Search alternatives:
method » methods (Expand Search)
Showing 321 - 340 results of 22,805 for search 'method of identification', query time: 0.23s Refine Results
  1. 321

    Identification Method for Resistance Coefficients in Heating Networks Based on an Improved Differential Evolution Algorithm by Enze Zhou, Yaning Liu, Minjia Du, Junli Yu, Wenxiao Xu

    Published 2025-07-01
    “…Furthermore, a multi-constrained identification model is constructed based on Kirchhoff’s laws. …”
    Get full text
    Article
  2. 322
  3. 323
  4. 324

    Modulation Format Identification Method Based on Multi-Feature Input Hybrid Neural Network by Zhiqi Huang, Xiangjun Xin, Qi Zhang, Haipeng Yao, Feng Tian, Fu Wang

    Published 2024-01-01
    “…A modulation format identification (MFI) method is proposed for high-speed optical fiber communication systems employing probabilistic shaping (PS) signals in polarization division multiplexing (PDM). …”
    Get full text
    Article
  5. 325
  6. 326

    A Case Study Comparing Methods for Coal Thickness Identification in Complex Geological Conditions by Tao Ding, Yanhui Wu, Lei Wang, Zhen Nie, Lei Zhang

    Published 2024-11-01
    “…This study compares the effectiveness of different methods for coal thickness identification, aiming to identify the most accurate approach and provide a reference for intelligent coalmine development. …”
    Get full text
    Article
  7. 327

    Identification method for wheel/rail tread defects based on integrated partial convolutional network by CHENG Xiang, HE Jing, ZHANG Changfan, JIA Lin

    Published 2024-09-01
    “…This method incorporated a dense underexposure self-correction network (D-SCNet) integrated into the initial layer of the identification model. …”
    Get full text
    Article
  8. 328
  9. 329

    Method for Remote State Identification Snow-Ice Cover by the Ratio of Fresnel Reflection Coefficients by V. G. Mashkov

    Published 2020-11-01
    “…In contrast to the known methods of identification of the surface layer the identification of multilayer medium layers was carried out.…”
    Get full text
    Article
  10. 330

    An Empirical Evaluation of Supervised Learning Methods for Network Malware Identification Based on Feature Selection by C. Manzano, C. Meneses, P. Leger, H. Fukuda

    Published 2022-01-01
    “…Therefore, it is empirically evidenced that the proposed method for the selection of features, based on statistical techniques of reduction and extraction of attributes, allows improving the identification performance of malware traffic, discriminating it from the benign traffic of Android applications.…”
    Get full text
    Article
  11. 331

    Feature Extraction and Anomaly Identification Method for Power Customer Price in Power Market Enviroment by ZHU Feng, SHAN Chao, WU Ning, CAI Qixin, ZHU Yunan, LIU Yunpeng, ZUO Qiang

    Published 2025-07-01
    “…Identifying electricity price anomalies and exploring the underlying reasons in such a complex market environment, especially with incomplete data, is a key issue for promoting the orderly operation of power market and ensuring the reasonable interests of power customers. Therefore, a method is established for feature extraction and anomaly identification of electricity prices for power customers. …”
    Get full text
    Article
  12. 332

    An empty-nest power user identification method based on weighted random forest algorithm by Zimeng LU, Jiayi CHEN, Jing LI, Yue XIE, Xinli JIANG, Lei HAN, Qian GUO

    Published 2020-08-01
    “…In view of the lack of effective technical means for the identification of empty-nesters by the government and the society,an empty-nesters prow user identification method based on weighted random forest algorithm was proposed.Firstly,some accurate labels of empty-nest users were obtained through questionnaires,and electricity characteristic library was drawn from three aspects:electricity consumption level,electricity consumption fluctuation and electricity consumption trend.Due to the data imbalance between empty-nest and non-empty-nest users,the weighted random forest algorithm was used to improve the data sensitivity phenomenon of machine learning.Finally,the algorithm model was put online in the power company’s acquisition system.The 2 000 unknown users of various types were identified,among which the identification accuracy of empty-nest users was 74.2%.The results show that the identification of empty-nesters from the perspective of electricity consumption can help power grid companies to understand the personalized and differentiated needs of empty-nesters,so as to provide users with more sophisticated services,and also assist the government and society to carry out assistance work.…”
    Get full text
    Article
  13. 333
  14. 334
  15. 335

    Dynamic Identification Method of Distribution Network Weak Links Considering Disaster Emergency Scheduling by Wenlu Ji, Lan Lan, Lu Shen, Dahang Shi, Chong Wang

    Published 2025-07-01
    “…Finally, the four indexes are comprehensively analyzed, and the dynamic identification of the weak links in the distribution network are realized by the analytic hierarchy process (AHP)—entropy weight (EW)—technique for order preference by similarity to an ideal solution (TOPSIS) method. …”
    Get full text
    Article
  16. 336

    A Novel Tool Wear Identification Method Based on a Semi-Supervised LSTM by Xin He, Meipeng Zhong, Chengcheng He, Jinhao Wu, Haiyang Yang, Zhigao Zhao, Wei Yang, Cong Jing, Yanlin Li, Chen Gao

    Published 2025-02-01
    “…The proposed method leverages both small labeled and abundant unlabeled data to improve tool wear identification performance. …”
    Get full text
    Article
  17. 337
  18. 338
  19. 339

    WORKING OUT AND VALIDATION CHARACTERISTICS OF THE METHOD OF QUANTITATIVE IDENTIFICATION OF DIMEBON CONTENT IN DERMATOLOGICAL GEL by K. N. Koryanova, A. V. Majorova, E. F. Stepanova, E. I. Khartyunova, S. P. Senchenko

    Published 2015-10-01
    “…Working out and further validation of the method of quantitative identification of dimebon in soft dosage forms were the purpose of the study. …”
    Get full text
    Article
  20. 340

    A Localization Enhancement Method Based on Direct-Path Identification and Tracking for Future Networks by Yuhong Huang, Youping Zhao

    Published 2025-07-01
    “…To address this problem, this paper proposes a localization enhancement method based on direct-path identification and tracking. …”
    Get full text
    Article