Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
2621
Conjugation of Daunorubicin to Monoclonal Antihuman Sarcoma Antibody by a Novel Method
Published 1992-01-01“…Most of the reported methods for coupling anthracycline drugs to antibody result in either a loss of pharmacological activity or yield antibodies which have lost much of their immunological specificity. …”
Get full text
Article -
2622
Numerical Solutions of Advection Diffusion Equations Using Finite Element Method
Published 2023-04-01Subjects: “…Finite Element Method; Varational Formulation; Numerical integration…”
Get full text
Article -
2623
Implementation of the Drill Method in Arabic Language Learning at the Elementary Madrasah of the Ummusshabri
Published 2025-01-01Subjects: Get full text
Article -
2624
Integral invariant manifold method applied to a mathematical model of osteosarcoma
Published 2025-03-01Subjects: “…Integral invariant manifold method…”
Get full text
Article -
2625
Network security threat warning method based on qualitative differential game
Published 2018-08-01“…Most current network security research based on game theory adopts the static game or multi-stage dynamic game model,which does not accord with the real-time change and continuity of the actual network attack-defense process.To make security threats warning more consistent with the attack-defense process,the threat propagation process was analyzed referring to the epidemic model.Then the network attack-defense game model was constructed based on the qualitative differential game theory,by which the evolution of the network security state could be predicted.Based on the model,the qualitative differential game solution method was designed to construct the attack-defense barrier and divide the capture area.Furthermore,the threat severity in different security states were evaluated by introducing multidimensional Euclidean distance.By designing the warning algorithm,the dynamic warning of the network security threat was realized,which had better accuracy and timeliness.Finally,simulation results verify the effectiveness of the proposed algorithm and model.…”
Get full text
Article -
2626
Automatic Multitarget Detection Method Based on Distributed Through-wall Radar
Published 2025-02-01“…In particular, the method is over four times faster than other methods.…”
Get full text
Article -
2627
Dynamic Calibration Method of Multichannel Amplitude and Phase Consistency in Meteor Radar
Published 2025-01-01“…Despite the inherently dynamic nature of these inconsistencies, the majority of existing research predominantly employs static calibration methods to address these issues. In this study, we propose a dynamic adaptive calibration method that combines normalized least mean square and correlation algorithms, integrated with hardware design. …”
Get full text
Article -
2628
Methods and Models of Market Risk Stress-Testing of the Portfolio of Financial Instruments
Published 2015-08-01Get full text
Article -
2629
ROUTE FIRST-CLUSTER SECOND METHOD FOR PERSONAL SERVICE ROUTING PROBLEM
Published 2019-06-01Subjects: Get full text
Article -
2630
Comparison of Methods for Determining Catchment Area Threshold for Water System Extraction
Published 2023-01-01“…Most of the methods using digital elevation models (DEM) to extract water systems require the determination of catchment area thresholds.For a better understanding of the rationality and applicability of several commonly used determination methods of the catchment area threshold for water system extraction,the distance error between the real river source and the extracted one is used as a criterion to determine the rationality of the real water system extraction methods.Four main methods,namely,the drainage density method,the water-system fractal dimension method,the method of the minimum error at the river source,and the channel branching ratio method,are selected,and the Jinjiang River Basin on the southeast coast is taken as an example.The distance errors between the extracted river sources by different methods and the real river sources are compared.The results show that the visual discrimination of the catchment area threshold used by the drainage density method,water-system fractal dimension method,and channel branching ratio method has a large uncertainty,and the distance errors are large.In the method of the minimum error at the river source,the catchment area threshold is determined according to the minimum distance error between the extracted river source and the real one,which is unique.Hence,it is a more reasonable method among the four DEM-based real water system extraction methods.…”
Get full text
Article -
2631
New extension method of trusted certificate chain in virtual platform environment
Published 2018-06-01“…When using trusted computing technology to build a trusted virtual platform environment,it is a hot problem that how to reasonably extend the underlying physical TPM certificate chain to the virtual machine environment.At present,the certificate trust expansion schemes are not perfect,either there is a violation of the TCG specifications,or TPM and vTPM certificate results inconsistent,either the presence of key redundancy,or privacy CA performance burden,some project cannot even extend the certificate trust.Based on this,a new extension method of trusted certificate chain was proposed.Firstly,a new class of certificate called VMEK (virtual machine extension key) was added in TPM,and the management mechanism of certificate VMEK was constructed,the main feature of which was that its key was not transferable and could be used to sign and encrypt the data inside and outside of TPM.Secondly,it used certificate VMEK to sign vTPM’s vEK to build the trust relationship between the underlying TPM and virtual machine,and realized extension of trusted certificate chain in virtual machine.Finally,in Xen,VMEK certificate and its management mechanism,and certificate trust extension based on VMEK were realized.The experiment results show that the proposed scheme can effectively realize the remote attestation function of virtual platform.…”
