Showing 3,921 - 3,940 results of 209,172 for search 'effective (method OR methods)', query time: 0.83s Refine Results
  1. 3921

    Seismic fault identification method based on CBAM-TransUNet by Xin WANG, Wei ZHANG, Tongjun CHEN, Ao ZHANG, Dang ZHAO

    Published 2025-02-01
    “…The experimental results show that the seismic fault identification method based on CBAM-TransUNet can effectively identify the faults while removing the redundant fault information, and performs well in terms of fault identification accuracy and fault identification continuity, and the identified faults are richer in details, which improves the accuracy of fault identification, and can be effectively applied to identify the faults in the real seismic data.…”
    Get full text
    Article
  2. 3922
  3. 3923

    Simulation Initialization Method for AC/DC Hybrid Power Grid by Zhijun E, Zhenbin LI, Bangyu YANG, Wei LIU, Weiping YAO

    Published 2022-08-01
    “…The simulation results of IEEE33 bus and 330 bus AC / DC hybrid power grid with photovoltaic power stations are used to verify the effectiveness of the proposed method.…”
    Get full text
    Article
  4. 3924

    In situ/operando method for energy stability measurement of synchrotron radiation by Shangyu Si, Zhongliang Li, Lian Xue, Ke Li

    Published 2024-11-01
    “…A novel in situ/operando method is introduced to measure the photon beam stability of synchrotron radiation based on orthogonal diffraction imaging of a Laue crystal/analyzer, which can decouple the energy/wavelength and Bragg angle of the photon beam using the dispersion effect in the diffraction process. …”
    Get full text
    Article
  5. 3925

    Timing Method for the Isoland Signalized Intersection Considering the Traffic Uncertainty by LING Mo;WU Zhen;GUO Jianhua

    Published 2020-03-01
    “…The performances of these timing plans are computed in Paramics software, validating the effectiveness of the proposed method.…”
    Get full text
    Article
  6. 3926

    Semidiscrete central difference method in time for determining surface temperatures by Zhi Qian, Chu-Li Fu, Xiang-Tuan Xiong

    Published 2005-01-01
    “…A numerical example shows that the computational effect of this method is satisfactory.…”
    Get full text
    Article
  7. 3927
  8. 3928

    A NEW FAILURE PROBABILITY COMPUTING METHOD FOR MECHANICAL COMPONENTS by ZHANG YanFang, ZHANG YanLin

    Published 2020-01-01
    “…The results show that the new method can calculate the failure probability of mechanical components effectively.…”
    Get full text
    Article
  9. 3929

    Detection method of LDoS attacks based on combination of ANN & KPCA by Zhijun WU, Liang LIU, Meng YUE

    Published 2018-05-01
    “…Low-rate denial-of-service (LDoS) attack is a new type of attack mode for TCP protocol.Characteristics of low average rate and strong concealment make it difficult for detection by traditional DoS detecting methods.According to characteristics of LDoS attacks,a new LDoS queue future was proposed from the router queue,the kernel principal component analysis (KPCA) method was combined with neural network,and a new method was present to detect LDoS attacks.The method reduced the dimensionality of queue feature via KPCA algorithm and made the reduced dimension data as the inputs of neural network.For the good sell-learning ability,BP neural network could generate a great LDoS attack classifier and this classifier was used to detect the attack.Experiment results show that the proposed approach has the characteristics of effectiveness and low algorithm complexity,which helps the design of high performance router.…”
    Get full text
    Article
  10. 3930

    Diverse Copulas through Durante's Method. Exploring Parametric Functions by Christophe Chesneau

    Published 2024-01-01
    “…Our exploration encompasses a collection of power-like, exponential-like, trigonometric-like, logarithmic-like, hyperbolic-like and error-like functions, each dependent on one, two, or three parameters, effectively satisfying the necessary assumptions of Durante's method. …”
    Get full text
    Article
  11. 3931

    STRUCTURE RELIABILITY CALCULATION METHOD BASED ON IMPROVED NEURAL NETWORK by LI YongHua, CHEN Peng, TIAN ZongRui, CHEN ZhiHao

    Published 2021-01-01
    “…Finally, the reliability calculation results were calculated with the Monte Carlo method. The results show that the proposed method improves the fitting accuracy and gives consideration to the calculation efficiency, which verifies the superiority and feasibility of the proposed method.…”
    Get full text
    Article
  12. 3932

    Finite Volume Method and Its Applications in Computational Fluid Dynamics by Abdulkafi Mohammed Saeed, Thekra Abdullah Fayez Alfawaz

    Published 2025-05-01
    “…Various numerical techniques have been developed to address multiple problems in computational fluid dynamics (CFD). The finite volume method (FVM) is a numerical technique used for solving partial differential equations that represent conservation laws by dividing the domain into control volumes and ensuring flux balance at their boundaries. …”
    Get full text
    Article
  13. 3933

