Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
2181
A UWB NLOS identification method under pedestrian occlusion
Published 2023-12-01“…Ultrawideband (UWB) is a hot technology for indoor positioning with large bandwidth, strong anti-interference ability, and high multipath resolution capacity.However, due to the complex indoor environment, UWB signal propagation will inevitably be blocked, resulting in non-line-of-sight (NLOS) propagation, which greatly reduces the accuracy of UWB positioning.Therefore, identifying NLOS signals accurately and discarding or correcting them are important to alleviate the problem of the decline in positioning accuracy.The majority of present NLOS identification work focuses on scenes with building structures such as walls.Further discussion is needed for scenes obscured by pedestrians.Since the impact of human obstacles on the signals is more complex and cannot be ignored, the NLOS identification under pedestrian occlusion was studied.By comparing a variety of machine learning methods and signal feature combinations, the random forest method based on the three-dimensional features of the first path signal power, the received signal power, and the measured distance was proposed.These features with fewer dimensions and easy extraction were used to achieve a high identification percentage for NLOS.The experimental results based on the measured data of different devices show that the NLOS identification accuracy based on the proposed method reaches 99.05%, 99.32% and 98.81% respectively.…”
Get full text
Article -
2182
Network security situation evaluation method for multi-step attack
Published 2017-01-01“…Aiming at analyzing the influence of multi-step attack,as well as reflecting the system’s security situation accurately and comprehensively,a network security situation evaluation method for multi-step attack was proposed.This method firstly clustered security events into several attack scenes,which was used to identify the attacker.Then the attack path and the attack phase were identified by causal correlation of every scene.Finally,combined with the attack phase as well as the threat index,the quantitative standard was established to evaluate the network security situation.The proposed method is assessed by two network attack-defense experiments,and the results illustrate accuracy and effectiveness of the method.…”
Get full text
Article -
2183
A Vegetable-Price Forecasting Method Based on Mixture of Experts
Published 2025-01-01“…As a result, we propose a novel vegetable-price forecasting method based on mixture of expert models (VPF-MoE), which combines the strengths of large language models and deep learning methods. …”
Get full text
Article -
2184
Intelligent Diagnosis Method of Gear Faults based on MGAN and CNN
Published 2022-07-01“…An intelligent diagnosis method of gear faults based on MGAN (Mixture Generative Adversarial Nets) and CNN (Convolutional Neural Networks) is proposed. …”
Get full text
Article -
2185
Epidemiological methods in transition: Minimizing biases in classical and digital approaches.
Published 2025-01-01“…Therefore, we briefly describe some of the possible biases arising from varied collection methods and sources, and offer some recommendations to better explore the potential of Digital Epidemiology, particularly on how to help reduce inequity.…”
Get full text
Article -
2186
Secure network coding method merged with timestamp and homomorphic signature
Published 2013-04-01“…A secure network coding method merged with timestamp and homomorphic signature which can solve security issues in wireless multi-hop networks was proposed.The timestamp into RSA-based homomorphic signature scheme was brought and used to produce random coefficients of net it possible to defend pollution attacks and replay attacks simultaneously while maintaining the homomorphic property of the signature.The analysis that mainly focus on was the influence of random coefficients on decoding probability of network coding a security of the proposed scheme.Results indicate that the proposed scheme can defend pollution attacks and replay attacks simultaneously,and the ratio of overhead between RSA-based homomorphic signature scheme and the proposed scheme is approximates 1.…”
Get full text
Article -
2187
Method of reliability coefficients with adjustable values for steel structures design
Published 2024-09-01Subjects: “…modified partial factor method…”
Get full text
Article -
2188
Technology of special castings fabrication using die casting method
Published 2003-08-01Get full text
Article -
2189
Development of Difference Spectroscopic Method for the Estimation of Balsalazide in Bulk and in Formulation
