Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
2641
High-roubustness keystroke recognition method based on acoustic spatial gradient
Published 2020-05-01Get full text
Article -
2642
A Novel Ensemble Classifier Selection Method for Software Defect Prediction
Published 2025-01-01“…This paper proposes Double Fault Disagreement (DFD), a novel diversity metric and method for selecting competent base classifiers for ensemble learning-based software defect prediction. …”
Get full text
Article -
2643
Day-ahead Clearing Method for High-proportion Hydropower Electricity Market
Published 2023-01-01“…How to handle the complex characteristics of cascade hydropower and solve the competitive spillage and power shortage problem is one of the key issues in the clearing of the high-proportion hydropower day-ahead spot electricity market.Therefore,combined with the project in Yunnan,this paper proposes a day-ahead clearing method for the high-proportion hydropower electricity market.In this method,the hydraulic constraints in the clearing model are replaced by the post-hydraulic check.Combined with the essential causes of competitive spillage and power shortage problems,the paper constructs a conditional constraint set including cascaded hydropower linkage constraints and spillage control constraints,and corresponding trigger conditions respectively.Moreover,the constraint boundaries are dynamically updated to gradually reduce competitive spillage and power shortage in the iterative solution procedure.A settlement compensation strategy is finally designed to provide corresponding benefits for plants involved in solving the spillage.The proposed method is validated by a real-world hydropower-dominated provincial system ranking second in China.The results show that competitive spillage and power shortage can be avoided or reduced substantially.It is demonstrated that this method meets the requirements of practicability and timeliness for day-ahead spot clearing of hydropower-dominated provincial power systems.…”
Get full text
Article -
2644
-
2645
A Study on the Convergence Analysis of the Inexact Simplified Jacobi–Davidson Method
Published 2021-01-01“…The Jacobi–Davidson iteration method is very efficient in solving Hermitian eigenvalue problems. …”
Get full text
Article -
2646
On the Solutions of Nonlinear Algebraic and Transcendental Equations using Adomian Decomposition Method
Published 2021-05-01Subjects: “…Nonlinear algebraic equations, Nonlinear transcendental equations; Approximate analytical solutions; Root-finding; Adomian decomposition method.…”
Get full text
Article -
2647
A Stress Measurement Method for Steel Strands Based on LC Oscillation
Published 2018-01-01“…While the detecting signals like sound and light are difficult to spread in steel strands, there is no effective method for prestress detection of the bonded prestressed steel strands in existing structures yet. …”
Get full text
Article -
2648
Modification of the Differential Transform Method With Search Direction Along the Spatial Axis
Published 2024-01-01“…This paper presents a modification of the Differential Transform Method (ModDTM) formulated so that the search direction of the solution is along a spatial axis (x). …”
Get full text
Article -
2649
Attack detection method based on spatiotemporal event correlation in intranet environment
Published 2020-01-01“…In view of the fact that a single event as an attack detection feature leads to a higher false positive rate,an intranet attack detection method using Bayesian network model for cross-space event correlation and Kalman filter linear model for cross-temporal event correlation was proposed.Based on the method,a process query system was implemented,which can scan and correlate distributed network events according to the user's high-level process description.Experimental analysis show that the proposed method can significantly reduce the false positive rate of intranet attack detection without increasing the computational overhead.…”
Get full text
Article -
2650
Corrigendum to “Prediction of Concrete Compressive Strength and Slump by Machine Learning Methods”
Published 2020-01-01Get full text
Article -
2651
A Solving Method for Forward Kinematics of 3-PRS Parallel Mechanism
Published 2019-08-01Subjects: Get full text
Article -
2652
Crack Recognition Algorithm Integrating Attention Mechanism and Region Growth Method
Published 2023-01-01“…To optimize traditional crack identification methods,improve the robustness and accuracy of the crack identification method,and realize automatic crack identification,this paper proposes a crack recognition algorithm integrating attention mechanism and region growth.It establishes dynamic thresholds and obtains the crack results under different thresholds by employing the region growth method.The attention mechanism is introduced to assign different weight coefficients to each pixel of the image according to the crack identification under dynamic thresholds for more accurate crack recognition results.Finally,the characteristic information of cracks is determined by the length of the crack skeleton and the area occupied by the crack region (length and average width of the crack).Through verifying field crack images,the results show that the crack characteristic information identified by the crack identification method integrating attention mechanism and region growth is basically consistent with the actual crack characteristics.The method features strong robustness and identification accuracy,which provides support for engineering health monitoring.…”
