Showing 5,101 - 5,120 results of 209,172 for search 'effective (method OR methods)', query time: 0.94s Refine Results
  1. 5101

    Comprehensive Evaluation Method of the Tight Oil Reservoir Quality in the Ordos Basin by Peng Song, Jian Shi, Xinju Liu, Yan Zhou, Weiguo Yang, Shuheng Li, Shuxun Zhou, Haiyang Yu

    Published 2025-01-01
    “…The N index exhibits a strong correlation with production characteristics, indicating that the method has effectively evaluated reservoir quality and provided a theoretical basis for targeting favorable areas.…”
    Get full text
    Article
  2. 5102

    Quantitative Evaluation Method of Gas Bearing Based on Volume Modulus in Reservoir by SUN Xiaoping, LIU Chunlei, LI Guimei, LI Na, LI Yafeng, HUANG Ping, LI Xinjin

    Published 2023-12-01
    “…Research results of this paper has been applied in the production of gas reservoir of Benxi formation of Yishan slope of Ordos basin, which improves the coincidence rate of well log interpretation. The application effect is good. Compared with the overlapping envelope method of P-wave and S-wave velocity, the overlapping envelope method of Poisson’s ratio and P-wave and S-wave velocity ratio, and the overlapping envelope method of Elastic modulus and real formation volume modulus, the formation volume modulus correlation method can effectively eliminate the influence of rock framework on the evaluation of fluid properties, and solve the problem that the conventional electrical logging method is inaccurate in evaluating fluid properties. …”
    Get full text
    Article
  3. 5103
  4. 5104

    Research on an Electromagnetic Compatibility Test Method for Connected Automotive Communication Antennas by Ming Ye, Wenxia Wang, Jin Jia, Weixin Cai, Qi Cao, Kai Sheng

    Published 2025-03-01
    “…Based on the problem of electromagnetic interference in the darkroom of connected vehicle communication systems, a research method is proposed to evaluate the wireless communication quality between antennas using gain coupling. …”
    Get full text
    Article
  5. 5105

    Two-level feature selection method based on SVM for intrusion detection by Xiao-nian WU, Xiao-jin PENG, Yu-yang YANG, Kun FANG

    Published 2015-04-01
    “…To select optimized features for intrusion detection,a two-level feature selection method based on support vector machine was proposed.This method set an evaluation index named feature evaluation value for feature selection,which was the ratio of the detection rate and false alarm rate.Firstly,this method filtrated noise and irrelevant features to reduce the feature dimension respectively by Fisher score and information gain in the filtration mode.Then,a crossing feature subset was obtained based on the above two filtered feature sets.And combining support vector machine,the sequential backward selection algorithm in the wrapper mode was used to select the optimal feature subset from the crossing feature subset.The simulation test results show that,the better classification performance is obtained according to the selected optimal feature subset,and the modeling time and testing time of the system are reduced effectively.…”
    Get full text
    Article
  6. 5106

    A Control Method for Single-phase High-frequency Link Inverter by TU Fuquan, WU Songrong, WU Hao, ZHANG Xin

    Published 2017-01-01
    “…In view of the condition that frequency converter switches of high-frequency link inverter SPWPM (sinusoidal pulse width and position modulation) working in high frequency had high losses, a new control method was studied. When the load power factor was closed to 1, frequency converter switches only needed to work in output voltage frequency, which reduced the switching losses of the converter effectively. …”
    Get full text
    Article
  7. 5107

    Bending fatigue strength design method for machine components with complex geometries by Gang Deng, Tsutomu Nakanishi

    Published 2018-09-01
    “…The obtained bending fatigue strengths are expressed as the maximum actual stress at the critical point, which increases with decreasing notch radius. Considering the effects of the stress distribution on the bending fatigue strength, we present a method for estimating the tension fatigue strength of a smooth specimen, which is shape-independent fatigue strength and can be applied to bending fatigue strength design for machine components with complex geometries.…”
    Get full text
    Article
  8. 5108

    Bending fatigue strength design method for machine components with complex geometries by Gang Deng, Tsutomu Nakanishi

    Published 2018-10-01
    “…The obtained bending fatigue strengths are expressed as the maximum actual stress at the critical point, which increases with decreasing notch radius. Considering the effects of the stress distribution on the bending fatigue strength, we present a method for estimating the tension fatigue strength of a smooth specimen, which is shape-independent fatigue strength and can be applied to bending fatigue strength design for machine components with complex geometries.…”
    Get full text
    Article
  9. 5109

    Fault Feature Extraction Method of Gearbox based on Parameter Optimization VMD by Ding Chengjun, Fu Xiaoyang, Feng Yubo, Zhang Liang

    Published 2020-03-01
    “…The results show that this method can reduce the noise and extract the fault features of gearbox successfully,and the effect of noise reduction is better than the empirical mode decomposition method,and the extracted fault features are more obvious.…”
    Get full text
    Article
  10. 5110

    Image dehazing method based on haze-line and color attenuation prior by Miao LIAO, Yan LU, Jin ZHANG, Yuqian ZHAO, Shuanhu DI

