Search alternatives:
coefficient » coefficiency (Expand Search)
efficient » efficiency (Expand Search)
Showing 1 - 20 results of 118 for search 'undermine (coefficient OR efficient) (method OR methods)', query time: 0.15s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Photoluminescent Device for Monitoring Fusarium Infection in Seeds by M. N. Moskovsky, M. V. Belyakov, I. Yu. Efremenkov

    Published 2024-12-01
    “…An analysis of optical methods and devices for diagnosing plant infestations was carried out. …”
    Get full text
    Article
  6. 6

    Detecting Current Transformer Measurement Errors Using Double Decomposition Method by Bolun Du, Yinglong Diao, Huan Wang, Xiujuan Zeng, Tong Liu, Yiyi Peng

    Published 2025-01-01
    “…However, the CT measurement errors undermine the fairness of power trading. A double decomposition method is proposed to locate the abnormal phase and detect the CT measurement error in this study. …”
    Get full text
    Article
  7. 7

    Assessment methods for bicycle environment safety and comfort: A scoping review by Tufail Ahmed, Ali Pirdavani, Irene Febryana Sitohang, Geert Wets, Davy Janssens

    Published 2025-06-01
    “…However, selecting appropriate methods for specific contexts cannot be undermined. …”
    Get full text
    Article
  8. 8

    Twinkle: A GPU-based Binary-lens Microlensing Code with the Contour Integration Method by Suwei Wang, Lile Wang, Subo Dong

    Published 2025-01-01
    “…Existing microlensing codes have the issue of catastrophic cancellation that undermines the numerical stability and precision, and Twinkle resolves them by refining the coefficients of the binary-lens equation. …”
    Get full text
    Article
  9. 9

    A Precise Prediction Method for Subsurface Temperatures Based on the Rock Resistivity–Temperature Coupling Model by Ri Wang, Guoshu Huang, Jian Yang, Lichao Liu, Wang Luo, Xiangyun Hu

    Published 2025-04-01
    “…However, the existing methods encounter significant challenges in predicting the distribution characteristics of deep temperature fields with both efficiency and accuracy. …”
    Get full text
    Article
  10. 10

    Urban Planning with Rational Green Infrastructure Placement Using a Critical Area Detection Method by Herath Mudiyanselage Malhamige Sonali Dinesha Herath, Takeshi Fujino, Mudalige Don Hiranya Jayasanka Senavirathna

    Published 2024-07-01
    “…By employing the developed method, the study successfully locates priority zones for GI implementation in Saitama City, Japan, effectively pinpointing areas that require immediate attention. …”
    Get full text
    Article
  11. 11

    A competitive-collaborative nonnegative representation method and its application for face recognition in smart campus by Tingting Guo, Ziqi Li, Jun Sun, Yonghong Zhang, Qingfeng Xia, Ke Ren

    Published 2025-07-01
    “…This separation limits the method’s classification effectiveness. Furthermore, the presence of multicollinearity in the nonnegative representation may introduce inaccuracies in classification estimates, further undermining performance. …”
    Get full text
    Article
  12. 12

    Design of an Exam Cheating Detection System Application Based on Machine Learning with the Computer Vision Method by Andra Putra Hendrawan, Esti Wijayanti, Ahmad Abdul Chamid

    Published 2025-07-01
    “…This cheating not only harms honest students but also undermines the integrity of the education system. In today's digital age, various forms of cheating are increasingly difficult to detect using manual proctoring methods. …”
    Get full text
    Article
  13. 13
  14. 14

    A Data Cleaning Method for the Identification of Outliers in Fishing Vessel Trajectories Based on a Geocoding Algorithm by Li Zhang, Weifeng Zhou

    Published 2025-05-01
    “…If there is no intersection, it is determined that the current fishing vessel position is an outlier, and this point will be excluded. The method proposed in this study is able to effectively identify outliers in trajectory data, achieving efficient and effective trajectory data cleaning and improving the accuracy and reliability of the data.…”
    Get full text
    Article
  15. 15

    An improved hybrid policy optimization method for economic-preference dispatch considering cross time-scales collaboration by Qianli Zhang, Hao Tang, Duanchao Li

    Published 2025-08-01
    “…However, existing DRL methods have a deficiency in reasonably responding to the relatively long time-scale power schedule at the dispatching level, which undermines the cooperativity between the expected schedule and RAPD and also results in the incapability of well-tracking the operation preferences. …”
    Get full text
    Article
  16. 16

    Variable Dose-Constraints Method Based on Multiplicative Dynamical Systems for High-Precision Intensity-Modulated Radiation Therapy Planning by Omar M. Abou Al-Ola, Takeshi Kojima, Ryosei Nakada, Norihisa Obata, Kohei Hayashi, Tetsuya Yoshinaga

    Published 2025-06-01
    “…Specifically, because it is as an iterative process derived from discretization of a linear differential equation system using the additive Euler method, a lower-bound clipping procedure is required to prevent the state variables for both beam coefficients and dose constraints from taking negative values. …”
    Get full text
    Article
  17. 17

    Método de avaliação da suspensão do SMAS no rejuvenescimento facial A method to evaluate the SMAS suspension in facelift by Ithamar Nogueira Stocchero, Gustavo Flosi Stocchero, Guilherme Flosi Stocchero, Alexandre Siqueira Franco Fonseca

    Published 2012-09-01
    “…CONCLUSIONS: The described methodology confirms that the round block SMAS treatment technique is efficient regarding the suspension of the superficial muscular aponeurotic system, with significant reduction of the undermined area, consequently reducing the dead space, and may be a parameter to comparison of different techniques.…”
    Get full text
    Article
  18. 18

    Low Capillary Elastic Flow Model Optimization Using the Lattice Boltzmann Method and Non-Dominated Sorting Genetic Algorithm by Yaqi Hou, Wei Zhang, Jiahua Hu, Feiyu Gao, Xuexue Zong

    Published 2025-02-01
    “…In simulations of elastic flow using the lattice Boltzmann method (LBM), the steady-state behavior of the flow at low capillary numbers is typically poor and prone to the formation of bubbles with inhomogeneous lengths. …”
    Get full text
    Article
  19. 19

    XGBoost-Based Detection of DDoS Attacks in Named Data Networking by Liang Liu, Weiqing Yu, Zhijun Wu, Silin Peng

    Published 2025-05-01
    “…These attacks exploit the inherent data retrieval and caching mechanisms of NDN, leading to severe disruptions in data availability and network efficiency, thereby undermining the overall performance and reliability of the system. …”
    Get full text
    Article
  20. 20

    Building consistency in explanations: Harmonizing CNN attributions for satellite-based land cover classification by Timo T. Stomberg, Lennart A. Reißner, Martin G. Schultz, Ribana Roscher

    Published 2025-06-01
    “…However, a key challenge is that different attribution methods often produce different outcomes undermining trust in their results. …”
    Get full text
    Article