Showing 4,201 - 4,220 results of 209,172 for search 'effective methods', query time: 0.64s Refine Results
  1. 4201

    Method of three-domain integration for IT support system by Yizhi DING, Lei QI, Shaoping LI, Hongwei LV, Yingxia NIU

    Published 2015-12-01
    “…For the realization of digital transformation,three-domain integration of IT support system is imperative.The present situation and problems of the three-domain of IT support system were analyzed.The goal of overall development of IT system was proposed.The method of integration from the target architecture,basic resource layer,data layer,application layer was discussed.It can effectively support the digital transformation,and create an agile,internet based and open new generation operation support system.…”
    Get full text
    Article
  2. 4202

    Method of three-domain integration for IT support system by Yizhi DING, Lei QI, Shaoping LI, Hongwei LV, Yingxia NIU

    Published 2015-12-01
    “…For the realization of digital transformation,three-domain integration of IT support system is imperative.The present situation and problems of the three-domain of IT support system were analyzed.The goal of overall development of IT system was proposed.The method of integration from the target architecture,basic resource layer,data layer,application layer was discussed.It can effectively support the digital transformation,and create an agile,internet based and open new generation operation support system.…”
    Get full text
    Article
  3. 4203

    MODELING STOCHASTIC ADVERSE EFFECTS OF CBN 2023 REDESIGNED NAIRA NOTES POLICY ON RURAL FARMERS IN NIGERIA by Bright Okore Osu, Chigozie Chibuisi, Edikan Edem Akpanibah

    Published 2024-05-01
    “…The adverse effects of these uncertainties are modeled as Advanced Stochastic Time-Delay Differential Equation (ASTDDE). …”
    Get full text
    Article
  4. 4204

    Shoulder-surfing resistant PIN-entry method by Shudi CHEN, Youwen ZHU

    Published 2019-02-01
    “…Aiming at the problem that the traditional PIN entry method is vulnerable to shoulder-surfing attack,a secure PIN entry method against shoulder-surfing attack was proposed.The method changes the traditional input interface on the mobile device and uses the vibration channel of the device as the auxiliary channel to transmit the hidden information to the user.The user simply selects items to input PIN.The analysis shows that the proposed method can effectively resist shoulder-surfing attack.…”
    Get full text
    Article
  5. 4205

    REDUNDANCY IN TDOA METHOD OF AIRCRAFT POSITION ESTIMATION by A. O. Mashoshin

    Published 2016-12-01
    “…The factors with maximal effect on the accuracy of the functioning of the ground many-positional system are determined; a comparative analysis of the methods is carried on.…”
    Get full text
    Article
  6. 4206
  7. 4207

    Self-Diagnostic Method for Resistive Displacement Sensors by Federico Mazzoli, Davide Alghisi, Vittorio Ferrari

    Published 2024-04-01
    “…Experimental results confirm the effectiveness of the presented method.…”
    Get full text
    Article
  8. 4208
  9. 4209

    RAP detection method based on AP fingerprint by Qing LI, Ayong YE, Zhiqiang YAO, Aimin CHEN

    Published 2018-05-01
    “…The access point (AP) is an integral part of the infrastructure mode in wireless network.While the attacks caused by rogue AP (RAP) divulge a lot of users' privates in a large extent,such as the user's location information,surfing behavior on the Internet and social relations.A RAP detection algorithm based on AP fingerprint was proposed.The validity of AP was judged by the unforgeability and stability of the parameters of beacon frames.And the feasibility and effectiveness of the proposed method were further verified by scheme comparisons and experimental analysis.…”
    Get full text
    Article
  10. 4210

    Does the Method of Castration Affect Calf Performance? by Trey Warnock, Matt Hersom, Todd Thrift

    Published 2014-02-01
    “…UF/IFAS researchers recently tested different methods of castration in calves to determine the effects of each method on calf health and performance. …”
    Get full text
    Article
  11. 4211

    Does the Method of Castration Affect Calf Performance? by Trey Warnock, Matt Hersom, Todd Thrift

    Published 2014-02-01
    “…UF/IFAS researchers recently tested different methods of castration in calves to determine the effects of each method on calf health and performance. …”
    Get full text
    Article
  12. 4212

