Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
2501
Infrared Drying as a Quick Preparation Method for Dried Tangerine Peel
Published 2017-01-01“…To establish the most convenient and effective method to dry tangerine peels, different methods (sun drying, hot-air drying, freeze drying, vacuum drying, and medium- and short-wave infrared drying) were exploited. …”
Get full text
Article -
2502
Stochastic job stream scheduling method for cipher chip with multi-cryptography
Published 2016-12-01“…Aiming at the rich of safety requirements of tasks which resulting in random cross access to multi cipher algorithms, a hierarchical hardware scheduling method was presented with associated control based on data identifica-tion. …”
Get full text
Article -
2503
Traffic anomaly detection method in networks based on improved clustering algorithm
Published 2015-12-01“…To solve the problem that traditional traffic abnormal detection methods were not accurate enough,a traf-fic anomaly detection method based on improved k-means was proposed.All kinds of network traffic data were pre-processed to make k-means algorithm can apply to enumeration data detection.Then a features selection method was pro-posed with the analysis of the distribution of network traffic data to avoid the distance useless caused by too much fea-tures.Furthermore,the clustering process of K clusters was optimized based on dichotomy,aiming to reduce the effects of initial clusters centers selection.Simulation results demonstrate the effectiveness of the algorithm.…”
Get full text
Article -
2504
A High-Order Compact 2D FDFD Method for Waveguides
Published 2012-01-01“…Numerical examples are given, which show that this high-order compact 2D FDFD method is more efficient than the low-order compact 2D FDFD method and has a less storage cost.…”
Get full text
Article -
2505
Study on the Load Spectrum Test Method and Experiment of Shaft Parts of Loader
Published 2017-01-01“…In order to obtain the load time history data of the shaft parts of loader drive system under the actual load,based on the load transfer principle and the design theory of the sensor,the load time history of shaft parts of the multi parameter test method is researched.Aiming at the key and difficult points of the load spectrum testing of the loader drive system,the dynamic telemetry device is used to solve the problem of parameter measurement in small space.The load signal acquisition system of loader shaft parts is established.And the system consisted of half shaft,drive shaft torque and speed parameters acquisition,engine speed parameters and the acquisition of gear parameters.The load time history data of the shaft parts are obtained by selecting the 50 type loader as the test sample.The test results show that the load test method is accurate and feasible,and the test method has very good generality and could be used for testing the load data of shaft parts of automobile,agricultural machinery and so on.…”
Get full text
Article -
2506
Microblog hot topic detection method based on meaningful string clustering
Published 2013-08-01“…Aiming at the properties of sparse feature, content fragmentation for microblog data, a hot topic detection method was proposed based on meaningful string clustering. …”
Get full text
Article -
2507
Risk Assessment Method for Offshore Structure Based on Global Sensitivity Analysis
Published 2012-01-01“…Based on global sensitivity analysis (GSA), this paper proposes a new risk assessment method for an offshore structure design. This method quantifies all the significances among random variables and their parameters at first. …”
Get full text
Article -
2508
Comprehensive two-phase flow calculation method with in-channel refrigerant boiling
Published 2020-06-01Get full text
Article -
2509
Optimally stable fifth-order integration methods: a numerical approach
Published 1978-01-01Subjects: “…linear multistep methods…”
Get full text
Article -
2510
INTERVAL ANALYSIS METHOD OF RELIABILITY PREDICTION ON AUTOMOTIVE BRAKE SYSTEM AND TIRE
Published 2015-01-01“…The calculation results show that this method is effective and feasible, which provide a reference design for improvement and the adjustment of automotive brake system and tire.…”
Get full text
Article -
2511
An intrusion detection method based on depthwise separable convolution and attention mechanism
Published 2023-03-01“…In order to improve the accuracy of multi-classification in network intrusion detection, an intrusion detection method was proposed based on depthwise separable convolution and attention mechanism.By constructing a cascade structure combining depthwise separable convolution and long-term and short-term memory networks, the spatial and temporal features of network traffic data can be better extracted.A mixed-domain attention mechanism was introduced to enhance the detection performance.To solve the problem of low detection rate in some samples, a data balance strategy based on the combination of the variational auto-encoder (VAE) the generative adversarial network (GAN) and was designed, which can effectively cope with imbalanced datasets and improve the adaptability of the proposed detection method.The experimental results show that the proposed method is able to achieve 99.80%, 99.32%, and 83.87% accuracy on the CICIDS-2017, NSL-KDD and UNSW-NB15 datasets, which is improved by 0.6%, 0.5%, and 2.3%, respectively.…”
Get full text
Article -
2512
CALCULATION METHODS OF OPTIMAL ADJUSTMENT OF CONTROL SYSTEM THROUGH DISTURBANCE CHANNEL
Published 2014-10-01“…These methods allow to optimize the analog and digital regulators, taking into account minimization of regulated influences. …”
Get full text
Article -
2513
Formal modeling and security analysis method of security protocol based on CPN
Published 2021-09-01“…To solve the problem of modeling and analyzing with colored Petri net (CPN), which was determining vulnerabilities in hole location but couldn’t identify any attack path, and the problem of when the introduction of the attacker model, the number of possible message paths in the CPN formal model of security protocol surges the state space prone to explosion, which made it difficult to extract accurate attack paths, the formal modeling method of security protocol was improved base on CPN, the attack paths were verified and extracted, further the fine-grained protocol modeling and control were adopted.As well as in the aspect of state-space convergence, and a waiting-sync method for different processes of CPN model in each hierarchy model was proposed, which effectively controlled the state-space scale of the model.Through the security evaluation and analysis of TMN protocol, 25 attack paths of the protocol are extracted successfully, the security of the protocol is evaluated, and the effectiveness of the proposed method is proved.…”
Get full text
Article -
2514
2021–2022 Florida Citrus Production Guide: Fertilizer Application Methods
Published 2021-08-01Get full text
Article -
2515
The Propagation of Thermoelastic Waves in Different Anisotropic Media Using Matricant Method
Published 2022-01-01“…In this paper, an analytical study has been carried out by using method of matricant to investigate the propagation of longitudinal elastic and heat waves in the anisotropic medium of a monoclinic, trigonal, hexagonal, and cubical crystal systems. …”
Get full text
Article -
2516
A Modern Syllogistic Method in Intuitionistic Fuzzy Logic with Realistic Tautology
Published 2015-01-01“…The Modern Syllogistic Method (MSM) of propositional logic ferrets out from a set of premises all that can be concluded from it in the most compact form. …”
Get full text
Article -
2517
BASED ON AVERAGING METHOD ANALYSIS OF THE SINGLE DEGREE OF FREEDOM AMPLITUDE FREQUENCY
Published 2019-01-01Subjects: Get full text
Article -
2518
A New Method of Moments for the Bimodal Particle System in the Stokes Regime
Published 2013-01-01“…In order to investigate this system, the conventional method of moments (MOM) should be extended to include the interaction between different particle clusters. …”
Get full text
Article -
2519
Data quality optimized online task allocation method for mobile crowdsensing
Published 2020-12-01Get full text
Article -
2520
On the use of the stepped isostress method in the prediction of creep behavior of polyamide 6
Published 2022-09-01Subjects: Get full text
Article