Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
821
Editorial: Methods in cognitive neuroscience: dance movement 2023
Published 2025-01-01Subjects: Get full text
Article -
822
Intelligent terminal device identification method of internet of things
Published 2017-02-01“…The correct identification of the terminal of the internet of things is an important prerequisite to establish a secure connection of the internet of things.The identification of the intelligent terminal is particularly important.The device identification method of intelligent terminals in internet of things under the existing technology was investigated.From the perspective of the security of the internet of things,the security problem that the device identification method was too simple to be easily falsified of the existing scheme was analyzed.Combining the achievements of project research in the field of internet of things and the experience of the industry,the identification method of multidimensional device feature information of IoT intelligent terminals was proposed.…”
Get full text
Article -
823
A Variational Method for Multivalued Boundary Value Problems
Published 2020-01-01“…In this purpose, we use a variational method which relies on Szulkin’s critical point theory. …”
Get full text
Article -
824
Efficient Method to Approximately Solve Retrial Systems with Impatience
Published 2012-01-01“…This technique, known as value extrapolation, truncates the infinite state space using a polynomial extrapolation method to approach the states outside the truncated state space. …”
Get full text
Article -
825
Animal models of hemorrhage, parameters, and development of hemostatic methods
Published 2025-02-01Get full text
Article -
826
Research of Comprehensive Parameter Measure Method of RV Reducer
Published 2018-01-01Subjects: Get full text
Article -
827
Strong Convergence of Viscosity Iteration Methods for Nonexpansive Mappings
Published 2009-01-01Get full text
Article -
828
A dynamic method for rolling transport network planning
Published 2017-09-01Subjects: Get full text
Article -
829
Electrochemical Method for the Assay of Organic Peroxides Directly in Acetonitrile
Published 2025-01-01“…Herein, we propose an alternative electrochemical method to the classical iodometric titration method most widely used for determining the PV. …”
Get full text
Article -
830
Formal modeling and analyzing method for database security policy
Published 2015-09-01“…Because of the high-level abstraction,insufficient description of database states and constraints,it was difficult to find the tiny flaws in design and implementation.Based on PVS,a method for formal description and analysis of data-base security policy was proposed,which was more close to the actual database,more widely used in reality,and more complete in describing the safe properties,more extendible of the model,and ensure the efficiency of modeling and veri-fication.Finally,this method is applied in the security policy modeling and analyzing of BeyonDB,which is a commer-cial database,find some security risks in the system design,and thereby verify its effectiveness.…”
Get full text
Article -
831
Block Preconditioned SSOR Methods for -Matrices Linear Systems
Published 2013-01-01“…We present a block preconditioner and consider block preconditioned SSOR iterative methods for solving linear system . When is an -matrix, the convergence and some comparison results of the spectral radius for our methods are given. …”
Get full text
Article -
832
Review of Particle Breakage Measurement Methods for Calcareous Sand
Published 2022-01-01“…The characteristic particle size measurement method for particle breakage is simple and has limitations. …”
Get full text
Article -
833
Dimension Estimation Using Weighted Correlation Dimension Method
Published 2015-01-01“…Among all the dimension estimation methods, correlation dimension (CD) method is one of the most popular ones, which always assumes that the effect of every point on the intrinsic dimension estimation is identical. …”
Get full text
Article -
834
-
835
Measures and optimization methods of communications network energy efficiency
Published 2019-11-01“…Although network played an important role in energy efficiency improvement for many industries,network energy consumption had threatened the sustainable development of network operators,due to the fast increasing of the networks’ energy consumption recent years as the swift development of internet users,internet services and applications.The energy consumption risk faced by network operators,the research development of the measures and optimization methods of network energy efficiency was introduced.The energy efficiency optimization in the future network was finally concluded.…”
Get full text
Article -
836
Method of connection establishment between CPE and the cloud platform
Published 2016-12-01“…The main idea of vCPE is to split the CPE into two parts and to make the L3 functions up to the network. Through this method, CPE can be simplified and the difficulty for subscribers to operate and maintain CPE can be reduced. …”
Get full text
Article -
837
Deception defense method against intelligent penetration attack
Published 2022-10-01“…The intelligent penetration attack based on reinforcement learning aims to model the penetration process as a Markov decision process, and train the attacker to optimize the penetration path in a trial-and-error manner, so as to achieve strong attack performance.In order to prevent intelligent penetration attacks from being maliciously exploited, a deception defense method for intelligent penetration attack based on reinforcement learning was proposed.Firstly, obtaining the necessary information for the attacker to construct the penetration model, which included state, action and reward.Secondly, conducting deception defense against the attacker through inverting the state dimension, disrupting the action generation, and flipping the reward value sign, respectively, which corresponded to the early, middle and final stages of the penetration attack.At last, the three-stage defense comparison experiments were carried out in the same network environment.The results show that the proposed method can effectively reduce the success rate of intelligent penetration attacks based on reinforcement learning.Besides, the deception method that disrupts the action generation of the attacker can reduce the penetration attack success rate to 0 when the interference ratio is 20%.…”
Get full text
Article -
838
Decomposition Methods for Solving Finite-Horizon Large MDPs
Published 2022-01-01Get full text
Article -
839
ANALYSIS AND TEST METHODS OF SUSPENSION STRUCTURE OF AIRBORNER MISSILE
Published 2019-01-01“…First, the inertia release method is used. This method can accurately simulate the boundary conditions of the hang up flight but the ground static test can’t be carried out accordingly. …”
Get full text
Article -
840