Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
1981
On the Subject, Purpose and Method of Religious Education as a Practical Metaphysics
Published 2024-10-01“…Practical metaphysics employs the dialectical method in terms of human relation to truth, archaeology and genealogy for the analysis of subjectivity and forms of subjectivation, and any proper method for its pedagogical dimension.…”
Get full text
Article -
1982
ORIGINAL DHI METHOD FOR ASSESSING EPIDEMIC HAZARDS IN TRANSPORTATION SERVICES
Published 2023-12-01“…In the author's opinion, numerous and very serious problems in the transport sector and transport services are in this case the result of a lack of a methodical approach to the problem of epidemic threats, including infection in a global epidemic. …”
Article -
1983
Calculation of the transient heat distribution on the plate by the finite element method
Published 2001-12-01Get full text
Article -
1984
Bidirectional measurement differential positioning method for LEO communication satellites
Published 2024-04-01“…In scenarios such as direct-to-handset satellite, terminal designs were often configured to communicate with only one satellite, making the exploration of single-satellite positioning methods of urgent significance. Addressing the challenges of poor positioning accuracy, difficulty in clock synchronization, and slow convergence speed associated with previous single-satellite continuous observation, a bidirectional measurement differential positioning method was proposed in the context of low-orbit constellations. …”
Get full text
Article -
1985
The impact of collaborative and cooperative methods on staff’s knowledge in complaint handling
Published 2023-09-01Subjects: “…collaborative methods, cooperative methods, knowledge change, complaint handling…”
Get full text
Article -
1986
CS-communication integration method in IoT monitoring multiple phenomena
Published 2021-03-01Get full text
Article -
1987
Marriage of convenience... In search of new analytical methods in oral history
Published 2014-11-01Get full text
Article -
1988
Method of replacing the variables for generalized symmetry of the D'Alembert equation
Published 2002-01-01Get full text
Article -
1989
Multi-adversarial domain adaptation method based on feature correction
Published 2024-01-01“…Domain adaptation can transfer labeled source domain information to an unlabeled but related target domain by aligning the distribution of source domain and target domain.However, most existing methods only align the low-level feature distributions of the source and target domains, failing to capture fine-grained information within the samples.To address this limitation, a feature correction-based multi-adversarial domain adaptation method was proposed.An attention mechanism to highlight transferable regions was introduced in this method and a feature correction module was deployed to align the high-level feature distributions between the two domains, further reducing domain discrepancies.Additionally, to prevent individual classifiers from overfitting their own noisy pseudo-labels,dual classifier co-training was proposed and the feature aggregation property of graph neural networks was utilized to generate more accurate source domain labels.Extensive experiments on three benchmark datasets for transfer learning demonstrate the effectiveness of the proposed method.…”
Get full text
Article -
1990
Method of Secure Domain Creation for Multiple Points in Home Networking
Published 2015-11-01“…To simplify the process of multiple-point connection in home networking,new designs for user operation process,end point structure,state machine,and system process were presented.Analysis shows that the method proposed needs less operations and less time,lowers the faulty probability,and cuts down the service costs as well.…”
Get full text
Article -
1991
Teacher performance analysis using analytic network process method
Published 2024-06-01“…Dengan lima kriteria utama sebagai prioritas dalam penilaian kinerjanya yaitu melaksanakan pembelajaran dengan runtut dengan bobot sebesar 0.1730, menyampaikan materi pembelajaran dengan jelas dengan bobot sebesar 0.1510, menunjukan penguasaan materi pembelajaran dengan bobot sebesar 0.1240, menunjukan sikap terbuka terhadap respon siswa dengan bobot sebesar 0.1170 dan menguasai kelas dengan bobot sebesar 0.1100 Analytic Network Processis one method that can be used to select the best alternative from several alternatives.Taking The sample in this research was carried out by providing a questionnaire for all 12th grade science students. …”
Get full text
Article -
1992