Published 2009-01-01“…A simple, precise and accurate difference spectroscopic method has been developed for the estimation of balsalazide in bulk and in pharmaceutical dosage form. …”
Get full text
Article -
2190
Cultural Method Considerations for Integrated Weed Management in Agronomic Crops
Published 2021-05-01“… This article provides growers with information on various cultural methods to increase weed control in their fields, reduce herbicide inputs, and contribute to integrated weed management. …”
Get full text
Article -
2191
Attack path prediction method based on causal knowledge net
Published 2016-10-01“…The existing attack path prediction methods can not accurately reflect the variation of the following attack path caused by the capability of the attacker.Accordingly an attack path prediction method based on causal knowledge net was presented.The proposed method detected the current attack actions by mapping the alarm sets to the causal knowledge net.By analyzing the attack actions,the capability grade of the attacker was inferred,according to which adjust the probability knowledge distribution dynamically.With the improved Dijkstra algorithm,the most possible attack path was computed.The experiments results indicate that the proposed method is suitable for a real network confrontation environment.Besides,the method can enhance the accuracy of attack path prediction.…”
Get full text
Article -
2192
FTIR: A novel method for identifying fish gut contents
Published 2024-06-01“…However, the formulated feed, which is a mixture of various plant and animal-derived materials, and its resulting feces were not as distinguishable.Conclusion: According to the results, it seems that the FTIR will be practical and reliable method to identify foods used by fish in aquaculture or nature using fish feces. …”
Get full text
Article -
2193
Aircraft Bearing Fault Diagnosis Method Based on LSTM-IDRSN
Published 2025-01-01“…Additionally, the model maintains high precision and stability even under noise interference, outperforming other methods.…”
Get full text
Article -
2194
Current agritourism literature: What methods did researchers prefer?
Published 2024-01-01“…More than half of original scientific studies opted for quantitative data collection and analysis, followed by qualitative methods (28%), mixed model (9%) and mixed methods (7%). …”
Get full text
Article -
2195
Rule-defect oriented browser XSS filter test method
Published 2018-11-01“…In order to alleviate XSS (cross-site scripting) attacks,modern browsers use XSS filters for defense.It is difficult to effectively test and evaluate the security of browser XSS filters.The rule-defect is the defect and security problem in the implementation process of browser XSS filter.The formal definition,design test sample and scene generation algorithm were presented for browser XSS filter rule-defects.In order to quantitatively test and evaluate the filtering level of different browser XSS filters,combined with filtering success rate,false positive rate,input loss calculation filtering ability.Based on the proposed method,the prototype system is designed to automate the testing of several mainstream browser XSS filters,and the XSS filtering capabilities of different browsers are obtained.Further,after actual testing,the system also has the ability to discover undisclosed vulnerabilities.…”
Get full text
Article -
2196
Enriched Meshfree Method for an Accurate Numerical Solution of the Motz Problem
Published 2016-01-01“…The Motz problem has been known as a benchmark problem to verify the efficiency of numerical methods in the presence of a jump boundary data singularity at a point, where an abrupt change occurs for the boundary condition. …”
Get full text
Article -
2197
-
2198
The Use of Machine Learning Methods in Road Safety Research in Poland
Published 2025-01-01Get full text
Article -
2199
Comprehensive review of greenness, whiteness, and blueness assessments of analytical methods
Published 2025-03-01“…Thus, modern assessment tools have evolved to include sample preparation in their evaluation, providing a more comprehensive and fair judgment of the sustainability of the method. Today, various metrics are available to evaluate the sustainability of analytical methods, including green metrics and models for assessing whiteness, blueness, or the practicality of the method. …”
Get full text
Article -
2200
Screening Methods for Southern Chinch Bug Resistance in St. Augustinegrass
Published 2014-11-01“…(Photo credit: Long Ma, UF/IFAS Extension) ENY-480/IN1050: Screening Methods for Southern Chinch Bug Resistance in St. …”
Get full text
Article