Get full text
Article -
2653
The Effect Of Different Training Methods On The Biomotoric and Respiratory Parameters Of Adolescent Swimmers
Published 2021-05-01“…Aim: In this study, the effect of water and terabant training with flipper outside water on selected physiological and biomotoric properties of adolescent swimmers was investigated. Method: The volunteers who participated in the study on the basis of their personal identifying information were randomly divided into two groups as training and control groups. …”
Get full text
Article -
2654
Directions and methods of improving the career development of the public servants of the federal ministries
Published 2019-09-01“…The necessity of improving the method of assigning a class rank to the civil servant of the Federal Ministry has been substantiated. …”
Get full text
Article -
2655
Calculation of the Effective Delayed Neutron Fraction by Deterministic and Monte Carlo Methods
Published 2011-01-01Get full text
Article -
2656
A Framework for Detecting Vehicle Occupancy Based on the Occupant Labeling Method
Published 2020-01-01“…The new labeling method directly labels the number of occupants instead of performing face or human labeling. …”
Get full text
Article -
2657
Research on IoT security situation awareness method based on evidence theory
Published 2022-04-01“…The security problem of IoT became more and more serious with its rapid development.Considering that the current IoT security situation awareness system lacks generality and excessively relies on expert knowledge, a IoT security situation awareness method based on improved D-S evidence theory was proposed in this paper.Fuzzy Gaussian membership function was used to calculate the vulnerability information membership matrix, which was normalized as evidence distribution matrix.The improved Topsis method was used to measure the evidence credibility.In order to fully restrain the credibility of conflicting evidence and improve the credibility of mutually supporting evidence, local credibility between two evidence was aggregated and the expected positive and negative solution vectors were improved according to the situation assessment scenario.And the weighted average method was used for vulnerability information fusion, to obtain the result of situational assessment.The result of situational awareness was fused with the time discount and high-risk vulnerability information discount evidence theory.At the same time, the IoT vulnerability information at different moments was considered comprehensively, the evidence was adaptively and dynamically weighted with the ratio information of high-risk vulnerability.The experimental results show that in the fusion of different numbers of evidence bodies and four common conflicting evidence, the improved Topsis method has higher fusion probability on credible proposition.In the aspect of situation assessment, the risk degree of current system is accurately assessed.And in the aspect of situational awareness, this discount evidence theory can predict the probability of high risk and critical risk, which is more effective than the traditional D-S evidence theory.According to this theory, a IoT security situational awareness method process was proposed, which would be used to guide engineering practice.In the future, the relationship between vulnerabilities can be considered and richer information between vulnerabilities can be extracted for vulnerability exploiting, so that the result of situation assessment is more accurate and reasonable.On the other hand, for situational awareness, game theory can be adopted in the process of dynamic game between the attacker and defender.…”
Get full text
Article -
2658
A Modified Phase Cycling Method for Complex-Valued MRI Reconstruction
Published 2020-01-01“…The phase cycling method is a state-of-the-art method to reconstruct complex-valued MR image. …”
Get full text
Article -
2659
Network function heterogeneous redundancy deployment method based on immune algorithm
Published 2021-02-01“…Aiming at the problem that the existing security defense methods cannot resist many unknown vulnerabilities and backdoors in the network function virtualization platform, a mimic defense architecture for network function virtualization using mimic defense ideas was proposed, a heterogeneous redundant deployment method based on an immune algorithm for the construction of heterogeneous pools was proposed.Firstly, the degree of heterogeneity between heterogeneous entities was quantitatively evaluated in combination with the entropy value method, then the network function heterogeneous redundant deployment problem was constructed into a minimax problem with the optimization goal of maximizing the degree of heterogeneity between heterogeneous entities, and finally the immune algorithm was used to quickly solve the optimal deployment solution of network functions.Simulation results show that the proposed method can quickly converge to an optimal deployment scheme and ensure that the overall distribution of heterogeneity between heterogeneous bodies is at a high level, effectively increasing the diversity between heterogeneous bodies and improving the attacker's difficulty.…”
Get full text
Article -
2660
Algebraic Verification Method for SEREs Properties via Groebner Bases Approaches
Published 2013-01-01“…The computational experience result in this work shows that the algebraic approach is a quite competitive checking method and will be a useful supplement to the existent verification methods based on simulation.…”
Get full text
Article