Showing 4,941 - 4,960 results of 209,172 for search 'effective (method OR methods)', query time: 0.92s Refine Results
  1. 4941

    Application of Observation Perturbation-based EDA Method to CMA Ensemble Forecasting by Zhang Hanbin, Xia Yu, Cao Yajie

    Published 2025-03-01
    “…This scheme further enhances the ensemble data assimilation (EDA) method for generating initial conditions for CMA-MESO convective allowing ensemble forecasting system. …”
    Get full text
    Article
  2. 4942

    A Radio-interferometric Imaging Method Based on the Wavelet Tight Frame by Xiaocheng Yang, Xiang You, Lin Wu, Jingye Yan, Feng Liu, Mingfeng Jiang, Junbao Zheng

    Published 2025-01-01
    “…Several simulation experiments are carried out to verify the effectiveness and performance of the proposed method.…”
    Get full text
    Article
  3. 4943

    A LOW-LOAD-TRUNCATION METHOD FOR FATIGUE CRACK GROWTH TESTS by ZHANG HaiYing, DONG DengKe, CHEN Li, ZANG WeiFeng, YAN WenWei

    Published 2016-01-01
    “…Based on the dependence of fatigue crack growth( FCG) threshold on stress ratio,a low-load-truncation method for FCG tests is proposed. The effects of FCG property,stress amplitude and stress ratio are considered by this method. …”
    Get full text
    Article
  4. 4944

    DESIGN OF TRANSLATION AMBIGUITY ELIMINATION METHOD BASED ON RECURRENT NEURAL NETWORKS by Jianzhou Cui

    Published 2024-07-01
    “…Comparative experimental results also show that with a reasonable setting of the similarity threshold, the advantages of the new method are more evident and can better improve the translation results.…”
    Get full text
    Article
  5. 4945

    A satellite navigation spoofing interference detection method based on LSTM by ZHAO Shen, HUANG Wenna, QIN Yemei, LIAO Yifei, YANG Lingling

    Published 2025-06-01
    “…Facing the problem of satellite navigation spoofing interference detection, a satellite navigation spoofing interference detection method based on LSTM was proposed. Based on the analysis of the effect of spoofing interference on the receiver loop, the direct and indirect information in the tracking loop was selected as the spoofing detection feature parameters. …”
    Get full text
    Article
  6. 4946

    A Vibration Control Method for the Flexible Arm Based on Energy Migration by Yushu Bian, Zhihui Gao, Ming Fan

    Published 2015-01-01
    “…A vibration control method based on energy migration is proposed to decrease vibration response of the flexible arm undergoing rigid motion. …”
    Get full text
    Article
  7. 4947

    A Satellite Navigation Spoofing Interference Detection Method Based on LSTM by ZHAO Shen, HUANG Wenna, QIN Yemei, LIAO Yifei, YANG Lingling

    Published 2025-01-01
    “…Based on the experiments conducted on the TEXBAT dataset from the University of Texas at Austin, this paper's method can improve the accuracy of spoofing detection by 2.19% and spoofing scene recognition by 99.98% compared to the existing SVM methods, which can effectively solve the problem of navigation spoofing detection and scene recognition.…”
    Get full text
    Article
  8. 4948

    Appearance Design Method of Smart Street Lamp Based on Kansei Engineering by Junchao Ge, Lipeng Wang

    Published 2022-01-01
    “…In order to improve the scientificity of the appearance design of smart street lamps, this paper studies the appearance design method of smart street lamps combined with Kansei engineering so as to improve the appearance design effect of street lamps. …”
    Get full text
    Article
  9. 4949

    Air quality prediction method based on improved BCCSA and deep LSTM by Wei Shiyue, Xu Hongzhen

    Published 2022-06-01
    “…The existing air quality prediction methods rarely consider seasonal factors, and the prediction effect is not good. …”
    Get full text
    Article
  10. 4950

    Research on dual motor synchronous control method for mining electric locomotive by FENG Gaoming, ZHOU Qingkai, TAN Xingguo

    Published 2025-03-01
    “…By simulating the possible unexpected situations encountered during the operation of mining electric locomotives,the effectiveness of the proposed dual motor synchronous control method was verified.ResultsWhen the system was subjected to external load disturbances,the motor speed changed little,and the system was not sensitive to the parameter differences between the two motors,which had good anti-interference and robustness. …”
    Get full text
    Article
  11. 4951

