Showing 3,901 - 3,920 results of 209,172 for search 'effective (method OR methods)', query time: 0.86s Refine Results
  1. 3901

    METHODOLOGICAL AND METHODICAL BASIS OF THE NETWORK APPROACH TO THE STUDY OF SOCIAL IDENTIFICATION by P. P. Deriugin, I. A. Baruzdin, S. V. Kurapov

    Published 2017-10-01
    “…The heuristic network method to study identification revealed the benefits of its axiological direction. …”
    Get full text
    Article
  2. 3902

    Data hiding method based on color table expansion technique by FEI Ru-chun1, WANG Li-na1, ZHANG Huan-guo1

    Published 2009-01-01
    “…Based on color table expansion technique for indexed images,a data hiding method was proposed,and the se-curity and the hiding capacity were analyzed.The analysis results show that this method has very strong security and very high hiding capacity.Secret data can be hidden in an indexed cover image to generate a stego-image with the same visual effect as the cover image and resumed without distortion from the stego-image if the correct key is used.In addition,the statistical feature of the secret data is completely covered up by using random data,so the stego-image is statistically in-dependent of the secret data.…”
    Get full text
    Article
  3. 3903

    Projective drawing as a method of studying a family relationship by Liudmila D. Lebedeva

    Published 2011-06-01
    “…“The drawing of the family in flower images” belongs to the type of expressive methods based on psychological mechanism of projection, it has a metaphoric sense, actualizes imagination and the author’s image of emotional and sensual interfamily relations. …”
    Get full text
    Article
  4. 3904

    On the implementation of a global optimization method for mixed-variable problems by Nannicini, Giacomo

    Published 2021-02-01
    “…The algorithm is based on the radial basis function method of Gutmann and the metric stochastic response surface method of Regis and Shoemaker. …”
    Get full text
    Article
  5. 3905

    The Application of Practical Clothing Design Method in the Teaching of Clothing Specialty by Miao Li, Rong Fu

    Published 2022-01-01
    “…To improve the teaching practice effect of clothing major, this study applies the practical clothing design method to the teaching of clothing major to analyze the digital clothing design and establishes a convex quadratic conic programming model for a class of force optimization problems. …”
    Get full text
    Article
  6. 3906

    ASSESSMENT OF THE BANK'S ELECTRONIC MONEY USING THE METHOD OF HIERARCHIES ANALYSIS by B. V. Samorodov, O. V. Melnychenko, N. S. Koshcheeva

    Published 2015-02-01
    “…In the article the methodological approach of using the analytic hierarchy method for evaluation of the effectiveness of bank operating with electronic money is proved. …”
    Get full text
    Article
  7. 3907

    User role analysis method based on directed topological potential by Song-qing DUAN, Xing-long YU, Bin WU, Bai WANG

    Published 2014-12-01
    “…The majority of real-world networks are directed,weighted and dynamic.Aiming at the problem of node role analysis in directed weighted network,a novel node role analysis method based on directed topological potential is pro-posed,which can divide nodes into four roles based on their behavior pattern and local influence.Then,a node role-based dynamic networks evolution analysis method is introduced,which can model the dynamics of behavioral roles represent-ing the main connectivity patterns over time and detect the significant event.The experiment results indicate that pro-posed approaches can effectively estimate the node role and detect the dynamics of network evolution.…”
    Get full text
    Article
  8. 3908

    Automatic method for searching integral distinguishers of ARX block ciphers by Ya HAN, Mingsheng WANG

    Published 2018-05-01
    “…Firstly,based on three subsets division property propagation technique,the propagation function of the K-set and L-set of ARX block ciphers was constructed respectively.All vectors in L-set affected the propagation of K-set when propagate through xored round key operation.With SAT/SMT solver,round reduced integral propagation functions of ARX block ciphers could be established.Finally,by exhausting all possible input integral characteristics with proper data complexity,round reduced integral distinguishers of ARX block ciphers could be found.The proposed method can be used for searching integral distinguishers of ARX block ciphers including SIMON-like family block ciphers,HIGHT,SPECK family block ciphers and LEA effectively.…”
    Get full text
    Article
  9. 3909

    Trajectory Planning of Time Optimal Manipulator based on Complex Method by Han Chen, Linsheng Li

    Published 2019-03-01
    “…The FS20N robot is used as the object for research and analysis, and imported into MATLAB for verification, the simulation structure shows that the complex method effectively optimizes the time.…”
    Get full text
    Article
  10. 3910
  11. 3911

    Particle determination of red soils using micro-pipette method by ZHANG Ming-kui, JIANG Hong

    Published 2001-11-01
    “…It was concluded from the results on a wide range texture of soils that particle composition of red soils could be analyzed effectively with a micro-pipette method (using 4.00 g soil and sampling 5 mL suspension) that have low coefficient of variation with accuracy and precision comparable to pipette method and much higher repeatable than hydrometer method. …”
    Get full text
    Article
  12. 3912

