Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
2961
Calculation method of information dissemination based on information entropy in public internet
Published 2022-04-01“…A method of how to calculate the influence of information dissemination based on the maximum entropy theory was presented, which aimed at evaluating the impacts of the information dissemination in the open internet environment.Firstly, the influential factors of the information dissemination were analyzed.Then, the factors that have high correlation with the calculation of information dissemination were selected by the principle of “Occam’s Razor”, based on Shannon's information entropy theory.Finally, the method of computing the influence of information dissemination was proposed based on the information entropy theory.The effectiveness of the proposed method was validated by the experiments of analyzing the influence of the information dissemination of academic paper citations and hot public opinion events.The experiments show that the proposed method is of great significance for investigating the influence of information dissemination and the extent of impacts on the audience as well as the trends of information evolution in the open internet environment.…”
Get full text
Article -
2962
Secrecy Rate Adaptation Method of Sensor Nodes Based on Evolutionary Game
Published 2014-11-01“…Numerical experiments show that the proposed algorithm adaptively adjusts the secrecy rate of the sensor node. Therefore, a novel method to guarantee the confidentiality of wireless sensor network data was provided.…”
Get full text
Article -
2963
Convergence Region of Newton Iterative Power Flow Method: Numerical Studies
Published 2013-01-01“…Power flow study plays a fundamental role in the process of power system operation and planning. Of the several methods in commercial power flow package, the Newton-Raphson (NR) method is the most popular one. …”
Get full text
Article -
2964
Confirmation method for the detection of malicious encrypted traffic with data privacy protection
Published 2022-02-01“…In order to solve the problem that excessive false positives in the detection of encrypted malicious traffic based on machine learning, secure two-party computation was used to compare character segments between network traffic and intrusion detection rulers without revealing the data content.Based on the comparison results, an intrusion detection feature matching algorithm was designed to accurately match keywords.A random verification strategy for users’ input was also proposed to facilitate the method.As a result, malicious users couldn’t use arbitrary data to participate in secure two-party calculations and avoid confirmation.The security and resource consumption of the method were theoretically analyzed and verified by a combination of real deployment and simulation experiments.The experimental results show that the proposed method can significantly improve the detection performance with low system resources.…”
Get full text
Article -
2965
-
2966
An Effective Dataset Preprocessing Method in Tilted Gear Defects Target Detection
Published 2024-01-01“…Gear defect detection is a crucial component in power automation systems. Methods based on deep learning have exhibited excellent performance in detecting gears. …”
Get full text
Article -
2967
Non-invasive rehabilitation in Morbus Ledderhose disease, methods, techniques, efficiency
Published 2024-12-01Get full text
Article -
2968
Retracted: Swimming Training Evaluation Method Based on Convolutional Neural Network
Published 2024-01-01Get full text
Article -
2969
Data-Driven Social Security Event Prediction: Principles, Methods, and Trends
Published 2025-01-01“…Aiming at offering a systematic review of current data-driven prediction methods used in social security, this paper delves into the progress of this research from three novel perspectives, prediction factors, technical methods, and interpretability, and then analyzes future development trends. …”
Get full text
Article -
2970
A Tensor-Based Go Decomposition Method for Hyperspectral Anomaly Detection
Published 2025-01-01“…Specifically, the TGODEC-AD method combines the typical RX-AD and R-AD with the above decomposition result of the TGODEC model and constructs different modal operator detectors. …”
Get full text
Article -
2971
RETRACTED: The method of complex biological water treatment in aquaponic recirculation systems
Published 2024-01-01Get full text
Article -
2972
RETRACTED: The choice of the magnetic abrasive action method for processing cutting plates
Published 2024-01-01Get full text
Article -
2973
A Simple HPLC-ELSD Method for Sugar Analysis in Goji Berry
Published 2016-01-01Get full text
Article -
2974
Research of the Visual Measurement Method of Gear Tooth Profile Total Deviation
Published 2017-01-01“…Aiming at the measuring difficulty of small modulus gear,a measuring method of gear tooth profile total deviation based on machine vision is proposed. …”
Get full text
Article -
2975
Cell Area-Based Method for Analyzing the Coverage Capacity of Satellite Constellations
Published 2021-01-01“…On this basis, an improved cell area-based method is proposed in this paper, in which a cell is used as the basic analytical unit. …”
Get full text
Article -
2976
Research on resource management and service mapping method for reconfigurable flexible network
Published 2012-08-01Get full text
Article -
2977
Multi-feature fusion classification method for communication specific emitter identification
Published 2021-02-01“…A multi-feature fusion classification method based on multi-channel transform projection, integrated deep learning and generative adversarial network (GAN) was proposed for communication specific emitter identification.First, three-dimensional feature images were obtained by performing various transformations, the time and frequency domain projection of the signal was constructed to construct the feature datasets.GAN was used to expand the datasets.Then, a two-stage recognition and classification method based on multi-feature fusion was designed.Deep neural networks were used to learn the three feature datasets, and the initial classification results were obtained.Finally, through fusion and re-learning of the initial classification result, the final classification result was obtained.Based on the measurement and analysis of the actual signals, the experimental results show that the method has higher accuracy than the single feature extraction method.The multipath fading channel has been used to simulate the outdoor propagation environment, and the method has certain generalization performance to adapt to the complex wireless channel environments.…”
Get full text
Article -
2978
Bandwidth Extension of High Compliance Current Mirror by Using Compensation Methods
Published 2014-01-01“…The resistive compensation and inductive peaking methods have been used to extend the bandwidth of the conventional current mirror. …”
Get full text
Article -
2979
Convergence of Variational Iteration Method for Second-Order Delay Differential Equations
Published 2013-01-01“…This paper employs the variational iteration method to obtain analytical solutions of second-order delay differential equations. …”
Get full text
Article -
2980
Surgical methods of treatment of extrasphincter and transsphincteric fistulas of the rectum (literature review)
Published 2015-09-01“…Now highly effective methods with application of various implants to eliminate tissue defect and improve regeneration are presented in the literature more and more commonly. …”
Get full text
Article