Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
941
Calculation Method of Gravity Center and Moment of Radial Gate
Published 2021-01-01“…The gravity moment of radial gate is an important factor affecting the opening and closing force.In this paper,the analytical formulas of gravity,gravity center and gravity moment of radial gate are derived theoretically,and the influence of two parameters of its gravity center (radius r<sub>G</sub> and inclination θ<sub>G</sub>) on its opening and closing force are analyzed.On these basis,a simple method for calculating its gravity center is presented.Taking the spillway radial gate and spillway tunnel radial gate of Pankou hydropower station as examples,the rationality and superiority are verified.The results show that compared with the results of empirical formula and 3d model,combination method and rotation method have the advantages of high accuracy and versatility;rotation method is more convenient than the combination method and is an optimal calculation method for gravity center of radial gate.In the two parameters of center of gravity,radius r<sub>G</sub> has a greater influence on the opening and closing force of radial gate,and inclination θ<sub>G</sub> has a less influence on it.The simple calculation formula is suitable for radial gate without local weighting block,which can overcome the disadvantage of complex calculation of rotation method.In order to achieve high precision and efficiency,the applicability and advantages of empirical formula,rotation method and simple method should be comprehensively utilized in the design.…”
Get full text
Article -
942
Robust identification method of website fingerprinting against disturbance
Published 2024-12-01“…The existing website fingerprint identification method with the best robustness named RF can maintain good performance against various defense methods, but it is difficult to resist the targeted defense method RF Countermeasure. …”
Get full text
Article -
943
Methods of Physical Evidence Verification in the Criminal Proceedings of Ukraine
Published 2019-05-01Subjects: Get full text
Article -
944
Image Creation Methods in Children's Poetry of the 1990s in Iran
Published 2024-05-01Get full text
Article -
945
Changeover method for biosafety cabinets using ozone gas.
Published 2025-01-01Get full text
Article -
946
Machine Learning Methods for Weather Forecasting: A Survey
Published 2025-01-01“…Research on specific tasks such as global weather forecasting, downscaling, extreme weather prediction, and how to combine machine learning methods with physical principles are very active in the current field. …”
Get full text
Article -
947
Chosen message attacks method against ECC implementations
Published 2014-05-01“…The method applies to the prime filed ECC cryptographic algorithms.…”
Get full text
Article -
948
A Method of Conversation Analysis in Narrative and Historical Texts
Published 2021-09-01“…Conversational analysis is a field in discourse and researchers in this field have proposed methods for conversation analysis that are not comprehensive for all types of texts. …”
Get full text
Article -
949
Expiratory Flow Limitation Definition, Mechanisms, Methods, and Significance
Published 2013-01-01Get full text
Article -
950
Understanding Methods for Estimating HIV-Associated Maternal Mortality
Published 2012-01-01“…This paper presents and compares the methods and discusses how they affect estimates at global and regional levels. …”
Get full text
Article -
951
Network Anomaly Prediction Method Based on Big Data
Published 2014-06-01“…With the development of the network technology and expansion of the network size,the probability of network anomaly is greatly increased,which makes network management face greater challenges.An important task of network management is network anomaly detection in time based on the data got by network management system (NMS); the performance of network management will be great improved if the network anomaly could be detected before it really happen.A method of network anomaly prediction based on big data was presented,the traditional process act as “first alarm,then solve”was replaced by anomaly prediction process.The result is significant for improving network availability and reliability.…”
Get full text
Article -
952
DepITCM: an audio-visual method for detecting depression
Published 2025-01-01“…These results demonstrate that our method outperforms most existing methods in both classification and regression tasks. …”
Get full text
Article -
953
METHODICAL APPROACH TO COMPLEX ASSESSMENT OF QUALITY OF CUSTOMS SERVICES
Published 2019-09-01Subjects: Get full text
Article -
954
Hybrid Chebyshev-Type Methods for Solving Nonlinear Equations
Published 2024-12-01Subjects: “…Chebyshev method…”
Get full text
Article -
955
Facies-Constrained Kriging Interpolation Method for Parameter Modeling
Published 2024-12-01“…This article introduces seismic facies information into the Kriging method and proposes a novel parameter modeling method named the facies-constrained Kriging (FC-Kriging) method. …”
Get full text
Article -
956
Data backup methods for mission-critical information systems
Published 2022-03-01“…The study aimed to develop an effective strategy for backing up data for critical enterprise information systems.Methods. The method for solving the problem was to create backup copies of enterprise information systems using a flexible architecture based on the backup—as a service in external cloud structures—in combination with technical resources of the organization.Results. …”
Get full text
Article -
957
Iterative Splitting Methods for Integrodifferential Equations: Theory and Applications
Published 2014-01-01“…We also discuss the benefits of such iterative schemes as fast solver methods.…”
Get full text
Article -
958
Possibility-Based Sizing Method for Hybrid Electric Aircraft
Published 2025-01-01“…It is crucial to account for uncertainties at the sizing stage to ensure reliable outcomes, highlighting the need for a method that efficiently integrates uncertainty into the process. …”
Get full text
Article -
959
THE EEMD-RA-KU METHOD ON DIAGNOSIS OF BEARING FAULT
Published 2016-01-01“…Aiming at the impact feature in fault signals of the rolling bearings,The improved algorithm diagnosis method EEMD-RA-KU was proposed to capture the impact feature. …”
Get full text
Article -
960
Method of network slicing deployment based on performance-aware
Published 2019-08-01“…In order to deal with the performance degradation caused by resource contention due to the sharing of physical resources between VNF in the network slicing,a network slicing deployment method based on performance-awareness was proposed.When deploying network slice instances,first two-phase deployment that mapping virtual nodes was adopted,and then virtual links were mapped.In the virtual nodes mapping phase,the VNF performance influences factor was defined from the perspective of resource supply and demand to quantify the degree of VNF performance impact.Then the sum of the performance influence factors of all VNF on the deployable physical server was found in the network slice instance,the physical server with the smallest sum of performance influence factors was used as the mapping location,and the simulated annealing-discrete particle swarm algorithm was used to find the nodes mapping result.In the virtual links mapping phase,the shortest path algorithm was used to obtain the link mapping result.The simulation results show that the proposed method reduces the impact of other network slices on its own service performance.…”
Get full text
Article