift. …”
    Get full text
    Article
  4. 3804

    LEARNING GALLERY METHOD'S IMPACT ON ELEMENTARY STUDENTS' SCIENCE COMPREHENSION by Diah Susanti

    Published 2024-06-01
    “…This prompted the researcher to conduct a study entitled Effects of the Gallery Learning Method on the Level of Students' Understanding of Science Learning at SD Z. …”
    Get full text
    Article
  5. 3805

    Fabrication and characterization of shape memory composite with layer by layer method by GAO Junpeng, JIANG Shicai, WANG Tingting, XU Hu, ZHANG Baoyan

    Published 2025-04-01
    “…Due to the its appropriate glass transition temperature(Tg), a kind of carbon reinforced carbon-reinforced composite with exhibiting a shape memory effect is successfully fabricated using a layer-by-layer method. …”
    Get full text
    Article
  6. 3806

    The Removal Method of the Blasting Vibration Signal Trend Item and Noise by Hailong Wang, Haobo Bai, Yan Zhao, Dongsheng Wang, Xiaojing Wang, Shenghua Wang

    Published 2021-01-01
    “…Firstly, based on the FDM theory, the original blasting vibration signal is decomposed to obtain several modal components; then, the dominant component of the signal is filtered according to the dominant frequency of the modal component and its correlation with the original signal; finally, the dominant component is reconstructed to remove the trend item and noise at the same time; spectrum analysis is carried out to verify the effectiveness of the method. The results show that FDM can effectively disperse low-frequency trend items, high-frequency noise, and useful signal information while decomposing signals containing trend terms and noise; compared with the existing common methods, it can more effectively retain the original information, which provides a reference for the trend item and noise removal of similar blasting vibration signals.…”
    Get full text
    Article
  7. 3807
  8. 3808

    Interaction based on method for spam detection in online social networks by Kan CHEN, Liang CHEN, Pei-dong ZHU, Yue-shan XIONG

    Published 2015-07-01
    “…In online social networks,advertisements,rumors and malicious links are propagated by spammers arbitrarily.They not only disturb users’usualaccess,but also bring about network security threats and social panics.In an attempt to deal with the spam problems,an information diffusion model was proposed to capture the features of spam propagation.Propagation behaviors are quantitatively analyzed to detect spam messages with a decision tree-based method.The effectiveness of proposed detection model is evaluated with real data from the micro-bloggingnetwork of Sina.The experimental results show that proposed model can effectively detect spams in Sina micro-bloggingnetwork.…”
    Get full text
    Article
  9. 3809

    The Cassandra Method: Dystopian Visions as a Basis for Responsible Design by Sarah Diefenbach, Daniel Ullrich

    Published 2024-06-01
    “…To minimize these, the Cassandra method aims to foresee such negative effects by systematically investigating dystopian visions. …”
    Get full text
    Article
  10. 3810

    Method to generate cyber deception traffic based on adversarial sample by Yongjin HU, Yuanbo GUO, Jun MA, Han ZHANG, Xiuqing MAO

    Published 2020-09-01
    “…In order to prevent attacker traffic classification attacks,a method for generating deception traffic based on adversarial samples from the perspective of the defender was proposed.By adding perturbation to the normal network traffic,an adversarial sample of deception traffic was formed,so that an attacker could make a misclassification when implementing a traffic analysis attack based on a deep learning model,achieving deception effect by causing the attacker to consume time and energy.Several different methods for crafting perturbation were used to generate adversarial samples of deception traffic,and the LeNet-5 deep convolutional neural network was selected as a traffic classification model for attackers to deceive.The effectiveness of the proposed method is verified by experiments,which provides a new method for network traffic obfuscation and deception.…”
    Get full text
    Article
  11. 3811
  12. 3812

    Improvement and Experimental Study of Loading Mode of Vacuum Preloading Method by WEI Yanbing, LI Zhenxin, LI Yao

