Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
3001
Calculation Method of the Interference Fit Connection Structure Fretting Slip Vector
Published 2016-01-01“…When the interference fit connection structure being applied load,its contact surface can produce small relative slip amplitude.When the relative slip amplitude is in a certain range,the fretting fatigue life would be shortened.In order to evaluate the rationality of the joint of planet carrier interference fit connection structure,the condition of interference fit fretting slip is analyzed by using Workbench.Since Workbench cannot directly get the fretting slip amplitude of certain direction or loading step,therefore a method for extracting slip vector magnitude is proposed to analyze the slip amplitude of a certain direction or loading step.The results show that,in the loading stage,the fretting slip of back-end interference contact area is in critical value range,the fretting fatigue life is shorter.The analysis results provide a reference for structural design improvement.…”
Get full text
Article -
3002
Research on attack scenario reconstruction method based on causal knowledge discovery
Published 2017-04-01“…In order to discover the attack pattern from the distributed alert data and construct the attack scene,a method of finding the attack scene from the alert data generated by intrusion detection system was studied.Current research suffer from the problem that causal knowledge is complex and difficult to understand and it is difficult to automatically acquire the problem.An attack scenario reconstruction method based on causal knowledge discovery was proposed.According to the process of KDD,the sequence set of attack scenes was constructed by the correlation degree of IP attributes among alert data.Time series modeling was adopted to eliminate the false positives to reduce the attack scene sequence.Finally,causal relationship between the alert data was found by using probability statistics.Experiments on the DARPA2000 intrusion scenario specific data sets show that the method can effectively identify the multi-step attack mode.…”
Get full text
Article -
3003
Two Optimal Eighth-Order Derivative-Free Classes of Iterative Methods
Published 2012-01-01“…Moreover, a large number of numerical tests are considered to confirm the applicability and efficiency of the produced methods from the new classes.…”
Get full text
Article -
3004
A Modified NM-PSO Method for Parameter Estimation Problems of Models
Published 2012-01-01“…The M-NM-PSO method improves the efficiency of the PSO method and the conventional NM-PSO method by rapid convergence and better objective function value. …”
Get full text
Article -
3005
A Simple Method for Generating Narrowly-dispersed Bioaerosols in Various Sizes
Published 2023-03-01Get full text
Article -
3006
A method for synthetic speech detection using local phase quantization
Published 2024-02-01“…Due to the convenience of speech synthesis, synthesized disguised speech poses a great threat to the security of speaker verification systems.In order to further enhance the ability of detecting the camouflage to the speaker verification system, a method of synthetic speech detection was put forward using the information in spectral domain of the synthetic speech spectrogram.The method employed the local phase quantization (LPQ) algorithm to describe frequency domain information in the speech spectrogram.Firstly, the spectrogram was divided into several sub-blocks, and then the LPQ was performed on each sub-block.After the histogram statistical analysis, the LPQ feature vector was obtained and used as the input feature of the random forest classifier to realize the synthetic speech detection.The experimental results demonstrate that the proposed method further reduces tandem detection cost function (t-DCF) and has better generalization ability.…”
Get full text
Article -
3007
Non-stationary signal combined analysis based fault diagnosis method
Published 2020-05-01“…Considering the complementarity between the deep learning,spectrum and time frequency analysis methods,a multi-stream framework was designed by combining the convolutional network,Fourier transform and wavelet package decomposition methods,with the aim to analyze the non-stationary signal.Accordingly,a none-stationary signal combined analysis based fault diagnosis method was proposed to extract features in difference aspects.The fault diagnosis experiments demonstrate that the combined analysis method can efficiently and stably depict the fault and significantly improve the performance of fault diagnosis.…”
Get full text
Article -
3008
Whole-cell vaccine of Streptococcus agalactiae in Oreochromis sp. with immersion method
Published 2015-05-01Get full text
Article -
3009
Performance Evaluation of Mutual Funds Using the Value-Based DEA Method
Published 2020-05-01Subjects: Get full text
Article -
3010
A quantitative prediction method utilizing whole omics data for biosensing
Published 2025-01-01“…However, omics data have not been fully utilized because current prediction methods in biomarker construction are susceptible to data multidimensionality and noise. …”
Get full text
Article -
3011
Using Clustering Methods in Multinomial Logit Model for Departure Time Choice
Published 2020-01-01“…Research results indicated that Ward’s hierarchical clustering method is improper for time discretization; furthermore, the K-means clustering method is more efficient than the expectation maximization and K-medoids methods in the time discretization for MNL modelling. …”
Get full text
Article -
3012
Defense decision-making method based on incomplete information stochastic game
Published 2018-08-01“…Most of the stochastic game models to select network defense strategies are composed of matrix game and Markov decision,which assumes that the defender has known the attacker's revenue.This assumption does not conform to the actual situation.The uncertainty of the attacker's income was converted into the indeterminacy of the attacker type,and an incomplete information stochastic game model,which was combined with the static Bias game and Markov decision,was constructed.The equilibrium solution method of the incomplete information stochastic game model was given,and the strategy selection of the defender was guided by the stable Bias Nash equilibrium.Finally,a practical example was given to demonstrate the feasibility and effectiveness of the model.…”
Get full text
Article -
3013
Experimental Study of Modified Videman Method to Replicate Knee Osteoarthritis in Rabbits
Published 2020-06-01Subjects: Get full text
Article -
3014
Smart surgical telementoring system with patch-to-pixel point tracking method
Published 2025-03-01“…In this system, a novel method named P2PTracking (Patch-to-Pixel Point Tracking) is implemented. …”
Get full text
Article -
3015
Modified boundary integral method for pressure driven MHD duct flow
Published 1989-01-01“…In this paper, we investigate the flow of a viscous, Incompressible, electrically conducting fluid through a rectangular duct in the presence of a magnetic field, when one of the boundaries perpedicular to the magnetic field is partly conducting and partly Insulating, by a modified Boundary Integral Method.…”
Get full text
Article -
3016
A Survey of Insulin-Dependent Diabetes—Part II: Control Methods
Published 2008-01-01“…Since these mechanisms are more or less related with each other, a mathematical model of the insulin-glucose system can be derived from these surrounding relations. This kind of method of the mathematical model derivation is called a fundamental method. …”
Get full text
Article -
3017
Solving Nonlinear Differential Algebraic Equations by an Implicit Lie-Group Method
Published 2013-01-01“…Four numerical examples are given to evaluate the efficiency and accuracy of the new method when comparing the computational results with the closed-form solutions.…”
Get full text
Article -
3018
On Mann’s Type Method for Nonexpansive and Strongly Quasinonexpansive Mappings in Hilbert Spaces
Published 2015-01-01“…In the setting of Hilbert spaces, we study Mann’s type method to approximate strong solutions of variational inequalities. …”
Get full text
Article -
3019
A Based Bayesian Wavelet Thresholding Method to Enhance Nuclear Imaging
Published 2009-01-01“…Since these images are modeled as the realization of a Poisson process, we propose a new framework that performs variance stabilizing of the Poisson process before applying an adapted Bayesian wavelet shrinkage. The proposed method has been applied on real images, and it has proved its performance.…”
Get full text
Article -
3020
Does Proteinuria Measured by Dipstick Method Reflect Reality in Patients with Preeclampsia?
Published 2024-06-01Get full text
Article