Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
281
Implementing Inquiry-Based Teaching Methods
Published 2009-01-01“…AEC395/WC076: Implementing Inquiry-Based Teaching Methods (ufl.edu) …”
Get full text
Article -
282
School teenager knowledge on contraceptive methods
Published 2015-01-01“…The study aimed evaluation of the knowledge on contraceptive methods and their utilization among adolescents of the secondary grade of public schools in Cuiaba-MT. …”
Get full text
Article -
283
Concept, subject and method of legal psychology
Published 2023-07-01Subjects: Get full text
Article -
284
-
285
Secure controlling method for scalable botnets
Published 2023-02-01“…., internet of things (IoT) devices.Future botnets will become more cross-platform and stealthy, which introduces severe security risks to cyberspace.Therefore, in-depth research on botnets can offer study targets to corresponding defensive studies, which is very meaningful for designing an architecture to secure the next-generation cyberspace.Hence, an HTTP-based scalable botnet framework was proposed to address the problems of compatibility, stealthiness and security.Specifically, the framework adopted a centralized controlling model.Moreover, it used the HTTP protocol as the designed botnet’s communication protocol and block encryption mechanisms based on symmetric cryptography to protect the botnet’s communication contents.Furthermore, a secure control mechanism for multi-platform botnets was designed.In particular, the proposed mechanism utilized source-level code integration and cross-compilation techniques to solve the compatibility challenge.It also introduced encrypted communication with dynamic secret keys to overcome the drawbacks of network traffic regularity and ease of analysis in traditional botnets.Moreover, it designed server migration and reconnection mechanisms to address the weakness of single-point-failure in centralized botnet models.Simulation results in three experimental scenarios with different levels of botnet controllability show that there is a linear relationship between the size of a botnet and the service overhead of the related C&C servers.In addition, under the condition of the same botnet scale, a higher level of controllability introduces a higher throughput and a greater system overhead.The above results demonstrate the effectiveness and the practical feasibility of the proposed method.…”
Get full text
Article -
286
Lie Group Method of the Diffusion Equations
Published 2014-01-01“…The ordinary differential equations are solved by Lie group method and the explicit Runge-Kutta method. Numerical results showed that Lie group method is more stable than the corresponding explicit Runge-Kutta method.…”
Get full text
Article -
287
Multifractal Framework Based on Blanket Method
Published 2014-01-01“…The first two measures (proposed Methods 1 and 3) support model of image with embedded dimension three, while the other supports model of image embedded in space of dimension three (proposed Method 2). …”
Get full text
Article -
288
Hybrid Method for Point Cloud Classification
Published 2025-01-01“…In this study, we introduce a novel hybrid ResPOL method that integrates a bidirectional architecture with a newly developed Patch-Offset Lambda (POL) mechanism for feature extraction from point cloud data. …”
Get full text
Article -
289
Mergeable adaptive tile coding method
Published 2015-02-01“…In order to solve many unnecessary division,mergence supported adaptive tile coding algorithm was presented which would eliminate the unnecessary division.Simulation is conducted on mountain car problem with discrete actions and continuous state space Results show that the proposed method can eliminate the influence of false division in the traditional tile coding method and achieve a more accurate adaptive partition of continuous state space.A higher convergence rate is achieved at the same time.…”
Get full text
Article -
290
Conjugate propagator method for direction finding
Published 2008-01-01Subjects: Get full text
Article -
291
-
292
-
293
Application of the Time Step Optimization Method in Seismic Liquefaction Analysis and Its Evaluation Method for Computational Efficiency Improvement
Published 2020-01-01“…The results show that the time step optimization method can effectively solve the time step setting problem. …”
Get full text
Article -
294
Multivariable Flood Frequency Analysis of the Yujiang River Based on Annual Maximum Method and Peaks Over Threshold Method
Published 2024-01-01Subjects: Get full text
Article -
295
Р. DESCARTES: PRINCIPLES OF RATIONALISTIC METHOD AND MORALITY (TO THE QUESTION ON THE METHODS OF SCIENTIFIC RESEARCH IN THE FIELD OF PHILOSOPHY AND SOCIAL WORK)
Published 2024-12-01Subjects: “…rationalism, common sense, method, obviousness, truth, clearly and distinctly, critical thinking, morality, maxim, psychoanalysis, social unconscious, socially conditioned filter, novice scientist…”
Get full text
Article -
296
Gender-Specific Biases in Age Estimation Methods: A Comparative Analysis of Chaillet and Morris Methods in Forensic Anthropology
Published 2024-12-01Subjects: Get full text
Article -
297
Application of Improved Fisher Optimal Segmentation Method Based on Combined Weight Method in Reservoir Flood Season Staging
Published 2024-01-01Subjects: Get full text
Article -
298
Analyzing the indicators of choosing the appropriate teaching method for Education the principles of accounting (1) using the Meta-synthesis method
Published 2024-05-01Subjects: Get full text
Article -
299
Kinetic Analysis of the Thermal Decomposition of Polymer-Bonded Explosive Based on PETN: Model-Fitting Method and Isoconversional Method
Published 2020-01-01“…It was found that kinetic parameters obtained by the modified Kissinger–Akahira–Sunose method (using non-isothermal TG/DTG data) were close to those obtained by the isoconversional and model-fitting methods that use isothermal VST data. …”
Get full text
Article -
300
A method to evaluate the performance of institutions based on data envelopment analysis method with qualitative data and emphasis on OCB
Published 2024-08-01“…To validate the method, the results of the proposed method were compared with the ranking results of the hierarchical process method.…”
Get full text
Article