Suggested Topics within your search.
Suggested Topics within your search.
- Methodology 3
- Research 3
- Mass media 2
- Objectivity 2
- Psychological aspects 2
- Psychology 2
- ART / Digital 1
- Agriculture 1
- Computer animation 1
- Consumer Participation 1
- Decision making 1
- Digital cinematography 1
- EDUCATION / Leadership 1
- EDUCATION / Teaching Methods & Materials / Arts & Humanities 1
- EDUCATION / Teaching Methods & Materials / Science & Technology 1
- EDUCATION / Teaching Methods & Materials / Social Science 1
- English 1
- English language 1
- Environmental Health 1
- Environmental Pollution 1
- Environmental health 1
- Epidemiologic Methods 1
- Epidemiology 1
- Geography 1
- Information literacy 1
- Informationskompetenz 1
- Medicine 1
- Public health 1
- School management and organization 1
- Soil Science & Conservation 1
-
5101
Comprehensive Evaluation Method of the Tight Oil Reservoir Quality in the Ordos Basin
Published 2025-01-01“…The N index exhibits a strong correlation with production characteristics, indicating that the method has effectively evaluated reservoir quality and provided a theoretical basis for targeting favorable areas.…”
Get full text
Article -
5102
Quantitative Evaluation Method of Gas Bearing Based on Volume Modulus in Reservoir
Published 2023-12-01“…Research results of this paper has been applied in the production of gas reservoir of Benxi formation of Yishan slope of Ordos basin, which improves the coincidence rate of well log interpretation. The application effect is good. Compared with the overlapping envelope method of P-wave and S-wave velocity, the overlapping envelope method of Poisson’s ratio and P-wave and S-wave velocity ratio, and the overlapping envelope method of Elastic modulus and real formation volume modulus, the formation volume modulus correlation method can effectively eliminate the influence of rock framework on the evaluation of fluid properties, and solve the problem that the conventional electrical logging method is inaccurate in evaluating fluid properties. …”
Get full text
Article -
5103
Longitudinal Motion Control of AUV Based on Fuzzy Sliding Mode Method
Published 2016-01-01Get full text
Article -
5104
Research on an Electromagnetic Compatibility Test Method for Connected Automotive Communication Antennas
Published 2025-03-01“…Based on the problem of electromagnetic interference in the darkroom of connected vehicle communication systems, a research method is proposed to evaluate the wireless communication quality between antennas using gain coupling. …”
Get full text
Article -
5105
Two-level feature selection method based on SVM for intrusion detection
Published 2015-04-01“…To select optimized features for intrusion detection,a two-level feature selection method based on support vector machine was proposed.This method set an evaluation index named feature evaluation value for feature selection,which was the ratio of the detection rate and false alarm rate.Firstly,this method filtrated noise and irrelevant features to reduce the feature dimension respectively by Fisher score and information gain in the filtration mode.Then,a crossing feature subset was obtained based on the above two filtered feature sets.And combining support vector machine,the sequential backward selection algorithm in the wrapper mode was used to select the optimal feature subset from the crossing feature subset.The simulation test results show that,the better classification performance is obtained according to the selected optimal feature subset,and the modeling time and testing time of the system are reduced effectively.…”
Get full text
Article -
5106
A Control Method for Single-phase High-frequency Link Inverter
Published 2017-01-01“…In view of the condition that frequency converter switches of high-frequency link inverter SPWPM (sinusoidal pulse width and position modulation) working in high frequency had high losses, a new control method was studied. When the load power factor was closed to 1, frequency converter switches only needed to work in output voltage frequency, which reduced the switching losses of the converter effectively. …”
Get full text
Article -
5107
Bending fatigue strength design method for machine components with complex geometries
Published 2018-09-01“…The obtained bending fatigue strengths are expressed as the maximum actual stress at the critical point, which increases with decreasing notch radius. Considering the effects of the stress distribution on the bending fatigue strength, we present a method for estimating the tension fatigue strength of a smooth specimen, which is shape-independent fatigue strength and can be applied to bending fatigue strength design for machine components with complex geometries.…”
Get full text
Article -
5108
Bending fatigue strength design method for machine components with complex geometries
Published 2018-10-01“…The obtained bending fatigue strengths are expressed as the maximum actual stress at the critical point, which increases with decreasing notch radius. Considering the effects of the stress distribution on the bending fatigue strength, we present a method for estimating the tension fatigue strength of a smooth specimen, which is shape-independent fatigue strength and can be applied to bending fatigue strength design for machine components with complex geometries.…”
Get full text
Article -
5109
Fault Feature Extraction Method of Gearbox based on Parameter Optimization VMD
Published 2020-03-01“…The results show that this method can reduce the noise and extract the fault features of gearbox successfully,and the effect of noise reduction is better than the empirical mode decomposition method,and the extracted fault features are more obvious.…”
Get full text
Article -
5110
Image dehazing method based on haze-line and color attenuation prior
Published 2023-01-01“…To solve the problems caused by the existing image dehazing methods, such as color over-saturation, detail loss, and artifacts, a dehazing method was proposed based on haze-line and color attenuation prior.Firstly, haze-line prior and Hough vote were used to estimate the atmospheric light.Then, a nonlinear model on scene depth was constructed according to color attenuation prior theory to achieve transmission accurately.Finally, the haze was removed from the image by inversely solving the atmospheric scattering model, so as to obtain the dehazed image with rich details.The proposed method was tested on public RESIDE dataset in comparison with many existing methods.Experimental results show that the proposed method can effectively remove the haze from image and obtain a clear and natural dehazed image, which has higher time and space efficiency than other methods.…”
Get full text
Article -
5111
Informer-based DDoS attack detection method for the power Internet of Things.