    GENETIC PROGRAMMING METHOD FOR CONTROL SYSTEMS IDENTIFICATION by Askhat I. Diveyev, Elena A. Sofronova

    Published 2010-09-01
    “…A problem of structural-parametric control systems identification is considered. The method of genetic programming with the network operator is used. …”
    Get full text
    Article
  13. 4213

    On Fractional Newton-Type Method for Nonlinear Problems by Mine Aylin Bayrak, Ali Demir, Ebru Ozbilge

    Published 2022-01-01
    “…Finally, some illustrative examples are considered to confirm the accuracy and effectiveness of both methods.…”
    Get full text
    Article
  14. 4214

    Does the Method of Castration Affect Calf Performance? by Trey Warnock, Matt Hersom, Todd Thrift

    Published 2014-02-01
    “…UF/IFAS researchers recently tested different methods of castration in calves to determine the effects of each method on calf health and performance. …”
    Get full text
    Article
  15. 4215

    METHOD OF TREATMENT FOR ANAL CANCER AFFECTING THE SKIN by O. I. Kit, L. Ya. Rozenko, E. M. Frantsiyants, M. A. Gusareva, N. G. Kosheleva, A. A. Solntseva, Yu. N. Krokhmal

    Published 2019-06-01
    “…The rates of pelvic relapses and distant metastases were similar in both groups.Conclusion. The positive effect of the proposed method for ARC treatment is determined by the combination of therapeutic factors including the action of a radiosensitizing agent introduced into tumor tissues.…”
    Get full text
    Article
  16. 4216

    NEW METHOD OF PRODUCTION OF ALUNINUM SILICON ALLOYS by V. K. Afanasiev, E. L. Marukovich, M. N. Churik, V. V. Gertsen, A. V. Gorshenin, V. A. Samon

    Published 2015-11-01
    “…Practical ways to implement the new method were proposed on the example of industrial alloys prepared on charge synthetic alloy. …”
    Get full text
    Article
  17. 4217

    Method of unknown protocol classification based on autoencoder by Chunxiang GU, Weisen WU, Ya’nan SHI, Guangsong LI

    Published 2020-06-01
    “…Aiming at the problem that a large number of unknown protocols exist in the Internet,which makes it very difficult to manage and maintain the network security,a classification and identification method of unknown protocols was proposed.Combined with the autoencoder technology and the improved K-means clustering technology,the unknown protocol was classified and identified for the network traffic.The autoencoder was used to reduce dimensionality and select features of network traffic,clustering technology was used to classify the dimensionality reduction data unsupervised,and finally unsupervised recognition and classification of network traffic were realized.Experimental results show that the classification effect is better than the traditional K-means,DBSCAN,GMM algorithm,and has higher efficiency.…”
    Get full text
    Article
  18. 4218

    Study on the Identification Method of Gear Spalling Fault by Shengli Wu, Yimin Shao, Wenting Xing, Xiaochun Jian

    Published 2019-08-01
    “…Agreement between the results of the dynamic model and the experimental results validates the effectiveness of the generated adaptive wavelet method which is used to analyze the spalling defect. …”
    Get full text
    Article
  19. 4219

    The blow-up method applied to monodromic singularities by Brigita Ferčec, Jaume Giné

    Published 2024-01-01
    “…The blow-up method proves its effectiveness to characterize the integrability of the resonant saddles giving the necessary conditions to have formal integrability and the sufficiency doing the resolution of the associated recurrence differential equation using induction. …”
    Get full text
    Article
  20. 4220

    Method of unknown protocol classification based on autoencoder by Chunxiang GU, Weisen WU, Ya’nan SHI, Guangsong LI

    Published 2020-06-01
    “…Aiming at the problem that a large number of unknown protocols exist in the Internet,which makes it very difficult to manage and maintain the network security,a classification and identification method of unknown protocols was proposed.Combined with the autoencoder technology and the improved K-means clustering technology,the unknown protocol was classified and identified for the network traffic.The autoencoder was used to reduce dimensionality and select features of network traffic,clustering technology was used to classify the dimensionality reduction data unsupervised,and finally unsupervised recognition and classification of network traffic were realized.Experimental results show that the classification effect is better than the traditional K-means,DBSCAN,GMM algorithm,and has higher efficiency.…”
    Get full text
    Article