Get full text
Article -
2632
A Dresser Drawer Method of Managing Insect and Mite Resistance in Ornamentals
Published 2009-01-01“…Nagle, describes a dresser drawer method to develop pesticide rotation plans that can extend the useful lives of pesticides. …”
Get full text
Article -
2633
A New Iterative Method for Finding Approximate Inverses of Complex Matrices
Published 2014-01-01“…This paper presents a new iterative method for computing the approximate inverse of nonsingular matrices. …”
Get full text
Article -
2634
Binary program taint analysis optimization method based on function summary
Published 2023-04-01“…Taint analysis is a popular software analysis method, which has been widely used in the field of information security.Most of the existing binary program dynamic taint analysis frameworks use instruction-level instrumentation analysis methods, which usually generate huge performance overhead and reduce the program execution efficiency by several times or even dozens of times.This limits taint analysis technology’s wide usage in complex malicious samples and commercial software analysis.An optimization method of taint analysis based on function summary was proposed, to improve the efficiency of taint analysis, reduce the performance loss caused by instruction-level instrumentation analysis, and make taint analysis to be more widely used in software analysis.The taint analysis method based on function summary used function taint propagation rules instead of instruction taint propagation rules to reduce the number of data stream propagation analysis and effectively improve the efficiency of taint analysis.For function summary, the definition of function summary was proposed.And the summary generation algorithms of different function structures were studied.Inside the function, a path-sensitive analysis method was designed for acyclic structures.For cyclic structures, a finite iteration method was designed.Moreover, the two analysis methods were combined to solve the function summary generation of mixed structure functions.Based on this research, a general taint analysis framework called FSTaint was designed and implemented, consisting of a function summary generation module, a data flow recording module, and a taint analysis module.The efficiency of FSTaint was evaluated in the analysis of real APT malicious samples, where the taint analysis efficiency of FSTaint was found to be 7.75 times that of libdft, and the analysis efficiency was higher.In terms of accuracy, FSTaint has more accurate and complete propagation rules than libdft.…”
Get full text
Article -
2635
Method of detecting IRC Botnet based on the multi-features of traffic flow
Published 2013-10-01“…To resolve the problem of detecting IRC Botnet,a method based on traffic flow characteristics was proposed.The characteristics of Botnet channel traf?…”
Get full text
Article -
2636
Vulnerability detection method for blockchain smart contracts based on metamorphic testing
Published 2023-10-01“…Aimed at the defects of existing test methods, a vulnerability detection method for blockchain smart contracts based on metamorphic testing was proposed, which could generate test cases for specific functions in blockchain smart contracts to detect possible vulnerabilities.According to the possible security vulnerabilities, different metamorphosis relationships were designed and then metamorphic testing was performed.Through verifying whether the metamorphic relationship between the source test case and the subsequent test case was satisfied, whether the smart contract had related security vulnerabilities was judged.The experimental results show that the proposed method can effectively detect the security vulnerabilities in the smart contracts.…”
Get full text
Article -
2637
An Accurate Method for Extracting the Critical Field in Short Channel NMOS Devices
Published 2001-01-01“…In this letter, an accurate method for extracting the critical field Ec in short channel MOSFET's is presented. …”
Get full text
Article -
2638
Forward-backward resolvent splitting methods for general mixed variational inequalities
Published 2003-01-01Get full text
Article -
2639
Method for determining the lengths of protocol keywords based on maximum likelihood probability
Published 2016-06-01“…A left-to-right inhomogeneous cascaded hidden Markov modelwas proposed and applied to model application protocol messages.The proposed modeldescribed the transition probabilities between states and the evolution rule of phases inside the states,revealed the transition feature ofmessage fields and the left-to-right Markov characteristicsinside the fields.The protocol keywords were inferred by selecting lengths with maximum likelihood probability,and then the message format was recovered.The experimental results demonstrated that the proposed method perform well in protocol keyword extraction and message format recovery.…”
Get full text
Article -
2640
Fatigue Life Prediction of the Zirconia Fixture Based on Boundary Element Method
Published 2020-01-01“…To this end, a boundary element method is developed in this paper to investigate their crack growth and fatigue life. …”
Get full text
Article