Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
381
NEW METHOD OF PRODUCTION OF ALUNINUM SILICON ALLOYS
Published 2015-11-01“…Practical ways to implement the new method were proposed on the example of industrial alloys prepared on charge synthetic alloy. …”
Get full text
Article -
382
-
383
Survey of the teaching methods of human computer interaction
Published 2004-12-01“… The paper surveys teaching methods of both sciences and engineering that are implemented in the Human Computer Interaction courses. …”
Get full text
Article -
384
METHODS AND TECHNIQUES OF SOCIAL REHABILITATION OF COMBAT VETERANS
Published 2015-04-01Subjects: Get full text
Article -
385
Monitoring of Technical Condition of Buildings by Seismic Method
Published 2024-12-01Subjects: Get full text
Article -
386
Analysis of Drag Reduction Methods and Mechanisms of Turbulent
Published 2017-01-01“…Then, the relevant drag reduction technologies and mechanisms are discussed, focusing on the microbubbles, the vibrant flexible wall, the coating, the polymer drag reduction additives, superhydrophobic surface, jet surface, traveling wave surface drag reduction, and the composite drag reduction methods. Finally, applications and advancements of the drag reduction technology in turbulence are prospected.…”
Get full text
Article -
387
The Viro Method for Construction of Piecewise Algebraic Hypersurfaces
Published 2013-01-01“…The method is based on the smooth blending theory and the Viro method for construction of Bernstein-Bézier algebraic hypersurface piece on a simplex.…”
Get full text
Article -
388
METHODS OF RESEARCH OF ELECTRO-PHYSICAL CHARACTERISTICS OFAGGLUTINANTSANDS
Published 2004-11-01“…In the article the authors offer original methods of experimental investigation of electrophysical characteristics °f different agglutinant sands, used in foundry. …”
Get full text
Article -
389
Visual explanation method for reversible neural networks
Published 2023-12-01“…The issue of model explainability has gained significant attention in understanding the vulnerabilities and anonymous decision-making processes inherent in deep neural networks (DNN).While there has been considerable research on explainability for traditional DNN, there is a lack of exploration on the operation mechanism and explainability of reversible neural networks (RevNN).Additionally, the existing explanation methods for traditional DNN are not suitable for RevNN and suffer from issues such as excessive noise and gradient saturation.To address these limitations, a visual explanation method called visual explanation method for reversible neural network (VERN) was proposed for RevNN.VERN leverages the reversible property of RevNN and is based on the class-activation mapping mechanism.The correspondence between the feature map and the input image was explored by VERN, allowing for the mapping of classification weights of regional feature maps to the corresponding regions of the input image.The importance of each region for model decision-making was revealed through this process, which generates a basis for model decision-making.Experimental comparisons with other explanation methods on generalized datasets demonstrate that VERN achieves a more focused visual effect, surpassing suboptimal methods with up to 7.80% improvement in average drop (AD) metrics and up to 6.05% improvement in average increase (AI) metrics in recognition tasks.VERN also exhibits an 82.00% level of localization for the maximum point of the heat value.Furthermore, VERN can be applied to explain traditional DNN and exhibits good scalability, improving the performance of other methods in explaining RevNN.Furthermore, through adversarial attack analysis experiments, it is observed that adversarial attacks alter the decision basis of the model.This is reflected in the misalignment of the model’s attention regions, thereby aiding in the exploration of the operation mechanism of adversarial attacks.…”
Get full text
Article -
390
Choice and justification of the method of titanium welding with platinum
Published 2024-06-01“…Micro-X-ray spectral analysis was carried out on a Cameca device using the scanning method and determining the composition by elements with a distance between points of 2 μm in the direction perpendicular to the welding surface. …”
Get full text
Article -
391
Fostering responsible innovation with critical design methods
Published 2024-12-01“…We present two examples of pedagogical interventions dedicated to injecting critical design methods into the education of future tech developers to help foster responsible innovation: 1) a cross-disciplinary curricular intervention with English and Systems Design Engineering students; 2) a series of Responsible Innovation workshops conducted with students. …”
