Search alternatives:
method » methods (Expand Search)
Showing 4,921 - 4,940 results of 209,172 for search 'effective method', query time: 0.65s Refine Results
  1. 4921

    Superposition Method for Structural Topology Optimization of Rigid Manipulator by Xiaorui Liu, Peixiang He, Guanghui Xie

    Published 2021-11-01
    “…In this method,a single optimal topology corresponding to different angular positions is superimposed,so as to have better comprehensive effect at all angular positions. …”
    Get full text
    Article
  2. 4922

    The Multi-Method Approach to Building the Model of Personnel Competences by O. M. Sharipova

    Published 2020-10-01
    “…The author puts forward the multi-method approach to designing the model of competences at the enterprise based on grouping of different methods of plotting the competence model and appraisal of personnel, shows advantages of using this mech anism, which can lead to max validity of the model. …”
    Get full text
    Article
  3. 4923

    Application of Heuristic Methods for Polymer Synthesis Process Optimization by Eldar Miftakhov, Svetlana Mustafina, Andrey Akimov

    Published 2024-01-01
    “…A numerical algorithm has been developed for solving the problem of finding optimal conditions for the synthesis of polymers using heuristic optimization methods, and its effectiveness has been evaluated in the investigation of the copolymerization process of butadiene with styrene, proceeding via a free-radical mechanism. …”
    Get full text
    Article
  4. 4924

    Integration Aspects of Using the ABC-method in Trade Organization by I. V. Bagaev, L. M. Garifullina

    Published 2019-01-01
    “…Under these conditions Russian companies were forced to pay closer attention to generation of management accounting information, the quality of which largely determines the effectiveness of their decisions. In its turn, improvement of the quality of information calls for modifying the standard methods or using the new methods of processing information such as “Activity-based costing” (ABC method). …”
    Get full text
    Article
  5. 4925

    Robust deepfake detection method based on siamese network by LIN Shanhe

    Published 2024-04-01
    “…The simplicity, effectiveness, and adaptability of the proposed method to different backbone networks were further substantiated through ablation experiments.…”
    Get full text
    Article
  6. 4926
  7. 4927
  8. 4928

    Trajectory privacy protection method based on location obfuscation by Shaobo ZHANG, Qin LIU, Guojun WANG

    Published 2018-07-01
    “…In the process of continuous queries,a method of trajectory privacy protection based on location obfuscation was proposed to solve the problem that K-anonymity was difficult to guarantee user privacy in third party architectrue.Firstly,the (G-1) query obfuscation locations through the location prediction was obtained and the dummy location selection mechanism,and then sent them together with the user’s real query location to different anonymizers to form cloaking regions and sent them to the LBS server for queries,and the query results were returned to the user by different anonymizers.In this method,the user’s real query location was confused by the location obfuscation,and the attacker couldn’t deduce the user’s trajectory from a single anonymizer or the LBS server.The method can enhance the privacy of the user’s trajectory and can effectively solve the performance bottleneck in the single anonymizer structure.Security analysis shows the security of the proposed approach,and experiments show this method can reduce the number of interactions between the user and the LBS server and the overhead of the single anonymizer.…”
    Get full text
    Article
  9. 4929

    Comparison of Inferential Methods for a Novel CMP Model by Yuvraj Sunecher, Naushad Mamode Khan

    Published 2024-07-01
    “…The second part of the paper constitutes estimating the regression effects, dispersion and the serial parameters using popular estimation methods, mainly the Conditional Least Squares (CLS), Generalized Method of Moments and Generalized Quasi-Likelihood (GQL) approaches. …”
    Get full text
    Article
  10. 4930

    METHOD OF EVALUATION OF THE EFFICIENCY OF TELECOMMUNICATION NETWORK MANAGEMENT SYSTEM by Eduard N. Bovda, Oksana G. Gavriluk, Оleksandr M. Guk

    Published 2018-08-01
    “…Indicators of the effectiveness of routing methods are considered as three groups of indicators, which are divided into global, local and operational financial. …”
    Get full text
    Article
  11. 4931

    Method for determining amylose content of fresh rice sample by ZHONG Lian-jin, CHENG Fang-min

    Published 2002-01-01
    “…Based on the effects of pH and sample concentration on determination of amylose content of rice sample, a new method for the determination was developed. …”
    Get full text
    Article
  12. 4932

    CIPP Evaluation Method for the Scout Extracurricular Program Management by Aditya Wibowo, Jajang Dede Mulyani

    Published 2024-10-01
    “…This research aims to determine the management of the scouting extracurricular program and evaluate the management. The research method is descriptive qualitative research with data collection methods through interviews, observation, and documentation. …”
    Get full text
    Article
  13. 4933
  14. 4934

    A Corner Detection Method for Noisy Checkerboard Images by Hui Liu, Ligen Shan, Jiahao Feng, Shuanghao Wang

    Published 2025-05-01
    “…This makes the proposed method particularly advantageous for camera calibration in special scenarios where noise or contamination in checkerboard images is unavoidable.…”
    Get full text
    Article
  15. 4935

    Research on LACP Multi-Active Detection and Processing Method by Peiying Wang, Zhihui Xiao, Benyuan Li

    Published 2013-05-01
    “…Based on this,a fast multi-active detection method was described,which could detect multi-active quickly,and an efficient multi-active processing method was also proposed,which could effectively guarantee the normal operation of network business.…”
    Get full text
    Article
  16. 4936

    CAPTCHA Recognition Method Based on CNN with Focal Loss by Zhong Wang, Peibei Shi

    Published 2021-01-01
    “…By testing the CNKI CAPTCHA, Zhengfang CAPTCHA, and randomly generated CAPTCHA, the experimental results show that the proposed method has a better recognition effect and robustness for three different datasets, and it has certain advantages compared with traditional deep learning methods. …”
    Get full text
    Article
  17. 4937
  18. 4938

    NUTRITIONAL STATUS OF BAROMA RICE IN DIFFERENT COOKING METHODS by Hafidha Asni Akmalia, Asri Febriana, Dwimei Ayudewandari Pranatami, Putri Rabiatul Adawiyah

    Published 2024-12-01
    “…The results were analyzed using unpaired t-test analysis for the effect of different cooking methods. The result showed that magic com cooking increases fat and protein content while stove cooking elevates calories, starch, and total sugar.…”
    Get full text
    Article
  19. 4939

    A New Method to Improve the Magnetic Gear Torque by Jing Libing, Zhang Ting, Lin Ying, Cheng Jia, Xie Lihui

    Published 2018-01-01
    “…The two dimensional( 2 D) finite element( FE) method is used to simulate the modified magnetic gear model,and the electromagnetic field and electromagnetic torque of the magnetic gear are calculated. …”
    Get full text
    Article
  20. 4940

    Acoustic intensity imaging methods for in-situ wave propagation by Stefan WEYNA

    Published 2013-11-01
    “…In the paper the author has described the visualization methods in acoustic flow fields and show how these methods may assist scientists to gain understanding of complex acoustic energy flow in real-life field. …”
    Get full text
    Article