Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
561
Enhanced method based on virtual registers rotation
Published 2018-05-01“…Sematic attacks based on the data flow analysis bring big challenges to the code obfuscation.Concerning the data flow of virtual machine based (VM-based) code protection,the method transfers the mapping relation between the virtual registers and the op-code of the bytecode during executing,which means the uncertainty and complexity of the data flow during interpretive execution of the bytecode.In addition,three policies are proposed to address the problem that how to choose the length of rotation for each bytecode,which grows complexity of the protection.Finally,a prototype of VRR-VM (virtual machine protection system based on virtual registers rotation) was implemented.Experiment results show that the method is effective and applicable for anti-reversing.…”
Get full text
Article -
562
Comparison of Mechanical Impedance Methods for Vibration Simulation
Published 1996-01-01“…The ways in which these effects can be considered were evaluated, and comparison of three impedance methods was accomplished based on a cumulative damage criterion. …”
Get full text
Article -
563
Identification of aquifer heterogeneity through inverse methods
Published 2022-10-01Subjects: Get full text
Article -
564
Application of identification method for control of bearing wear
Published 2022-06-01“…The work is devoted to the problem of bearings wear control of during their operation. Well-known methods for control the state of bearings to solve this problem are described. …”
Get full text
Article -
565
-
566
DAMAGE IDENTIFICATION METHOD BASED KRIGING MODEL
Published 2020-01-01“…To improve damage identification efficiency,a damage identification method based on Kriging model was proposed. Sample points were chosen based on Latin hypercube sampling,and Kriging model was built using acceleration frequency response functions corresponding to the damage parameters;then,Kriging model with good precision was used to replace the finite element model to participate in the optimization process. …”
Get full text
Article -
567
SOME ITERATIVE METHODS FOR QUASI-EQUILIBRIUM PROBLEMS
Published 2012-09-01Subjects: Get full text
Article -
568
Different Methods of Secondary Intraocular Lens Implantation
Published 2023-01-01Get full text
Article -
569
To the question of the methodic of universities’ scientific potential appreciation
Published 2019-09-01“…The main purpose of the study is to develop, substantiate and test methods for assessing the scientific potential of universities. …”
Get full text
Article -
570
Noise Radar Technology as an Interference Prevention Method
Published 2013-01-01Get full text
Article -
571
RASP based Web security detection method
Published 2020-11-01“…At present,the traditional Web security detection methods act on the input and output of the program,which can not prevent malicious code entering the program after being distorted and confused,and it is difficult to meet the new requirements of Web application security protection.Based on the in-depth analysis of the risk of traditional data flow monitoring methods,combined with the technical characteristics of rasp,a Web security detection method based on rasp was proposed.The rasp probe was embedded in the parameters of authority discrimination function,system command execution function and database operation function in Web application,and the change of data flow was detected in real-time at the code interpreter level.This method was implemented based on Java language.It was proved in the laboratory that this method is better than the traditional Web security detection method in accuracy and detection time.Finally,the deployment and application scenarios of this method were analyzed and proposed.…”
Get full text
Article -
572
The dual integral equation method in hydromechanical systems
Published 2004-01-01“…Some hydromechanical systems are investigated by applying the dual integral equation method. In developing this method we suggest from elementary appropriate solutions of Laplace's equation, in the domain under consideration, the introduction of a potential function which provides useful combinations in cylindrical and spherical coordinates systems. …”
Get full text
Article -
573
RESEARCH ON VIBRATION CONTROL METHOD OF TRAIN PANTOGRAPH
Published 2019-01-01“…In this paper, the vibration control method of train pantograph is studied. A dynamic equation based on Newton’s second law is established for the two element pantograph model. …”
Get full text
Article -
574
-
575
Novel UWB communication pulse design method
Published 2006-01-01“…The iterative combination pulse method and the linear minimum mean square error (LMMSE) combination pulse method were pre- sented. …”
Get full text
Article -
576
Method of obtaining and storing hyperimmune anthrax serum
Published 2023-09-01“…Based on the findings the method of rabbit immunization was selected. The optimal method included intravenous injection of the antigen in increasing amounts according to the following scheme: injection I – 0.5 cm3 ; injection II – 1 cm3 ; injection III – 2 cm3 at a dose of 100 million mc/animal in 1 cm3 , with 4-day interval between injections. …”
Get full text
Article -
577
Text similarity detection method based on NLP
Published 2021-10-01“…Current text similarity detection methods that ignore document structure information and lack semantic relevance.To solve these problems, a text-oriented similarity detection method was proposed.First, analytic hierarchy process (AHP) was used to calculate word position weight to extract feature words.Second, the Pearson correlation coefficient was used to measure semantic correlation between words which was the weight of generalized Dice coefficient to calculate similarity.Experimental results show that the proposed method can improve the precision of feature word extraction and the accuracy of similarity calculation results.…”
Get full text
Article -
578
Usage of the interval method for solving some inequalities
Published 1998-12-01“…This method makes it easier to solve inequality. This method is widely used. …”
Get full text
Article -
579
A New Construction Method for Rectangular Cartograms
Published 2025-01-01“…The rectangular cartogram is a geospatial visualization method that blends the characteristics of maps and charts. …”
Get full text
Article -
580