Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
2521
Hish speed deep packet inspection method with low power dissipation
Published 2011-01-01“…Hish speed deep packet inspection using TCAM faces the problem of high power dissipation.A 2-phase DPI method BF-TCAM was proposed.The first phase used parallel Bloom filters to exclude the normal packets not including attack signatures.The second phase used TCAM to inspect suspicious packets including real attack packets and false positive packets of the first phase.The Bloom filters’ false negative probability is zero and false positive probability is very low.Since most of the network data traffic does not include attack signatures,the method can get high speed deep packet inspection with low power dissipation.…”
Get full text
Article -
2522
Indirect Method of Moisture Degree Evaluation in Varistors by Means of Dielectric Spectroscopy
Published 2024-12-01“…Their reliability, however, requires periodic inspection, which should specifically include assessment of their moisture content. So far, no method has been developed that would directly and non-invasively allow for the assessment of the moisture content of a varistor. …”
Get full text
Article -
2523
Bayesian-network-approximate-reasoning-based method for network vulnerabilities evaluation
Published 2008-01-01“…To evaluate the large-scale computer networks,a Bayesian-network-approximate-reasoning-based method for vulnerabilities evaluation was proposed.First,it models the elements which compose the network and the factors which affect the network security.Second,it builds the attack state graph(ASG) of the computer network to describe the process of vulnerability exploitation.Then,it makes the approximate reasoning to the ASG by stochastic sampling.At last,after the samples analysis and statistic,it achieves the quantitative evaluation result and will provide the theoretical evidence to improve the network security.…”
Get full text
Article -
2524
Mesenchymal Stromal Cells: Novel Methods for Characterization, Understanding Differentiation, and Function
Published 2014-01-01Get full text
Article -
2525
Adaptive selection method of differential privacy GAN gradient clipping thresholds
Published 2018-05-01“…A method of adaptive selection of differential privacy GAN gradient clipping threshold was proposed.The method assumes that a small portion of public data that is identically distributed with the private data can be accessed,a batch of data is randomly selected from the public data,a clipping threshold is set as an average gradient norm of the batch of data,and the above operations are iterated until the network converges.The method was verified on the Mnist and Cifar10 data sets.The results show that under a reasonable privacy budget,the accuracy of CNN classifiers is improved by 1%~4% compared with the differential privacy auxiliary classifier GAN,inception scores increased by 0.6~1.2.…”
Get full text
Article -
2526
A System Identification-Based Damage-Detection Method for Gravity Dams
Published 2021-01-01“…In order to evaluate the efficiency of the proposed method in field condition, 10% noise is added to the structural response. …”
Get full text
Article -
2527
Research on the improvement method of imbalance of ground penetrating radar image data
Published 2025-01-01“…The effect on accuracy by varying the proportions of different kinds of samples and traditional expansion methods is also explored. The improvement of the classification network accuracy and FlD metrics illustrates the better performance of the proposed method.…”
Get full text
Article -
2528
Log-Cubic Method for Generation of Soil Particle Size Distribution Curve
Published 2013-01-01“…The log-cubic method and commonly used log-linear and log-spline methods were evaluated by the leave-one-out cross-validation method for 394 soil samples extracted from UNSODA database. …”
Get full text
Article -
2529
An Accurate Integral Method for Vibration Signal Based on Feature Information Extraction
Published 2015-01-01“…After summarizing the advantages and disadvantages of current integral methods, a novel vibration signal integral method based on feature information extraction was proposed. …”
Get full text
Article -
2530
Evaluating Lateral Spreading Using Newmark Method Based on Liquefaction Triggering
Published 2020-01-01“…In this paper, a simplified prediction method based upon Newmark sliding block analysis was proposed to predict the liquefaction-induced lateral spreading. …”
Get full text
Article -
2531
Calculating the feature method of short text based on analytic hierarchy process
Published 2016-12-01“…In order to model the accurate interest preference of microblog users and discover user groups with similar in-terest, a new method was proposed which considered the total amount of retweets, comments and attitudes of each mi-croblog for text feature calculation with utilizing classic analytical hierarchy process method. …”
Get full text
Article -
2532
A Comprehensive Review of Flamelet Methods: Future Directions and Emerging Challenges
Published 2024-12-01“…The review also highlights ongoing debates within the research community regarding the validity of the flamelet approach, particularly in high-speed flows, and suggests that while alternative methods may offer more detailed modeling, they often come with prohibitive computational costs. …”
Get full text
Article -
2533
New version of Universal modeling method for centrifugal compressors calculation development
Published 2019-06-01“…The math model of Universal modeling method is a sum of algebraic equations for calculation of head losses. …”
Get full text
Article -
2534
Study on the Analyzing and Simulating Method of Workspace of Force Reflecting Main Manipulator
Published 2016-01-01“…The functional relationships between robotic end- effector space position and variables for robotic joints are obtained through the main manipulator forward kinematics solution calculation,a simulation of main manipulator workspace is conducted by adopting numerical,graphical method and analytic method in the Matlab. According to the position information of collecting by 3D electromagnetic tracking system,through the quantitative and qualitative analysis,the correctness of the simulation method for solving the main manipulator workspace is verified. …”
Get full text
Article -
2535
Validation methods for encapsulated faecal microbiota transplantation: a scoping review
Published 2025-02-01“…Encapsulated FMT is a patient-friendly application method that improves accessibility and convenience. …”
Get full text
Article -
2536
Method for Correction of Design Diacoptic Z-Matrix of Complicated Power System
Published 2004-06-01“…The paper proposes correction method of a design diacoptic Z-matrix of complicated power system that ensures high manoeuvrability while calculating steady - state conditions.…”
Get full text
Article -
2537
['STABILIZED NUMERICAL METHODS FOR THE TWO KINDS OF PROBLEMS OF INCOMPRESSIBLE FLUID FLOWS']
Published 2021-09-01Get full text
Article -
2538
LIGHTWEIGHT DESIGN OF STRUCTURES BASED ON A SEMIDEFINITE PROGRAMMING METHOD (MT)
Published 2022-01-01“…A semidefinite programming-based optimization method is proposed for lightweight design of boom and stay bars of container cranes. …”
Get full text
Article -
2539
Verifiable federated aggregation method based on homomorphic proxy re-authentication
Published 2024-06-01“…Additionally, a privacy-preserving, efficient, and trustworthy federated learning aggregation method was constructed, combining the double mask technique. …”
Get full text
Article -
2540