Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
2281
Effects of Milling Methods and Cultivars on Physicochemical Properties of Whole-Wheat Flour
Published 2019-01-01“…The aim of the present study was to investigate the influence of milling methods (jet mill (JM) and hammer mill (HM)) and wheat cultivars (Keumkang (K), Jokyung (J), and Anzunbaengi (A)) on physicochemical and dough properties of whole-wheat flour (WWF). …”
Get full text
Article -
2282
Update on Devices and Methods for the Administration of Intravenous Antibiotics in a Community Setting
Published 2000-01-01Get full text
Article -
2283
Research on multi-address time-based blockchain covert communication method
Published 2023-02-01“…Aiming at the problem of low amount of information carried by the existing block timestamp interval hiding method, a multi-address time-based blockchain covert communication method was proposed.Firstly, the ciphertext was split and transmitted by different addresses.The content of the ciphertext fragment was represented by the block timestamp interval of the address.Then the interval of the blocks was read and counted by the receiver where these addresses were located.Finally, the ciphertext was restored by combination.In addition, in view of the lack of concealment measures in the time-based blockchain covert communication system, a method of adjusting the time interval of transaction initiation was proposed to reduce the probability of address specificity caused by covert communication behavior.The experimental results verify that the transmission rate of the proposed method is about n times higher than that of the time-based blockchain covert communication method when n addresses are involved.…”
Get full text
Article -
2284
A Novel Balancing Method for Rotor Using Unsupervised Deep Learning
Published 2021-01-01“…A novel balancing method for rotor based on unsupervised deep learning is proposed in this paper. …”
Get full text
Article -
2285
“A Critical Study on Methods and Protagonists of Literary Criticism by Gino Tellini”
Published 2018-11-01Subjects: Get full text
Article -
2286
Network Planning Method for Capacitated Metro-Based Underground Logistics System
Published 2018-01-01“…This paper aims at developing a metro system-based ULS network planning method. First, an evaluation model of underground freight volume was proposed considering service capacity, freight flow, and regional accessibility. …”
Get full text
Article -
2287
Strong measurement method of evidence conflict based on earth mover’s distance
Published 2022-05-01“…Aiming at the problem that the conflict factor k in D-S evidence theory cannot effectively measure the degree of conflict between two bodies of evidence (BoEs), the expected features of evidence conflict strong measurement function (ECSMF) were proposed, and then a new method of evidence conflict measurement based on earth mover’s distance (EMD)was put forward.The same number of focal elements between different BoEs was not required and the evidence conflict with non-singleton propositions could be directly calculate.The proposed method did not require The theory and experiments show that the size of conflict measure proposed can correctly represent the degree of conflict between two BoEs, and has all the expected features of ECSMF, which is an effective method of evidence conflict strong measurement.…”
Get full text
Article -
2288
Malicious code within model detection method based on model similarity
Published 2023-08-01“…The privacy of user data in federated learning is mainly protected by exchanging model parameters instead of source data.However, federated learning still encounters many security challenges.Extensive research has been conducted to enhance model privacy and detect malicious model attacks.Nevertheless, the issue of risk-spreading through malicious code propagation during the frequent exchange of model data in the federated learning process has received limited attention.To address this issue, a method for detecting malicious code within models, based on model similarity, was proposed.By analyzing the iterative process of local and global models in federated learning, a model distance calculation method was introduced to quantify the similarity between models.Subsequently, the presence of a model carrying malicious code is detected based on the similarity between client models.Experimental results demonstrate the effectiveness of the proposed detection method.For a 178MB model containing 0.375MB embedded malicious code in a training set that is independent and identically distributed, the detection method achieves a true rate of 82.9% and a false positive rate of 1.8%.With 0.75MB of malicious code embedded in the model, the detection method achieves a true rate of 96.6% and a false positive rate of 0.38%.In the case of a non-independent and non-identically distributed training set, the accuracy of the detection method improves as the rate of malicious code embedding and the number of federated learning training rounds increase.Even when the malicious code is encrypted, the accuracy of the proposed detection method still achieves over 90%.In a multi-attacker scenario, the detection method maintains an accuracy of approximately 90% regardless of whether the number of attackers is known or unknown.…”
Get full text
Article -
2289
Discussion on Automatic Service Open Method Based on Smart TV Terminal
Published 2013-04-01Get full text
Article -
2290
Regularization method and a posteriori error estimates for the two membranes problem
Published 2024-12-01Subjects: Get full text
Article -
2291
Investigating feature extraction by SIFT methods for prostate cancer early detection
Published 2025-03-01“…This research study, therefore, seeks to explore the effectiveness of the SIFT method in improving feature extraction toward the accurate detection of incipient prostate cancer. …”
Get full text
Article -
2292
Transformer-based travel time estimation method for plateau and mountainous environments
Published 2025-02-01“…The objective of this study is to develop TTE methods that are applicable to wilderness areas characterized by plateau and mountainous topography. …”
Get full text
Article -
2293
Methods of Administrative and Legal Protection of Tax Relations: Theoretical and Legal Study
Published 2019-12-01Subjects: Get full text
Article -
2294
Bending fatigue strength design method for machine components with complex geometries
Published 2018-09-01“…The purpose of this study is to devise a bending fatigue strength evaluation method that can be widely used for any machine component under the consideration that bending fatigue breakage depends on the initiation of a surface fatigue crack, namely, the conditions for the initiation of a fatigue crack can be used as the criteria for bending fatigue strength design. …”
Get full text
Article -
2295
A New Elastoplastic Time-History Analysis Method for Frame Structures
Published 2020-01-01Get full text
Article -
2296
Investigating Geotourism Capabilities of Geomorphosites in Saymarreh Region Using Pralong Method
Published 2012-04-01Subjects: Get full text
Article -
2297
New attack based on smartwatch motion sensors and the protection method research
Published 2015-11-01Get full text
Article -
2298
Video as a Documentation Method: A Qualitative Study of Physiotherapists' Experiences
Published 2025-01-01“…Aim: To investigate the potential for using video as a method of documentation in physiotherapy for children and adolescents, and potential facilitators and barriers for use and implementation. …”
Get full text
Article -
2299
Comparison of VIDAS and Radioimmunoassay Methods for Measurement of Cortisol Concentration in Bovine Serum
Published 2013-01-01“…Radioimmunoassay (RIA) is the “gold standard” method for evaluation of serum cortisol concentration. …”
Get full text
Article -
2300
Fabrication of Self-Cleaning Perfluoroacrylate Blend Films by Spray Coating Method
Published 2023-03-01“…This study fabricated the superhydrophobic blend coating using a spray coating method. The flat surface of PFMA homopolymer synthesized in scCO2 medium was fabricated free meniscus coating method due to the lack of solubility in the conventional solvent. …”
Get full text
Article