Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
2601
Non-equal-width histogram publishing method based on differential privacy
Published 2020-06-01“…Existing histogram publishing technology based on differential privacy may show phenomenon of"retracting" and "zero bucket" when histogram is used to reflect the real distribution characteristics of data,and "too gentle" in the case of large data volume.In addition,the existing technology of the original histogram difference of privacy protection when not considering the amount of information of each group is different.In view of the above problems,a kind of non-equal-width histogram publishing method based on differential privacy was proposed.First of all,a non-isometric histogram based on the sparseness of the data should bereasonably constructed by empirical distribution function.Secondly,differential privacy protection technology should be applied to non-equal-width histogram to protect the privacy of the original non-equal-width histogram.Finally,the privacy budget should be set for each group according to the class widths of the non-equal-width histogram to improve the privacy of each group of data.The experimental results show that the sparseness of the data distribution is fully taken into account when using the proposed method to perform histogram publishing under differential privacy,effectively avoid the phenomenon of histogram with “retracting” and “zero barrels”,and the accuracy of the published histogram for reflecting the characteristics of the data distribution is guaranteed.Also,when adding noise in line with Laplace mechanism to each group,setting a reasonable privacy budget for each group according to the class widths to some extent increases the privacy of different data segments.…”
Get full text
Article -
2602
Numerical Solutions of Advection Diffusion Equations Using Finite Element Method
Published 2023-04-01Subjects: “…Finite Element Method; Varational Formulation; Numerical integration…”
Get full text
Article -
2603
Comparative Analysis of YOLOv8 and HSV Methods for Traffic Density Measurement
Published 2025-01-01“…This study addresses the challenge of accurately measuring traffic density by comparing the performance of the YOLOv8 segmentation method with the traditional HSV method. At the beginning of the abstract, we clearly present the problem of accurately measuring traffic density. …”
Get full text
Article -
2604
Automotive ethernet controller authentication method based on national cryptographic algorithms
Published 2022-12-01“…With the development of intelligent and connected cars, cyber security of automotive ethernet becomes the focus of automotive industry.Authentication is one of the key technologies for automotive ethernet security.The existing authentication methods have shortcomings to meet the requirements of both safety and electronic controllers’ performance.Besides, national cryptographic algorithms are becoming a trend for automotive network security, while the related research in automotive ethernet area is still in starting phase.In order to balance the limited computing performance of electronic controllers and high security requirements of automotive ethernet, a two-stage trust chain authentication method based on national cryptographic algorithms was proposed.The method can be used in different automotive ethernet topologies.A trust chain was built up based on authentication credentials, which linked the two authentication stages, namely the initial stage and the vehicle using stage.The initial stage was triggered by diagnosis instrument at end of line or controller replacement.It deployed complete authentication based on SM2 algorithm and certificates in the initial stage.The vehicle using stage was triggered by ethernet gateway at vehicle power-on or network wakeup.In this stage, the method deployed fast authentication based on SM4 algorithm and authentication credential trust chain.The authentication credentials for trust chain were generated by credential functions.In order to ensure security, each credential was generated based on last successful authentication parameters dynamically.The test results on automotive ethernet controllers show that the method has lower computing cost and higher security level, and it can guarantee both performance and security.…”
Get full text
Article -
2605
RESEARCH ON SAFETY ASSESSMENT METHOD FOR BOX GIRDER OF BRIDGE AND GANTRY CRANE
Published 2016-01-01Subjects: Get full text
Article -
2606
DESIGN OF TRANSLATION AMBIGUITY ELIMINATION METHOD BASED ON RECURRENT NEURAL NETWORKS
Published 2024-07-01“…Comparative experimental results also show that with a reasonable setting of the similarity threshold, the advantages of the new method are more evident and can better improve the translation results.…”
Get full text
Article -
2607
Accelerating the convergence of Newton's method for the Yang-Baxter like matrix equation
Published 2025-02-01“…This article explores the application of exact line search and successive over-relaxation techniques to enhance the convergence of Newton method in solving the Yang-Baxter matrix equation for nontrivial numerical solutions. …”
Get full text
Article -
2608
Development of a Three-Dimensional Geometry Optimization Method for Turbomachinery Applications
Published 2004-01-01Get full text
Article -
2609
RETRACTED: Methods of using STEAM technologies in the development of pupils’ computational thinking
Published 2024-01-01Get full text
Article -
2610
A method of calculation of specific conductivity tensor of a anisotropic media
Published 2005-12-01“… The article presents a method for calculating specific electrical conductivity tensor. …”
Get full text
Article -
2611
AN APPROXIMATE METHOD FOR LARGE-SIZE STRUCTURAL PART RELIABLE LIFE PREDICTION
Published 2018-01-01Get full text
Article -
2612
Multi-Component BEM for the Helmholtz Equation: A Normal Derivative Method
Published 2012-01-01“…We describe a multi-component boundary element method for predicting wave energy distributions in a complex built-up system with material properties changing discontinuously at boundaries between sub-components. …”
Get full text
Article -
2613
Calculation of Liquidus Temperature for Aluminum and Magnesium Alloys Applying Method of Equivalency
Published 2013-01-01“…The analytical expressions presented in this paper are based on the “method of equivalency.” According to this concept, the influence of any alloying element on the liquidus temperature of an aluminum and/or magnesium alloy can be translated into the equivalent influence of a reference element. …”
Get full text
Article -
2614
Reliable and Swift Message Broadcast Method in Vehicular Ad Hoc Networks
Published 2015-05-01“…Since safety-related messages should be sent to a set of unspecified receivers, they are delivered by broadcast method. However, the broadcast method specified in the IEEE 802.11p does not have a collision avoidance procedure and receivers do not acknowledge when they receive a broadcast frame. …”
Get full text
Article -
2615
Different methods of bacterial inoculation on the yield of chamomile blossoms and essential oil
Published 2019-04-01Subjects: Get full text
Article -
2616
Analysis of Food Insecurity and Surveillance Based on the FANP Method in the northwest of Iran
Published 2013-05-01“…This cross-sectional study was conductedon 300 subjects (132 male and 168 female) selected randomly in the Asadabadi area of the northwest of Iran.The method is validated using the structural validation approach. …”
Get full text
Article -
2617
Research of the Transmission Accuracy Test Method of Precise Reducer used in Robot
Published 2016-01-01Subjects: Get full text
Article -
2618
Research of the Application of Statistical Energy Method in the Prediction of Acoustic Performance of Gearbox
Published 2016-01-01Subjects: Get full text
Article -
2619
Forced degradation of tacrolimus and the development of a UHPLC method for impurities determination
Published 2019-09-01“…An ultra-high performance liquid chromatography method for simultaneous determination of tacrolimus impurities in pharmaceutical dosage forms has been developed. …”
Get full text
Article -
2620
Some Iterative Methods for Solving Nonconvex Bifunction Equilibrium Variational Inequalities
Published 2012-01-01“…We prove that the convergence of implicit method requires only monotonicity. Some special cases are also considered. …”
Get full text
Article