Get full text
Article -
392
-
393
Factorization Method in Oscillator with the Aharonov-Casher System
Published 2014-01-01“…We review the oscillator with Aharonov-Casher system and study some mathematical foundation about factorization method. The factorization method helps us to obtain the energy spectrum and general wave function for the corresponding system in some spin condition. …”
Get full text
Article -
394
Effects of Harvest Method on Microclimate in Florida Sugarcane
Published 2015-06-01“…SS-AGR-385/SC100: Effects of Harvest Method on Microclimate in Florida Sugarcane (ufl.edu) …”
Get full text
Article -
395
Method for Calculating Transients in a Gas Pipeline
Published 2021-10-01Subjects: Get full text
Article -
396
Privacy-preserving trajectory similarity computation method
Published 2022-11-01“…To tackle privacy concerns on user information leakage in trajectory outsourcing services, a privacy-preserving trajectory similarity computation (pTSC) method was proposed.A trajectory outsourcing service provider was enabled to store encrypted trajectories from owners, wait for encrypted interested trajectories from requesters, and compute trajectory similarity between an interested trajectory and stored trajectories in ciphertext domain without learning anything about users’ trajectories.To compute a trajectory similarity over encrypted trajectories efficiently, a secure trajectory similarity computation protocol with longest common subsequence was proposed, which used somewhat homomorphic encryption and secure comparison protocol to compute the length of longest common subsequence over two encrypted trajectories.Furthermore, a ciphertext compression algorithm was designed to improve efficiency.Theoretical analysis and experimental evaluations show that pTSC method is secure and efficient.…”
Get full text
Article -
397
METHODICAL APPROACHES TO THE FORMATION OF ADAPTIVE MANAGEMENT STRUCTURES
Published 2019-10-01Get full text
Article -
398
Method of unknown protocol classification based on autoencoder
Published 2020-06-01“…Aiming at the problem that a large number of unknown protocols exist in the Internet,which makes it very difficult to manage and maintain the network security,a classification and identification method of unknown protocols was proposed.Combined with the autoencoder technology and the improved K-means clustering technology,the unknown protocol was classified and identified for the network traffic.The autoencoder was used to reduce dimensionality and select features of network traffic,clustering technology was used to classify the dimensionality reduction data unsupervised,and finally unsupervised recognition and classification of network traffic were realized.Experimental results show that the classification effect is better than the traditional K-means,DBSCAN,GMM algorithm,and has higher efficiency.…”
Get full text
Article -
399
Advances in Quantitative Analytical Methods for Solid Drugs
Published 2024-12-01“…In this paper, the quantitative analysis methods of polymorphs and pharmaceutical cocrystals are reviewed, the advantages and disadvantages of various methods are analyzed mainly from three types of techniques, namely, X-ray diffraction, spectroscopy, and thermal analysis, and the specific applications of various methods are commented on through examples. …”
Get full text
Article -
400
Sampling method for IDS in high bandwidth network
Published 2009-01-01“…A novel sampling method,IDSampling,was developed to solve the performance unbalance problem that IDS could not scale well in G+bit/s link,which was adaptive with the consumption of the memory bottleneck.With the help of the heuristic messages,such as the entropy of the single-packet flow and the flow length,IDSampling applied the simple sampling strategy based on the entropy of the single-packet flow when the large-scale anomaly occurred,or another complicated one instructed by the feedback of the rear detection results by default.In both cases IDSampling tried to guaran-tee the equal security with detection cost as low as it could.The results of experiment show that ①IDSampling keeps IDS effective by cutting off its load significantly when it is overloaded,at the same time it can guarantee the detection accuracy of the large-scale attack;②Comparing with the other two overwhelming sampling methods,the random packet sampling and the random flow sampling,the number of attack packets sampled by IDSampling is higher than that of the former two,the number outweighs the former two one order of magnitude especially in the large-scale anomaly case.…”
Get full text
Article