Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
881
Escape method of malicious traffic based on backdoor attack
Published 2024-04-01“…Launching backdoor attacks against deep learning (DL)-based network traffic classifiers, and a method of malicious traffic escape was proposed based on the backdoor attack. …”
Get full text
Article -
882
Modal Analysis and Optimization Method of Flexspline of Harmonic Reducer
Published 2021-12-01Subjects: Get full text
Article -
883
Numerical method for a Schrödinger problem with amplification process
Published 1999-12-01Get full text
Article -
884
Continuous Finite Element Methods of Molecular Dynamics Simulations
Published 2015-01-01“…So finite element method is also a reliable method to simulate long-time classical trajectory of molecular systems.…”
Get full text
Article -
885
A METHOD OF CREATING DISTRIBUTED ENGINEERING KNOWLEDGE DATABASES
Published 2017-12-01“…The article reviews the principle and methods for creating the models of distributed engineering knowledge as well as software implementation of such models in the form of the Information and Logical Table Server (SILT) resulted in development of a cluster based on the WCF (Windows Communication Foundation) technology and reciprocity of the SILT elements. …”
Get full text
Article -
886
THE APPROXIMATE SOLVING METHOD OF THE CABLES NONLINEAR CONTROL SYSTEMS
Published 2017-01-01Subjects: Get full text
Article -
887
METHODS OF INCREASING THE PLASTIC PROPERTIES OF COLD-WORKED REINFORCEMENT
Published 2018-04-01Get full text
Article -
888
The Effect of Corn Ensiling Methods on Digestibility and Biogas Yield
Published 2025-01-01“…This study investigates the impact of different corn silage preparation methods, namely the traditional and Shredlage methods, on digestibility and biogas yield in anaerobic digestion and its nutritional value—the first complex study of its kind. …”
Get full text
Article -
889
Image synthesis method based on multiple text description
Published 2024-05-01Get full text
Article -
890
THEORETICAL METHODS FOR INVESTIGATING PROTEIN THERMOSTABILITY AND THEIR APPLICATIONS IN BIOLOGY
Published 2014-12-01“…But those approaches are limited in accuracy and therefore require certain improvements e.g. making them to allow for molecular charge distribution. Also promising methods are those dealing with rigid regions of proteins. …”
Get full text
Article -
891
A Graph-Based Method for IFC Data Merging
Published 2020-01-01“…The feasibility of the method is proven by a program, and the method can ignore the impacts of GUID and other factors.…”
Get full text
Article -
892
A two-level method for elephant flow identification
Published 2017-03-01“…The high accuracy and low overhead of elephant flows identification have a great meaning on solving the controller's single point of failure problem in SDN traffic management.Aiming at the problem of high overhead of the existing elephant flows identification method,a two-level method for elephant flows identification was proposed which included a suspicious elephant detection algorithm based on TCP write-queue in the first stage and areal elephant detection algorithm based on flow duration in the second stage.During the first stage,the suspicious elephant flows were identified in the end systems to reduce the amount of flows monitored by the SDN controller at the second stage.Analysis and simulation prove that, under the premise of ensuring the accuracy of elephant flow identification, the two-level method for elephant flows identification reduces about 85% overhead of identification compared with sampling identification method.…”
Get full text
Article -
893
Bearing fault diagnosis method based on SAVMD and CNN
Published 2024-06-01“…These results show that this method can be used to achieve bearing fault diagnosis in complex working environment.…”
Get full text
Article -
894
Accurate Modification Method of Gears Based on Spatial Lattice
Published 2024-03-01“…Therefore, a new gear modification method based on spatial lattice is proposed in this study. …”
Get full text
Article -
895
Method of constructing smartflow application based on Web services
Published 2009-01-01“…A new service-oriented process pattern——smartflow as well as the just-in-time construction of smartflow was proposed.Firstly,smartflow description framework(SfDF),which was the semantic description cornerstone of smartflow, was put forward.Based on the SfDF,satisfied Web services were discovered.The smartflow model was constructed by using a algorthim based on traveling salesman problem.The feasibility of the method proposed is verified in smart travel platform.…”
Get full text
Article -
896
Two Iterative Methods for Solving Linear Interval Systems
Published 2018-01-01“…Conjugate gradient is an iterative method that solves a linear system Ax=b, where A is a positive definite matrix. …”
Get full text
Article -
897
New methods of surgical treatment of rare tumours of heart
Published 2016-05-01“…New methods of surgical treatment of rare tumours of heart Among benign heart tumors, except most frequently observed myxomas (89.6 % саses), non-myxomatous benign tumours, including fibromas (0.4 % саses) may be diagnosed. …”
Get full text
Article -
898
A Review of Causal Methods for High-Dimensional Data
Published 2025-01-01Subjects: Get full text
Article -
899
SyncPoint based scoring method in IDS evaluation
Published 2008-01-01Subjects: Get full text
Article -
900
Android malware detection method based on SimHash
Published 2017-11-01“…A new similarity detection scheme based on hierarchical SimHash algorithm was proposed.The scheme extractd contents from different aspects to represent the APK file,then used the improved SimHash to respectively represent the file.The scheme analyzed the APK file by extracting the AndroidManifest.xml file in it,the sum of the Smali code from the decompilation of dex file,instructions extracted in Smali files,Java code set,and instructions extracted in Java code files.Through the study of Voted Perceptron voting algorithm,the scheme used trust weight method,by valuating a trust weight in every layer,then combined all the result with weight in every layer as a resule of scheme,the result can be more reasonable and more convincing.…”
Get full text
Article