Showing 5,161 - 5,180 results of 209,172 for search 'effective (method OR methods)', query time: 0.97s Refine Results
  1. 5161
  2. 5162

    Optimization Method for Topology Identification of Port Microgrid Based on Line Disconnection by Yanmin Wang, Hanqing Zhang, Weiqi Zhang, Xiaoyong Wang, Jiaming Wang

    Published 2025-02-01
    “…The results indicate that the optimization method can significantly reduce the time required for load margin calculations in the project, and the effect of the method is similar to that of the traditional continuation power flow (CPFLOW) method. …”
    Get full text
    Article
  3. 5163

    Disturbance Identification and Adaptive Compensation Method in Optical Target Tracking System by Wenqiang Xia, Jiuqiang Deng, Kang Nie, Yao Mao, Xinglong Chen

    Published 2024-01-01
    “…Furthermore, the conditions for closed-loop stability and robust stability are detailed. Finally, the method's effectiveness is demonstrated through simulation and actual experimentation on an optical target tracking system with disturbances.…”
    Get full text
    Article
  4. 5164

    Data‐driven Buck converter model identification method with missing outputs by Jie Hou, Xinhua Zhang, Huiming Wang, Shiwei Wang

    Published 2024-09-01
    “…By applying the proposed method to a Buck converter, experimental results demonstrate its effectiveness.…”
    Get full text
    Article
  5. 5165

    A Comprehensive Performance Improvement Control Method by Fractional Order Control by Xi Zhou, Yao Mao, Chao Zhang, Qiunong He

    Published 2018-01-01
    “…And in order to obtain the global optimum in controller parameter tuning, a visual version method is also imported. This innovative control scheme could effectively equilibrate the system's demands for high error suppression capacity and enough phase margin, and makes it possible for a class of systems’ high precision control. …”
    Get full text
    Article
  6. 5166

    The Dynamic Similitude Design Method of Thin Walled Structures and Experimental Validation by Zhong Luo, You Wang, Yunpeng Zhu, Deyou Wang

    Published 2016-01-01
    “…Furthermore, the previous five orders’ accurate distorted scaling laws of thin walled annular plates are presented and numerically validated. Finally, the effectiveness of the similitude design method is validated by experimental annular plates.…”
    Get full text
    Article
  7. 5167

    Parameter Optimization Method for Predictor–Corrector Guidance With Impact Angle Constraint by Xinwan Kong, Cheng Zhang

    Published 2024-01-01
    “…A Monte Carlo simulation has verified its effectiveness and reliability.…”
    Get full text
    Article
  8. 5168
  9. 5169

    Membership inference attack and defense method in federated learning based on GAN by Jiale ZHANG, Chengcheng ZHU, Xiaobing SUN, Bing CHEN

    Published 2023-05-01
    “…Aiming at the problem that the federated learning system was extremely vulnerable to membership inference attacks initiated by malicious parties in the prediction stage, and the existing defense methods were difficult to achieve a balance between privacy protection and model loss.Membership inference attacks and their defense methods were explored in the context of federated learning.Firstly, two membership inference attack methods called class-level attack and user-level attack based on generative adversarial network (GAN) were proposed, where the former was aimed at leaking the training data privacy of all participants, while the latter could specify a specific participant.In addition, a membership inference defense method in federated learning based on adversarial sample (DefMIA) was further proposed, which could effectively defend against membership inference attacks by designing adversarial sample noise addition methods for global model parameters while ensuring the accuracy of federated learning.The experimental results show that class-level and user-level membership inference attack can achieve over 90% attack accuracy in federated learning, while after using the DefMIA method, their attack accuracy is significantly reduced, approaching random guessing (50%).…”
    Get full text
    Article
  10. 5170
  11. 5171

    Application of Closed Reconstruction Method in Error Detection of RV Cycloidal Gear by Meng Tian, Tianxing Li, Yulong Li, Jinfan Li

    Published 2021-08-01
    “…The practicality and effectiveness of this method are verified by comparison of examples, which provides data basis for subsequent finishing processing.…”
    Get full text
    Article
  12. 5172

    Adaptive measurement rate setting method in block compressed sensing of images by Ran LI, Zong-liang GAN, UIZi-guan C, UMing-hu W, HUXiu-chang Z