    Method for radical surgical treatment of lower limbs varicose disease by D. Yu. Ryazanov, O. V. Mamunchak, A. N. Yakunich, D. A. Smirnova

    Published 2015-02-01
    “…It was established that the method has a smaller injuries and operative time, allows to save unaltered subcutaneous veins, have better cosmetic effect that testifies the advisability of the proposed method of treatment.…”
    Get full text
    Article
  14. 3934

    A New Method for Solving Supervised Data Classification Problems by Parvaneh Shabanzadeh, Rubiyah Yusof

    Published 2014-01-01
    “…To improve classification performance and efficiency in generating classification model, a new feature selection algorithm based on techniques of convex programming is suggested. Proposed methods are tested on real-world datasets. Results of numerical experiments have been presented which demonstrate the effectiveness of the proposed algorithms.…”
    Get full text
    Article
  15. 3935
  16. 3936

    Fault analysis on elliptic curve cryptosystems with sliding window method by Jin-zhong ZHANG, Ying-zhan KOU, Tao WANG, Shi-ze GUO, Xin-jie ZHAO

    Published 2012-01-01
    “…Based on the principle of sign change fault attacks,an improved fault analysis method was presented against elliptic curve cryptosystems with sliding window method for point multiplication.When faults on double instruction it could effectively solve the “zero block failure” problem.Experiment results demonstrate that 15 times fault injections are enough to recover full 192bit key.When faults on add instruction,a new fault analysis method was proposed.Experiment results demonstrate one fault injection can reduce searching space 2<sup>7</sup>~2<sup>15</sup>.The method presented here can provide some ideas for fault attack on other cryptosystems using sliding window method.…”
    Get full text
    Article
  17. 3937

    An Optimization Method for Thrust Allocation of ROV Based on Genetic Algorithm by XU Lei, SONG Junhui, TU Shaoping, ZHU Jun, LI Renxiong

    Published 2023-12-01
    “…Subsequently, genetic algorithm is employed to optimize thrust allocation for the ROV's horizontal and vertical propellers, with results compared to outcomes from a pseudo-inverse method of thrust allocation. Simulation analysis reveals that the thrust allocation optimized via the genetic algorithm can effectively prevent output saturation and ensures that the resultant force or torque from each propeller's output aligns almost exactly with the intended combined force or torque, maintaining an error within ±1%.…”
    Get full text
    Article
  18. 3938

    Method of Webshell detection based on multi-view feature fusion by Feng LIN, Liujing XU, Xiaohua CHEN, Weiqiang QI, Ke CHEN, Tiantian ZHU

    Published 2020-06-01
    “…Webshell is a malicious script file on the Web.It is usually uploaded by the attacker to the target server to achieve the purpose of illegal access control.In order to overcome the shortcoming of the existing Webshell detection methods,such as single network traffic behavior,simple by passed signature comparison,and easily bypassed signature comparison,a method of Webshell detection based on multi-view feature fusion for PHP Webshell detecting was proposed.Firstly,multiple features including lexical features,syntactic features,and abstract features were extracted.Secondly,fisher score was used to sort and filter all features according to the degree of importance.Finally,a model that can effectively distinguish Webshell from normal scripts was established through SVM.The large-scale experiment in real-world scenario shows that the final accuracy of our model can reach 92.1%.…”
    Get full text
    Article
  19. 3939

    New method of text representation model based on neural network by Shui-fei ZENG, Xiao-yan ZHANG, Xiao-feng DU, Tian-bo LU

    Published 2017-04-01
    “…Method of text representation model was proposed to extract word-embedding from text feature.Firstly,the word-embedding of the dual word-embedding list based on dictionary index and the corresponding part of speech index was created.Then,feature vectors was obtained further from these extracted word-embeddings by using Bi-LSTM recurrent neural network.Finally,the sentence vectors were processed by mean-pooling layer and text categorization was classified by softmax layer.The training effects and extraction performance of the combination model of Bi-LSTM and double word-embedding neural network were verified.The experimental results show that this model not only performs well in dealing with the high-quality text feature vector and the expression sequence,but also significantly outperforms other three kinds of neural networks,which includes LSTM,LSTM+context window and Bi-LSTM.…”
    Get full text
    Article
  20. 3940

    The Evaluation Method of Rock Mass Stability Based on Natural Frequency by Mowen Xie, Weinan Liu, Yan Du, Qingbo Li, Hongfei Wang

    Published 2021-01-01
    “…The experiment proved the measurability of the index of the natural frequency of rock and the method’s effectiveness for the stability analysis of the rock based on natural frequency.…”
    Get full text
    Article