    Published 2023-01-01
    “…To solve the problems caused by the existing image dehazing methods, such as color over-saturation, detail loss, and artifacts, a dehazing method was proposed based on haze-line and color attenuation prior.Firstly, haze-line prior and Hough vote were used to estimate the atmospheric light.Then, a nonlinear model on scene depth was constructed according to color attenuation prior theory to achieve transmission accurately.Finally, the haze was removed from the image by inversely solving the atmospheric scattering model, so as to obtain the dehazed image with rich details.The proposed method was tested on public RESIDE dataset in comparison with many existing methods.Experimental results show that the proposed method can effectively remove the haze from image and obtain a clear and natural dehazed image, which has higher time and space efficiency than other methods.…”
    Get full text
    Article
  11. 5111

    Informer-based DDoS attack detection method for the power Internet of Things. by Wei Cui, Xiao Liao, Yang Yang, Shiying Feng, Mingyan Song

    Published 2025-01-01
    “…Our findings suggest that the proposed method offers a promising solution for real-time intrusion detection in complex power grid environments.…”
    Get full text
    Article
  12. 5112

    A Levitation Control Method for Maglev Train by Electromagnetic Force Feedback by GUO Wei, HOU Zhaowen, XU Shaolong, GAN Weiwei, WANG Wentao, CHEN Qihui

    Published 2020-01-01
    “…Moreover, the overshoot is not exceed 0.2 mm after being disturbed. Therefore, the method proposed in the paper has an excellent control effect and has engineering application values.…”
    Get full text
    Article
  13. 5113

    Network security threat warning method based on qualitative differential game by Shirui HUANG, Hengwei ZHANG, Jindong WANG, Ruiyu DOU

    Published 2018-08-01
    “…Most current network security research based on game theory adopts the static game or multi-stage dynamic game model,which does not accord with the real-time change and continuity of the actual network attack-defense process.To make security threats warning more consistent with the attack-defense process,the threat propagation process was analyzed referring to the epidemic model.Then the network attack-defense game model was constructed based on the qualitative differential game theory,by which the evolution of the network security state could be predicted.Based on the model,the qualitative differential game solution method was designed to construct the attack-defense barrier and divide the capture area.Furthermore,the threat severity in different security states were evaluated by introducing multidimensional Euclidean distance.By designing the warning algorithm,the dynamic warning of the network security threat was realized,which had better accuracy and timeliness.Finally,simulation results verify the effectiveness of the proposed algorithm and model.…”
    Get full text
    Article
  14. 5114
  15. 5115

    Study on the Method of Reducing Discharge Temperature of Refrigerant System with R32 by Qin Yan, Zhang Jianfei

    Published 2012-01-01
    “…Such replacement led to the increase of the discharge temperature of the system. The method of gas refrigerant injection was proposed to reduce the discharge temperature. …”
    Get full text
    Article
  16. 5116

    Adaptive Suppression Method for Elastic Vibrations in the Control System of Guided Rocket by Chen-ming Zheng, Cheng Zhang, Jun Wang, Zhang-yao Zheng

    Published 2025-01-01
    “…The experimental results show that this method has high frequency identification accuracy, little impact on the rigid motion of the projectile body, and a better elastic vibration suppression effect.…”
    Get full text
    Article
  17. 5117

    Optimization method for variable fractional delay filters based on gradient descent by ZHUANG Ling, HAO Hanjie

    Published 2025-04-01
    “…Simulation results demonstrate that, compared with the traditional weighted least square method, the proposed method effectively reduces the normalized root mean square error by 34.36% while maintaining high accuracy in both local amplitude and group delay.…”
    Get full text
    Article
  18. 5118

    Research on attack scenario reconstruction method based on causal knowledge discovery by Di FAN, Jing LIU, Jun-xi ZHUANG, Ying-xu LAI

    Published 2017-04-01
    “…In order to discover the attack pattern from the distributed alert data and construct the attack scene,a method of finding the attack scene from the alert data generated by intrusion detection system was studied.Current research suffer from the problem that causal knowledge is complex and difficult to understand and it is difficult to automatically acquire the problem.An attack scenario reconstruction method based on causal knowledge discovery was proposed.According to the process of KDD,the sequence set of attack scenes was constructed by the correlation degree of IP attributes among alert data.Time series modeling was adopted to eliminate the false positives to reduce the attack scene sequence.Finally,causal relationship between the alert data was found by using probability statistics.Experiments on the DARPA2000 intrusion scenario specific data sets show that the method can effectively identify the multi-step attack mode.…”
    Get full text
    Article
  19. 5119

    Fatigue Strength Analysis Method for Welded Frame Based on Multiaxial Criteria by Qi AN, Hua ZHAO, Zhiyuan LIU, Xuying WANG

    Published 2019-01-01
    “…It was pointed out that the fatigue strength of the studied welds was mainly affected by the normal stress components, and the shear stress had little effect on the structural fatigue strength. The characteristics of node material availability under different analysis methods were compared. …”
    Get full text
    Article
  20. 5120

    A Method of UAVs Route Optimization Based on the Structure of the Highway Network by Shuyun Niu, Jisheng Zhang, Fan Zhang, Honghai Li

    Published 2015-12-01
    “…First, according to existing traffic data, a method used to calculate the link importance degree index is proposed, and the index is used to evaluate the link's information. …”
    Get full text
    Article