    Published 2014-07-01
    “…Traditional block compressed sensing (BCS) of images uses the same measurement rate to measure each block,but some blocking artifacts appear in the reconstructed image on accounting of varying spatial characteristics in an image.This problem can be effectively solved by adaptively setting different measurement rate for every block.However,these existing methods require original digital image at the collector,which cannot be realized by using practical compressive imaging (CI) devices.In order to overcome this shortage,an adaptive measurement rate setting method is proposed and it can be easily achieved though hardware equipments.This method uses the CS measurements acquired at the collector to estimate the sample variance of each block directly,and then adaptively sets measurement rate of each block in terms of their sample variances and realize rate control.Experimental results show that proposed method can obtain a better qual-ity of reconstructed image than non-adaptive scheme,but there is a gap between proposed method and the adaptive scheme using the true block sample variance since the sample variance estimated in the measurement domain has some deviations.…”
    Get full text
    Article
  13. 5173

    Evaluation Method of Hydro-wind-photovoltaic Resource Complementarity and Scheduling Complementarity by WU Xinyu, SONG Yuhang, ZENG Boyu, WANG Yuxuan, TIAN Dahui, ZHANG Jiaao

    Published 2025-01-01
    “…Research in the Hongshui River Basin shows that, at a 95% reliability level, the resource compensation benefit in the basin is 13.56%, while the scheduling compensation benefit is 16.12%. These indicators effectively quantify the significant spatiotemporal complementarity characteristics in the annual distribution of hydro-wind-photovoltaic resources, highlighting the necessity of transforming scheduling methods. …”
    Get full text
    Article
  14. 5174

    On the use of the stepped isostress method in the prediction of creep behavior of polyamide 6 by Tedjini Mohsein, Sedira Lakhdar, Guerira Belhi, Kamel Meftah

    Published 2022-10-01
    “…The stepped isostress method (SSM) is an advanced technique which allows the prediction of the long-term behavior and enables the construction of creep master curves of materials with short-term experimental tests. …”
    Get full text
    Article
  15. 5175

    Dynamic heterogeneous network representation learning method based on Hawkes process by CHEN Lei, DENG Kun, LIU Xingyan

    Published 2024-08-01
    “…Existing methods for heterogeneous network representation learning mainly focus on static networks, overlooking the significant impact of temporal attributes on node representations. …”
    Get full text
    Article
  16. 5176

    A study on fault recovery method of TTDP backbone network node by XU Li, DENG Heng, ZHANG Chen

    Published 2022-11-01
    “…The proposed fault recovery scheme was verified by simulation test, which confirms the effectiveness and feasibility of the method.…”
    Get full text
    Article
  17. 5177

    Anomaly traffic detection method based on data augmentation and feature mining by AN Yishuai, FU Yu, YU Yihan, LIU Taotao

    Published 2025-01-01
    “…To address the limitations of existing anomaly traffic detection methods, such as insufficient recognition accuracy for minority classes and limited deep feature extraction capabilities, a novel anomaly traffic detection method based on data augmentation and feature mining was proposed. …”
    Get full text
    Article
  18. 5178
  19. 5179

    A Method of Improving Oral English Teaching Based on PLS-SEM by Dongxiao Peng

    Published 2022-01-01
    “…This paper evaluates the PLS-SEM model in terms of reliability and validity in order to validate the effectiveness of the method used. The PLS-SEM model developed in this paper for improving oral English teaching has high reliability, validity, and explanatory power. …”
    Get full text
    Article
  20. 5180

    A network intrusion detection method designed for few-shot scenarios by Weichen HU, Congyuan XU, Yong ZHAN, Guanghui CHEN, Siqing LIU, Zhiqiang WANG, Xiaolin WANG

    Published 2023-10-01
    “…Existing intrusion detection techniques often require numerous malicious samples for model training.However, in real-world scenarios, only a small number of intrusion traffic samples can be obtained, which belong to few-shot scenarios.To address this challenge, a network intrusion detection method designed for few-shot scenarios was proposed.The method comprised two main parts: a packet sampling module and a meta-learning module.The packet sampling module was used for filtering, segmenting, and recombining raw network data, while the meta-learning module was used for feature extraction and result classification.Experimental results based on three few-shot datasets constructed from real network traffic data sources show that the method exhibits good applicability and fast convergence and effectively reduces the occurrence of outliers.In the case of 10 training samples, the maximum achievable detection rate is 99.29%, while the accuracy rate can reach a maximum of 97.93%.These findings demonstrate a noticeable improvement of 0.12% and 0.37% respectively, in comparison to existing algorithms.…”
    Get full text
    Article