Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
2741
Water Permeability of Pervious Concrete Is Dependent on the Applied Pressure and Testing Methods
Published 2015-01-01“…Falling head method (FHM) and constant head method (CHM) are, respectively, used to test the water permeability of permeable concrete, using different water heads on the testing samples. …”
Get full text
Article -
2742
The Underwater Projectile Launching Process Prediction Based on Reduced Order Method
Published 2024-01-01“…In this paper, computational fluid dynamics (CFD) and reduced order method (ROM) are developed for predicting the velocity time series during the initial stage of projectile launching. …”
Get full text
Article -
2743
Fatigue Life Prediction of Half-Shaft Using the Strain-Life Method
Published 2020-01-01“…The results show that the prediction method is reliable and meets the service life and safety requirements.…”
Get full text
Article -
2744
Model Reduction Methods for Rotor Dynamic Analysis: A Survey and Review
Published 2010-01-01“…The focus of this literature survey and review is model reduction methods and their application to rotor dynamic systems. …”
Get full text
Article -
2745
Two-level feature selection method based on SVM for intrusion detection
Published 2015-04-01“…To select optimized features for intrusion detection,a two-level feature selection method based on support vector machine was proposed.This method set an evaluation index named feature evaluation value for feature selection,which was the ratio of the detection rate and false alarm rate.Firstly,this method filtrated noise and irrelevant features to reduce the feature dimension respectively by Fisher score and information gain in the filtration mode.Then,a crossing feature subset was obtained based on the above two filtered feature sets.And combining support vector machine,the sequential backward selection algorithm in the wrapper mode was used to select the optimal feature subset from the crossing feature subset.The simulation test results show that,the better classification performance is obtained according to the selected optimal feature subset,and the modeling time and testing time of the system are reduced effectively.…”
Get full text
Article -
2746
Improved method of step length estimation based on inverted pendulum model
Published 2017-04-01Get full text
Article -
2747
Pol-CCES based modulation recognition method under impulsive noise
Published 2021-12-01Get full text
Article -
2748
Method of privacy protection based on multiple edge servers in personalized search
Published 2019-02-01“…In the plaintext environment,users' personalized search results can be obtained through users' interest model and query keywords.However,it may possibly result in the disclosure of sensitive data and privacy,which prevents using sensitive data in cloud search.Therefore,data is generally stored in the form of ciphertext in the cloud server.In the process of cloud search service,users intend to quickly obtain the desired search results from the vast amount of ciphertext.In order to solve the problem,it was proposed that a method of privacy protection based on multiple edge servers in personalized search shall be used.By introducing multiple edge servers and cutting the index as well as the query matrix,the computing relevance scores of partial query and partial file index are achieved on the edge server.The cloud server only needs to get the relevance score on the edge server and make a simple processing that can return to the most relevant Top K files by user query,so as to make it particularly suitable for a large number of users in the massive personalized ciphertext search.Security analysis and experimental results show that this method can effectively protect users’ privacy and data confidentiality.In addition,it can guarantee high efficiency in search to provide better personalized search experience.…”
Get full text
Article -
2749
A Dictionary Learning Method with Total Generalized Variation for MRI Reconstruction
Published 2016-01-01“…In the proposed method, the TGV selectively regularizes different image regions at different levels to avoid oil painting artifacts largely. …”
Get full text
Article -
2750
A Novel Optimization Method for Nonconvex Quadratically Constrained Quadratic Programs
Published 2014-01-01“…This paper presents a novel optimization method for effectively solving nonconvex quadratically constrained quadratic programs (NQCQP) problem. …”
Get full text
Article -
2751
CALCULATION METHOD IMPROVEMENT FOR CONTACT FATIGUE RELIABILITY OF CYLINDRICAL HELICAL GEAR
Published 2018-01-01“…The result shows that the improved method is more comprehensive consideration than general methods. …”
Get full text
Article -
2752
AN ASSESSMENT OF THE DISPLACEMENT OF A CAM FOLLOWER USING REGULA FALSI METHOD
Published 2021-06-01“…The principal aim of this work was to study and analyse the displacement of a cam-follower with Regula Falsi method and verify its input by using MATLAB and FORTRAN simulations. …”
Get full text
Article -
2753
An in‐depth study of the effects of methods on the dataset selection of public development projects
Published 2022-04-01“…However, it is hard for researchers to effectively select PDPs and DPDPs due to the lack of specific project selection methods for these two types of projects. To address this problem, a standard dataset was labelled and the base line methods (i.e. selecting projects according to a single feature like star number) under 60 configurations and the machine learning methods under 18 configurations were tested to identify the best configurations in precision and F‐measure for selecting PDPs and DPDPs. …”
Get full text
Article -
2754
Research on multiple enhanced k combination reverse Skyline query method
Published 2025-01-01“…Furthermore, to handle multiple combinations with different cardinalities, we develop the Multiple Enhanced k combination reverse Skyline query method (MkECRSQ). MkECRSQ includes three main phases. …”
Get full text
Article -
2755
Evaluation of operational parameters for clinical evaluation of skin hydration by corneometry method
Published 2025-01-01Subjects: Get full text
Article -
2756
A Design Method of Saturation Test Image Based on CIEDE2000
Published 2012-01-01“…In order to generate color test image consistent with human perception in aspect of saturation, lightness, and hue of image, we propose a saturation test image design method based on CIEDE2000 color difference formula. …”
Get full text
Article -
2757
Automated vulnerability discovery method for 5G core network protocol
Published 2024-02-01“…With the widespread development of fifth-generation (5G) mobile communication technology, concerns regarding 5G network security have also increased.Blackbox fuzzing is a commonly used method for automated vulnerability discovery in software security.However, applying dynamic approaches like fuzzing to discover vulnerabilities in the complex design of 5G core network protocols poses challenges such as low efficiency, poor versatility, and lack of scalability.Therefore, a novel static method to examine the open-source solution of the 5G core network was proposed.Through this method, a series of memory leak security issues caused by improper variable life cycle management were identified, which can lead to denial-of-service attacks on the 5G core network.To summarize these weaknesses, a general vulnerability model and an automated vulnerability discovery method called HoI were presented, which utilized hybrid analysis based on control and data flow.By successfully discovering five zero-day bugs in Open5GS, an open-source solution for the 5G core network, vulnerabilities that cover practical application scenarios of multiple interface protocols in the 5G core network were identified.These vulnerabilities have wide-ranging impact, are highly detrimental, and can be easily exploited.They have been reported to the vendor and assigned four Common Vulnerabilities and Exposures (CVE) numbers, demonstrating the effectiveness of this automated vulnerability discovery method.…”
Get full text
Article -
2758
Analytical and Numerical Methods for Circumbinary Disk Dynamics. II. Inclined Disks
Published 2025-01-01Subjects: Get full text
Article -
2759
Pade Method for Construction of Numerical Algorithms for Fractional Initial Value Problem
Published 2020-01-01“…In this paper, we propose an efficient method for constructing numerical algorithms for solving the fractional initial value problem by using the Pade approximation of fractional derivative operators. …”
Get full text
Article -
2760
Apprentissage organisationnel. Théorie, méthode, pratique de Argyris et Schön
Published 2002-05-01Get full text
Article