    An information-DNA based method of information dissemination and evolution on Internet by Panpan LI, Zhengxia XIE, Zengkai WANG, Rui JIN

    Published 2022-11-01
    “…To solve the problem of how to trace the information content dissemination and evolution process on the Internet, an information DNA-based method of information dissemination and evolution on Internet was proposed.Firstly, semantic extraction of Internet information content was performed based on domain knowledge to form a key feature set of information content.Then, using the key feature set of information content, an information DNA construction method based on locally sensitive hashing was proposed.Finally, the usability and effectiveness of the proposed method were verified by public dataset.The problem of traceability of Internet homologous information dissemination and evolution process was solved by using information DNA as the core identifier, which was of great practical significance for the study of Internet information content dissemination, evolution tracing and the governance and guidance of Internet public opinion events.…”
    Get full text
    Article
  13. 3913
  14. 3914

    Positive Psychotherapy in action: the “DYNAMICS” method for formulating basic conflicts by Ali Eryilmaz

    Published 2025-01-01
    “…In this direction, the DYNAMICS method was developed in the study. In this method, clients go through eight stages and examine their basic conflicts multi-faceted. …”
    Get full text
    Article
  15. 3915

    Method of node distribution for heterogeneous WMSN based on load balancing by Yong-hong ZHU, En-jie DING

    Published 2015-10-01
    “…Multiple hop transmission in wireless sensor networks(WSN)would bring the energy hole problem near the sink.It proved that the energy hole problem would appear in any position in heterogeneous wireless multimedia sensor networks and propose a method of the node distribution based on load balancing to solve the problem.The energy consumption was analyzed on the basis of considering the data compression ratio and the energy consumed for data transmission and processing.It proved that in heterogeneous WMSN the energy consumption of data processing would affect the node distribution and define a word that profit of data processing.The simulation results show that the energy utilization rate and the survival time of the network can be effectively improved by using the method proposed.…”
    Get full text
    Article
  16. 3916

    Automatic exploitation generation method of write-what-where vulnerability by Huafeng HUANG, Purui SU, Yi YANG, Xiangkun JIA

    Published 2022-01-01
    “…To solve the problem that the current vulnerability automatic exploitation generation methods cannot automatically generate control-flow-hijacking exploitation from write-what-where, a method of automatic exploitation generation for write-what-where was proposed.First, the write-what-where vulnerability was detected based on the memory address control strength dynamic taint analysis method.Then, the vulnerability exploitation elements were searched based on the vulnerability exploitation modes, and the exploitation of write-what-where vulnerability was generated automatically by constraint solving.The experimental results show that the proposed method can effectively detect write-what-where vulnerability, search exploitation elements, and automatically generate the control-flow-hijacking exploitation from write-what-where.…”
    Get full text
    Article
  17. 3917

    An information-DNA based method of information dissemination and evolution on Internet by Panpan LI, Zhengxia XIE, Zengkai WANG, Rui JIN

    Published 2022-11-01
    “…To solve the problem of how to trace the information content dissemination and evolution process on the Internet, an information DNA-based method of information dissemination and evolution on Internet was proposed.Firstly, semantic extraction of Internet information content was performed based on domain knowledge to form a key feature set of information content.Then, using the key feature set of information content, an information DNA construction method based on locally sensitive hashing was proposed.Finally, the usability and effectiveness of the proposed method were verified by public dataset.The problem of traceability of Internet homologous information dissemination and evolution process was solved by using information DNA as the core identifier, which was of great practical significance for the study of Internet information content dissemination, evolution tracing and the governance and guidance of Internet public opinion events.…”
    Get full text
    Article
  18. 3918

    A FPGA Modeling Method for Power Electronic Topology Simulation by LIU Li, XU Lien, CHEN Liusong

    Published 2020-01-01
    “…The simulation results demonstrate the effectiveness of the proposed method compared with the SimPowerSytem model.…”
    Get full text
    Article
  19. 3919

    Quality analysis method of Web browsing based on big data by Weihua CHENG, Xiaorong HE

    Published 2020-11-01
    “…The traditional network operation and maintenance often focuses on the operation status of the network and equipment,which is difficult to solve the user's subjective perception.It is urgent to establish an end-to-end Internet application awareness management system.Focusing on the quality analysis of web browsing,the quality analysis framework and method of user perceived data based on big data technology was studied,a quality analysis system framework based on big data technology was designed and proposed,which was used to realize the quality analysis of Internet business.Taking an international website as an example,a diagnosis method of "two looks and five cuts" was proposed to delimit and trace the cause,which improves the efficiency of manual analysis and verifies the effectiveness of the proposed method.…”
    Get full text
    Article
  20. 3920