Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
521
Research on methods of workers’ context description in mines
Published 2019-12-01“…The worker’s unsafe behavior is the key cause of mine accidents.The human activity is closely related with the context.Ontology is widely used in computer science in the field of information exchange and knowledge sharing,which contains complex structures and various semantics.Firstly,the research on the description of the miners’ situational information in the mining field was summarized.It introduced the general situation in the field of the Internet of things.The importance and necessity of the description of the state information of mine personnel was presented.It introduced the research background,including semantic web,context description and knowledge representation.After that,the method of information description of mine personnel was described.The ontology model was proposed based on oneM2M international technical specifications.In order to construct this ontology,it was drawed on some of the core concepts of oneM2M Base Ontology.The concept classes,attributes and relationships that are specific to the information description of mine personnel were put forward.The context description of mine personnel proposed was aimed at achieving the purposes of specification information description,data semantic labeling,knowledge sharing and reuse.Finally,the conclusions were drawn and the prospect of using the ontology method for context perception and the miners’ unsafe behavior recognition was presented.…”
Get full text
Article -
522
-
523
Pedagogical Innovative Methods and Classroom Management in Nigeria
Published 2022-10-01Subjects: Get full text
Article -
524
New Method of Solving the Economic Complex Systems
Published 2020-01-01“…In this study, the authors first develop a direct method used to solve the linear nonhomogeneous time-invariant difference equation with the same number for inputs and outputs. …”
Get full text
Article -
525
Network traffic classification method basing on CNN
Published 2018-01-01“…Since the feature selection process will directly affect the accuracy of the traffic classification based on the traditional machine learning method,a traffic classification algorithm based on convolution neural network was tailored.First,the min-max normalization method was utilized to process the traffic data and map them into gray images,which would be used as the input data of convolution neural network to realize the independent feature learning.Then,an improved structure of the classical convolution neural network was proposed,and the parameters of the feature map and the full connection layer were designed to select the optimal classification model to realize the traffic classification.The tailored method can improve the classification accuracy without the complex operation of the network traffic.A series of simulation test results with the public data sets and real data sets show that compared with the traditional classification methods,the tailored convolution neural network traffic classification method can improve the accuracy and reduce the time of classification.…”
Get full text
Article -
526
Superconvergence of finite element method for parabolic problem
Published 2000-01-01Get full text
Article -
527
RAP detection method based on AP fingerprint
Published 2018-05-01“…The access point (AP) is an integral part of the infrastructure mode in wireless network.While the attacks caused by rogue AP (RAP) divulge a lot of users' privates in a large extent,such as the user's location information,surfing behavior on the Internet and social relations.A RAP detection algorithm based on AP fingerprint was proposed.The validity of AP was judged by the unforgeability and stability of the parameters of beacon frames.And the feasibility and effectiveness of the proposed method were further verified by scheme comparisons and experimental analysis.…”
Get full text
Article -
528
Review of Methods for Detection Helicobacter pylori in Kazakhstan
Published 2025-01-01Subjects: Get full text
Article -
529
CURRENT TRENDS ON MATERIALS AND METHODS FOR TEETH WHITENING
Published 2024-12-01“…The purpose of teeth whitening is the removal of intrinsic or extrinsic discoloration via mechanical or chemical techniques that restore the teeth to their natural shade or lighten it, depending on the chosen method. Both the abrasive particles used in mechanical procedures and the oxidant agents applied in chemical bleaching are effective if they are used according to the stain aetiology, however, the risks associated with these products (e.g. potential tooth wear, sensitivity, damage of the enamel or dentin organic matrix) are not negligible. …”
Get full text
Article -
530
Plant Sources, Extraction Methods, and Uses of Squalene
Published 2018-01-01“…The aim of this review is to provide an overview of SQ to establish research focus with special reference to plant sources, extraction methods, and uses.…”
Get full text
Article -
531
Using "peer review" method for language assessment
Published 2019-09-01Subjects: “…"peer review" method…”
Get full text
Article -
532
Methods to Test the Compressive Strength of Earth Blocks
Published 2021-01-01“…However, there is still much debate on the best method to accurately measure the compressive strength of earth blocks. …”
Get full text
Article -
533
The “Hand-as-Foot” teaching method in chronic dacryocystitis
Published 2025-02-01Get full text
Article -
534
Tauberian conditions for a general limitable method
Published 2006-01-01“…Let (un) be a sequence of real numbers, L an additive limitable method with some property, and and different spaces of sequences related to each other. …”
Get full text
Article -
535
Fundamentals and Methods for T- and B-Cell Epitope Prediction
Published 2017-01-01“…Subsequently, we provide a systematic and inclusive review of the most relevant B- and T-cell epitope prediction methods and tools, paying particular attention to their foundations.…”
Get full text
Article -
536
Construction method of double unicast network coding
Published 2020-09-01“…In order to use network coding technology for data transmission in double unicast network,a construction method of double unicast network coding was proposed.The pre-coding strategy was implemented at each source node,the random linear network coding combined to the multi-objective optimization evolutionary algorithm was adopted to design the local coding vector of each channel.At the each sink node,the base vector of zero space of matrix was used to eliminate some information interference,and then the two-level pre-coding strategy was used to control the transmission rate at source.Thus,each sink node could be decoded successfully.With the proposed method,the approximate reachable information rate region of double unicast network coding could be determined and the transmission scheme for each vector in the reachable information rate region could be designed.Theoretical derivation and simulation calculation show the effectiveness of the proposed method.…”
Get full text
Article -
537
IoT intrusion detection method for unbalanced samples
Published 2023-02-01“…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
Get full text
Article -
538
Service substitution method based on composition context
Published 2014-09-01“…With the variety of requirements from service requesters and the increasing complexity of network environ-ments,service composition has become more and more complicated.In order to decrease redundant information of the substituted service and improve the accuracy of service substitution,the composition context was regarded as the match-ing criteria and tried to substitute failed service with the following two steps.First,a composition context information collecting algorithm (CCICA) was proposed based on the color petri net model of the service workflow,and regarded the composition context as the collecting source of service information.Second,a levenshtein distance-based service substi-tution method (LDBSSM) was given,which was integrated with dependencies between service interfaces.Simulation re-sults show that the proposed LDBSSM method is practical because it can not only reduce redundancy of substituted ser-vice information but also effectively improve the accuracy of service substitution.…”
Get full text
Article -
539
The Model of Disengagement of Talent with Meta-synthesis Method
Published 2024-11-01“…Consequently, the current research was undertaken with the aim of identifying and modeling the antecedents and consequences of talent disengagement in organizations. Methods This study is a qualitative research project utilizing the meta-synthesis method. …”
Get full text
Article -
540
A New Method of Kronecker Product Decomposition
Published 2023-01-01“…Theoretical results ensure that the new method is convergent and stable. The simulation results show that the new method is far faster than the known method. …”
Get full text
Article