Published 2025-01-01“…Our findings suggest that the proposed method offers a promising solution for real-time intrusion detection in complex power grid environments.…”
Get full text
Article -
5112
A Levitation Control Method for Maglev Train by Electromagnetic Force Feedback
Published 2020-01-01“…Moreover, the overshoot is not exceed 0.2 mm after being disturbed. Therefore, the method proposed in the paper has an excellent control effect and has engineering application values.…”
Get full text
Article -
5113
Network security threat warning method based on qualitative differential game
Published 2018-08-01“…Most current network security research based on game theory adopts the static game or multi-stage dynamic game model,which does not accord with the real-time change and continuity of the actual network attack-defense process.To make security threats warning more consistent with the attack-defense process,the threat propagation process was analyzed referring to the epidemic model.Then the network attack-defense game model was constructed based on the qualitative differential game theory,by which the evolution of the network security state could be predicted.Based on the model,the qualitative differential game solution method was designed to construct the attack-defense barrier and divide the capture area.Furthermore,the threat severity in different security states were evaluated by introducing multidimensional Euclidean distance.By designing the warning algorithm,the dynamic warning of the network security threat was realized,which had better accuracy and timeliness.Finally,simulation results verify the effectiveness of the proposed algorithm and model.…”
Get full text
Article -
5114
Identifying method for opinion leaders in social network based on competency model
Published 2014-11-01Get full text
Article -
5115
Study on the Method of Reducing Discharge Temperature of Refrigerant System with R32
Published 2012-01-01“…Such replacement led to the increase of the discharge temperature of the system. The method of gas refrigerant injection was proposed to reduce the discharge temperature. …”
Get full text
Article -
5116
Adaptive Suppression Method for Elastic Vibrations in the Control System of Guided Rocket
Published 2025-01-01“…The experimental results show that this method has high frequency identification accuracy, little impact on the rigid motion of the projectile body, and a better elastic vibration suppression effect.…”
Get full text
Article -
5117
Optimization method for variable fractional delay filters based on gradient descent
Published 2025-04-01“…Simulation results demonstrate that, compared with the traditional weighted least square method, the proposed method effectively reduces the normalized root mean square error by 34.36% while maintaining high accuracy in both local amplitude and group delay.…”
Get full text
Article -
5118
Research on attack scenario reconstruction method based on causal knowledge discovery
Published 2017-04-01“…In order to discover the attack pattern from the distributed alert data and construct the attack scene,a method of finding the attack scene from the alert data generated by intrusion detection system was studied.Current research suffer from the problem that causal knowledge is complex and difficult to understand and it is difficult to automatically acquire the problem.An attack scenario reconstruction method based on causal knowledge discovery was proposed.According to the process of KDD,the sequence set of attack scenes was constructed by the correlation degree of IP attributes among alert data.Time series modeling was adopted to eliminate the false positives to reduce the attack scene sequence.Finally,causal relationship between the alert data was found by using probability statistics.Experiments on the DARPA2000 intrusion scenario specific data sets show that the method can effectively identify the multi-step attack mode.…”
Get full text
Article -
5119
Fatigue Strength Analysis Method for Welded Frame Based on Multiaxial Criteria
Published 2019-01-01“…It was pointed out that the fatigue strength of the studied welds was mainly affected by the normal stress components, and the shear stress had little effect on the structural fatigue strength. The characteristics of node material availability under different analysis methods were compared. …”
Get full text
Article -
5120
A Method of UAVs Route Optimization Based on the Structure of the Highway Network
Published 2015-12-01“…First, according to existing traffic data, a method used to calculate the link importance degree index is proposed, and the index is used to evaluate the link's information. …”
Get full text
Article