    Published 2021-01-01
    “…For the phenomenon of “soil column” occurred in the reinforcement of mud by vacuum preloading method,in order to improve the reinforcement effect of vacuum preloading this paper summarizes and analyzes the formation mechanism of “soil column” for coming to the conclusion that the main reason for the formation of “soil column” is the silting of drainage board,proposes the method of step vacuum loading,concludes that the strength of reinforced soil increases largely under the step vacuum loading method after analysis of the theory of soil mechanics,and verifies it through the indoor model test.The results show that the permeability coefficient of the plastic drainage board decreases slightly and the consolidation settlement value of the reinforced mud is larger under the step vacuum loading,indicating that the step vacuum loading method can reduce the silting of drainage boards,delay the occurrence of “soil column” phenomenon,and improve the overall reinforcement effect of mud.…”
    Get full text
    Article
  13. 3813
  14. 3814

    Method to generate cyber deception traffic based on adversarial sample by Yongjin HU, Yuanbo GUO, Jun MA, Han ZHANG, Xiuqing MAO

    Published 2020-09-01
    “…In order to prevent attacker traffic classification attacks,a method for generating deception traffic based on adversarial samples from the perspective of the defender was proposed.By adding perturbation to the normal network traffic,an adversarial sample of deception traffic was formed,so that an attacker could make a misclassification when implementing a traffic analysis attack based on a deep learning model,achieving deception effect by causing the attacker to consume time and energy.Several different methods for crafting perturbation were used to generate adversarial samples of deception traffic,and the LeNet-5 deep convolutional neural network was selected as a traffic classification model for attackers to deceive.The effectiveness of the proposed method is verified by experiments,which provides a new method for network traffic obfuscation and deception.…”
    Get full text
    Article
  15. 3815

    A Dual-unknown-input Self-calibration Filtering Method by FU Huimin, YANG Haifeng

    Published 2019-01-01
    “…Traditional Kalman filtering methods cannot eliminate the effect of these two unknown inputs, leading to large filtering errors. …”
    Get full text
    Article
  16. 3816

    Backdoor defense method in federated learning based on contrastive training by Jiale ZHANG, Chengcheng ZHU, Xiang CHENG, Xiaobing SUN, Bing CHEN

    Published 2024-03-01
    “…In response to the inadequacy of existing defense methods for backdoor attacks in federated learning to effectively remove embedded backdoor features from models, while simultaneously reducing the accuracy of the primary task, a federated learning backdoor defense method called ContraFL was proposed, which utilized contrastive training to disrupt the clustering process of backdoor samples in the feature space, thereby rendering the global model classifications in federated learning independent of the backdoor trigger features.Specifically, on the server side, a trigger generation algorithm was developed to construct a generator pool to restore potential backdoor triggers in the training samples of the global model.Consequently, the trigger generator pool was distributed to the participants by the server, where each participant added the generated backdoor triggers to their local samples to achieve backdoor data augmentation.Experimental results demonstrate that ContraFL effectively defends against various backdoor attacks in federated learning, outperforming existing defense methods.…”
    Get full text
    Article
  17. 3817

    Rock Dynamic Fracture Characteristics Based on NSCB Impact Method by Yanbing Wang

    Published 2018-01-01
    “…In 2012, the International Society for Rock Mechanics (ISRM) recommended a new Notched Semicircular Bend (NSCB) method for the determination of dynamic fracture toughness of rock materials, but it did not consider the effect of some uncontrollable factors in the course of the experiment on the test result. …”
    Get full text
    Article
  18. 3818

    Impact of irrigation method and biochar application on growth and yield of rice by DOU Chaoyin, LI Xiangrui, SUN Yidi, LYU Yuping, GU Linhui

    Published 2024-12-01
    “…【Method】 The experiment was carried out as a field trial using two irrigation modes: flood irrigation (CF) and alternating wet and dry irrigation (AWD). …”
    Get full text
    Article
  19. 3819
  20. 3820

    Installation Error Calibration Method for Redundant MEMS-IMU MWD by Yin Qing, Lu Wang, Yu Zheng

    Published 2025-03-01
    “…Finally, simulation and laboratory experiments were conducted to verify the effectiveness of the proposed method. The simulation results showed that the proposed method reduced installation errors by 40.4% compared with conventional methods. …”
    Get full text
    Article