Properties and Applications of the Modified Kies–Lomax Distribution with Estimation Methods
Published 2021-01-01“…We explore their performances using detailed simulation results, and the partial and overall ranks are provided for the measures of absolute biases, mean square errors, and mean relative errors to determine the best estimation method. The results show that the maximum product of spacings and maximum likelihood approaches are recommended to estimate the MKL parameters. …”
Get full text
Article -
1993
New Measure and Calculation Method for Gear Pair Normal Backlash
Published 2020-06-01“…Calculated the gear pair normal backlash constant <italic>c</italic> according to definition and calculation method of gear pair normal backlash from GB/Z 18620.2—2008 at a given work center distance. …”
Get full text
Article -
1994
New Catalytic Method for the Synthesis of 2,7-Dicycloalkyl-hexaazaperhydropyrenes
Published 2016-01-01“…An efficient method for the synthesis of 2,7-dicycloalkyl-2,3a,5a,7,8a,10a-hexaazaperhydropyrenes by the NiCl2·6H2O-catalyzed ring transformation reaction of 1,3,5-tricycloalkyl-1,3,5-triazines with 1,4,5,8-tetraazadecalin has been successfully developed.…”
Get full text
Article -
1995
Novel continuous identity authentication method based on mouse behavior
Published 2022-10-01“…With the rapid development of Internet technologies, security issues have always been the hot topics.Continuous identity authentication based on mouse behavior plays a crucial role in protecting computer systems, but there are still some problems to be solved.Aiming at the problems of low authentication accuracy and long authentication latency in mouse behavior authentication method, a new continuous identity authentication method based on mouse behavior was proposed.The method divided the user’s mouse event sequence into corresponding mouse behaviors according to different types, and mined mouse behavior characteristics from various aspects based on mouse behaviors.Thereby, the differences in mouse behavior of different users can be better represented, and the authentication accuracy can be improved.Besides, the importance of mouse behavior features was obtained by the ReliefF algorithm, and on this basis, the irrelevant or redundant features of mouse behavior were removed by combining the neighborhood rough set to reduce model complexity and modeling time.Moreover binary classification was adopted.The algorithm performed the training of the authentication model.During identity authentication, the authentication model was used to obtain a classification score based on the mouse behavior collected each time, and then the user’s trust value was updated in combination with the trust model.When the user’s trust value fell below the threshold of the trust model, it might be judged as illegal user.The authentication effect of the proposed method was simulated on the Balabit and DFL datasets.The results show that, compared with the methods in other literatures, this method not only improves the authentication accuracy and reduces the authentication latency, but also has a certain robustness to the illegal intrusion of external users.…”
Get full text
Article -
1996
RELIABILITY PREDICTION METHOD BASED ON THE 3CAW DISTRIBUTION (MT)
Published 2023-01-01Subjects: Get full text
Article -
1997
Optimization Model and Method of Variable Speed Limit for Urban Expressway
Published 2021-01-01“…The urban expressway network is the main part of the urban traffic network carrying most of the city’s traffic pressure for its continuity and rapidity, but the control method of the traffic flow was too simple to other control methods in application in addition to the ramp control and the fixed speed control. …”
Get full text
Article -
1998
Method of structural reliability analysis based on boundary distribution functions
Published 2023-10-01“…The research is aimed at the development of methods for assessing and analyzing the structural reliability of elements of building structures in practical tasks when statistical data about random variables may be incomplete or limited. …”
Get full text
Article -
1999
A search for the Method of Decreasing Attenuation in Integrated Optical Channel
Published 1981-01-01Get full text
Article -
2000
Analysis method on the properties of social networks of internet nuisance communities
Published 2024-06-01“…Given the characteristics of these organizations, which include being distant from domestic supervision and possessing strong concealment and camouflage abilities, a social network characteristic analysis method was proposed for Internet public hazards organizations. …”
Get full text
Article