Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
2561
Towards Sophisticated Air Traffic Control System Using Formal Methods
Published 2018-01-01“…In such a critical safety system, the use of robust formal methods that assure bugs absence is highly required. …”
Get full text
Article -
2562
A Fractional Trust Region Method for Linear Equality Constrained Optimization
Published 2016-01-01“…A quasi-Newton trust region method with a new fractional model for linearly constrained optimization problems is proposed. …”
Get full text
Article -
2563
Solar photovoltaic panel soiling accumulation and removal methods: A review
Published 2024-12-01“…In addition, the principles, status quo, effects, costs, advantages, and disadvantages of existing soiling removal methods are specifically described, thus providing a reference for the selection of soiling removal methods in different regions. …”
Get full text
Article -
2564
Shape Reconstruction for Unsteady Advection-Diffusion Problems by Domain Derivative Method
Published 2014-01-01“…This allows the investigation of iterative method for the ill-posed problem. By the parametric method, a regularized Gauss-Newton scheme is employed to the shape inverse problem. …”
Get full text
Article -
2565
APPLICATION OF LEXICOGRAPHIC METHODS IN FINDING NEW SOLUTIONS FOR THE CONSTRUCTION OF SWITCH FAUCETS
Published 2021-01-01“… Methods and techniques to stimulate creativity are indispensable in the process of obtaining more reliable and competitive products. …”
Get full text
Article -
2566
Maximum Mutual Information Feature Extraction Method Based on the Cloud Platform
Published 2013-10-01“…With the large-scale application of gene chip,gene expression data with high dimension which exists a large number of irrelevant and redundant features may reduce classifier performance problem.A maximum mutual information feature extraction method based on cloud platforms was proposed.Hadoop cloud computing platform could be a parallel computing after gene expression data segmentation,features was extracted at the same time combined with the maximum mutual information method and the characteristics of cloud computing platform filter model was realized.Simulation experiments show that the maximum mutual information feature extraction method based on the cloud platform can rapid extraction of features in a higher classification accuracy which save a lot of time resources to make a highly efficient gene feature extraction system.…”
Get full text
Article -
2567
Network traffic anomaly detection method based on multi-scale characteristic
Published 2022-10-01“…Aiming at the problem that most of the traditional network traffic anomaly detection methods only pay attention to the fine-grained features of traffic data, and make insufficient use of multi-scale feature information, which may lead to low accuracy of anomaly detection results, a network traffic anomaly detection method based on multi-scale features was proposed.The original traffic was divided into sub-sequences with multiple observation spans by using multiple sliding windows of different scales, and the multi-level sequences of each sub-sequence were reconstructed by wavelet transform technology.Multi-level reconstructed sequences were generated by Chain SAE through feature space mapping, and a preliminary judgment of abnormality was made by the classifiers of each level according to the errors of the reconstructed sequences.The weighted voting strategy was adopted to summarize the preliminary judgment results of each level to form the final result judgment.Experimental results show that the proposed method can effectively mine the multi-scale feature information of network traffic, and the detection performance of abnormal traffic is obviously improved compared with traditional methods.…”
Get full text
Article -
2568
HPTLC Method for Simultaneous Determination of Lopinavir and Ritonavir in Capsule Dosage Form
Published 2008-01-01“…A rapid and simple high performance thin layer chromatography (HPTLC) method with densitometry at λ=263 nm was developed and validated for simultaneous determination of lopinavir and ritonavir from pharmaceutical preparation. …”
Get full text
Article -
2569
X-Ray imaging method for in-situ study of particle-laden flows
Published 2025-02-01“…The study successfully visualized a parabolic velocity profile, demonstrating the method’s efficacy. …”
Get full text
Article -
2570
Design and Virtual Assembly Method of the Circulating Planetary Roller Screw Mechanism
Published 2022-07-01Subjects: Get full text
Article -
2571
Visualization of solving problems with sequences of numbers: Statistical comparison of the two methods
Published 2021-01-01Get full text
Article -
2572
Determining the Impact Bruising of Goji Berry Using a Pendulum Method
Published 2024-12-01Get full text
Article -
2573
-
2574
Key path analysis method for large-scale industrial control network
Published 2021-12-01“…In order to solve the problem of high time-consuming and resource-consuming quantitative calculation of large-scale industrial control network attack graphs, a key path analysis method for large-scale industrial control networks was proposed.Firstly, the idea of cut set was used to calculate the key nodes set of Bayesian attack graph by combining the atomic attack income in industrial control network, which solved the problem that the current cut set algorithm only considers the key nodes in graph structure.Secondly, a dynamic updating strategy of Bayesian attack graph which only updated the attack probability of key nodes was proposed to efficiently calculate the attack probability of the whole graph and analyze the key path of attack graph.The experimental results show that the proposed method can not only ensure the reliability of the calculation results of large-scale industrial control attack graphs, but also can significantly reduce the time consumption and have a significant improvement in the calculation efficiency.…”
Get full text
Article -
2575
-
2576
Application of Piecewise Successive Linearization Method for the Solutions of the Chen Chaotic System
Published 2012-01-01“…This paper centres on the application of the new piecewise successive linearization method (PSLM) in solving the chaotic and nonchaotic Chen system. …”
Get full text
Article -
2577
Influence of partitioning methods on computational cost of cfd simulations applied to hydrocyclones
Published 2020-10-01“…It was stated the choice of an adequate partitioning method can save high costs of computational power. …”
Get full text
Article -
2578
Presentation of Coastal Environmental Management Plan by using SWOT/AHP methods
Published 2013-07-01“…At first, the vision, mission, and objective of developing the environmental management of the eastern coasts of Mazandaran by SWOT (Strengths-Weaknesses-Opportunities-Threats) method have been determined. Thereafter, with using of analytic hierarchical process (AHP) method and EC (Expert chose) software have been applied to prioritize the strategies. …”
Get full text
Article -
2579
An Eigenpoint Based Multiscale Method for Validating Quantitative Remote Sensing Products
Published 2014-01-01“…Experimental results demonstrate that the proposed method is manpower-and time-saving compared with the ideal scanning method and it is satisfying to perform simultaneous observation at these eigenpoints in terms of efficiency and accuracy.…”
Get full text
Article -
2580
Neural Network and Hybrid Methods in Aircraft Modeling, Identification, and Control Problems
Published 2025-01-01Get full text
Article