Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
201
The Method of Lines for Ternary Diffusion Problems
Published 2014-01-01“…The method of lines (MOL) for diffusion equations with Neumann boundary conditions is considered. …”
Get full text
Article -
202
An efficient method to generate elliptic curves
Published 2001-01-01“…In this paper, an efficient method to generate elliptic curves for public key cryptosystems based on discrete logarithm problem is presented. …”
Get full text
Article -
203
Asymptotic Methods for Solitary Solutions and Compactons
Published 2012-01-01“…Particular attention is paid throughout the paper to giving an intuitive grasp for the variational approach, the Hamiltonian approach, the variational iteration method, the homotopy perturbation method, the parameter-expansion method, the Yang-Laplace transform, the Yang-Fourier transform, and ancient Chinese mathematics. …”
Get full text
Article -
204
A method of summability of Lagrange interpolation
Published 1994-01-01“…Therefore we improve with the linear summation method Ln* a result presented in [12] and we also point out a solution for a problem of P.L.Butzer in the proceedings of the Budapest conference in 1980.…”
Get full text
Article -
205
Scientific School “Interactive Methods of Management”
Published 2016-03-01Subjects: “…interactive methods…”
Get full text
Article -
206
Methods of Changing or Correcting the Date of Birth
Published 2024-06-01“…Legal conditions are possible through three references and five methods. One method is to act through the commission to determine the age of the subject of the single article of the law on preserving the validity of registered documents, etc. …”
Get full text
Article -
207
An Adjustment Method for the Customized Trains of the Railway
Published 2020-01-01“…In order to establish a comprehensive method for the CT operation plan, the paper proposes an intention survey method to obtain the passenger travel wishes data. …”
Get full text
Article -
208
KPDR : An Effective Method of Privacy Protection
Published 2021-01-01“…To solve the problem of user privacy disclosure caused by attacks on anonymous areas in spatial generalization privacy protection methods, a K and P Dirichlet Retrieval (KPDR) method based on k-anonymity mechanism is proposed. …”
Get full text
Article -
209
-
210
METHODICAL PROBLEM IN THE RESEARCHES OF EDUCATIONAL HISTORY
Published 2009-05-01“…Method, is a way that must be pursued for scientific researches. …”
Get full text
Article -
211
Methods of Bank Valuation in the Age of Globalization
Published 2015-06-01“…For strategic management residual income-oriented methods most useful when expected cash flows are negative throughout the forecast period. …”
Get full text
Article -
212
Sieve Method for Polynomial Linear Equivalence
Published 2013-01-01“…By combining the three sieves, we propose a sieve method for the PLE problem. As an application of our sieve method, we show that it is infeasible to construct public key encryption schemes from the PLE problem.…”
Get full text
Article -
213
PROJECTS METHOD IN ORGANIZING OF GRAPHICAL TRAINING
Published 2016-12-01Subjects: Get full text
Article -
214
Design of multi-key encryption method
Published 2020-11-01“…In order to improve the security in the process of information transmission,the current encryption methods were studied,and the research status was reported which increased the security of encryption by processing the key.According to the principle of segmenting and grouping data in the process of sending and encrypting,a method of multi-key encryption was designed:the segmenting key group and grouping key group were generated by the source key and random number,and the corresponding key was selected for each segmented and grouped data by its sequence number according to the matching algorithm.This method realized the encryption of multi-key in the process of information transmission.Finally,on the one hand,MATLAB was used to test and verify the encryption efficiency of this method.On the other hand,the security of this method was analyzed from the theoretical and mathematical perspective,comparing with the traditional method.It is concluded that this method can increase the security of the traditional method without too much cost much cost.…”
Get full text
Article -
215
Modification of the Quasilinearization Method for the Inverse Problem
Published 2007-01-01“…We propose a new modification of Bellman's quasilinearization method such that at any iteration step, it works with an approximate solution of the original nonlinear system and with new approximation of parameters α(k+1) which are close enough to the previous ones. …”
Get full text
Article -
216
The “Hand-as-Foot” teaching method in stomatology
Published 2025-02-01Subjects: Get full text
Article -
217
Methods to Quantify In-Field Nutrient Leaching
Published 2023-01-01“… This publication summarizes the basic concepts of three most-used NO3-N leaching quantification methods in field conditions. Written by Bibek Acharya, Vivek Sharma, Charles Barrett, Sudeep Singh Sidhu, Lincoln Zotarelli, and Michael D. …”
Get full text
Article -
218
-
219
Imaging method for airborne SAL data
Published 2017-03-01Subjects: “…imaging method…”
Get full text
Article -
220
Self-Treatment Methods for Livestock—Backrubbers
Published 2012-10-01“…Back rubbers are a method of pesticide self-treatment for cattle. When bothered by insects or other pests, cattle tend to rub against objects. …”
Get full text
Article