    A Tensor-Based Go Decomposition Method for Hyperspectral Anomaly Detection by Meiping Song, Xiao Zhang, Lan Li, Hongju Cao, Haimo Bao

    Published 2025-01-01
    “…Experimental results on multiple real hyperspectral datasets verify the effectiveness of the TGODEC and TGODEC-AD methods. It means that the proposed TGODEC model can effectively characterize the spatial structural features of HSI. …”
    Get full text
    Article
  12. 4952

    An Intelligent Passenger Flow Prediction Method for Pricing Strategy and Hotel Operations by Tianyang Wang

    Published 2021-01-01
    “…The existing demand predicting methods include linear methods and nonlinear methods. …”
    Get full text
    Article
  13. 4953

    Optimized Neural Network Method for Temperature Estimation along Optical Fiber by LI Suya, DONG Yanwei, LI Lin, ZHANG Chi, LI Nan, NING Qi, CHEN Yonghui

    Published 2025-02-01
    “…【Methods】The article has developed programs in Matlab for fiber optic temperature calculation using the single slope method, the least squares fitting method based on the pseudo-Voigt model,and an ANN. …”
    Get full text
    Article
  14. 4954

    Formal modeling and security analysis method of security protocol based on CPN by Xiang GONG, Tao FENG, Jinze DU

    Published 2021-09-01
    “…To solve the problem of modeling and analyzing with colored Petri net (CPN), which was determining vulnerabilities in hole location but couldn’t identify any attack path, and the problem of when the introduction of the attacker model, the number of possible message paths in the CPN formal model of security protocol surges the state space prone to explosion, which made it difficult to extract accurate attack paths, the formal modeling method of security protocol was improved base on CPN, the attack paths were verified and extracted, further the fine-grained protocol modeling and control were adopted.As well as in the aspect of state-space convergence, and a waiting-sync method for different processes of CPN model in each hierarchy model was proposed, which effectively controlled the state-space scale of the model.Through the security evaluation and analysis of TMN protocol, 25 attack paths of the protocol are extracted successfully, the security of the protocol is evaluated, and the effectiveness of the proposed method is proved.…”
    Get full text
    Article
  15. 4955
  16. 4956

    Pixel-Level Non-Local Method-Based Depth Image Inpainting by Xiaoya Dai, Yingkun Hou, Shuqi Zhang, Hao Hou, Bin Feng, Tao Lin, Mengyu Liu

    Published 2025-01-01
    “…In this paper, we propose a depth image inpainting method based on pixel-level non-local method. In order to effectively inpaint the depth images, we add 0.7 density salt-and-pepper noise to the original depth image in advance, we then implement image block-matching on the noise-added depth image to obtain some similar image block groups, and then scan each image block to form a column vector. …”
    Get full text
    Article
  17. 4957

    DOA estimation method for time-varying metasurface based on asynchronous modulation by YI Ming, CHEN Ming, ZHONG Zhou, JIN Liang

    Published 2025-01-01
    “…In response to the challenge of spectral aliasing in target signals, which arose from constraints on the temporal modulation rate in existing time-domain direction of arrival (DOA) estimation methods, a novel asynchronous control-based DOA estimation technique was proposed. …”
    Get full text
    Article
  18. 4958

    Optimization of the Parallel-Flow Condenser Fins Based on Monte Carlo Method by Zhang Ronghua, Cheng Wenlong

    Published 2011-01-01
    “…Based on Monte Carlo method, the air-side heat transfer and flow of parallel flow condenser are optimized under the working state of household air-conditioning, and effects upon heat transfer coefficient and pressure drop caused by various fin geometric parameter combinations are analyzed . …”
    Get full text
    Article
  19. 4959

    An emotional classification method of Chinese short comment text based on ELECTRA by Shunxiang Zhang, Hongbin Yu, Guangli Zhu

    Published 2022-12-01
    “…This method can more accurately capture the emotional features of the text, improve the classification effect, enhance the evaluation feedback mechanism, and facilitate user decision-making. …”
    Get full text
    Article
  20. 4960

    A lip reading method based on adaptive pooling attention Transformer by YAO Yun, HU Zhenxiao, DENG Tao, WANG Xiao

    Published 2025-06-01
    “…Experiments on the CMLR and GRID datasets showed that the proposed APAT-LR method could reduce the recognition error rate, thus verifying the effectiveness of the proposed method.…”
    Get full text
    Article