Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
961
PyFuzzer:automatic in-memory fuzz testing method
Published 2013-09-01“…Fuzz Testing is an effective method to mine all kinds of vulnerabilities.But the main drawbacks to current fuzz testing tools are:firstly,it produces high volume testing data and it’s extraordinary time consumption; secondly,if the accessing needs authentication,the greatest part of test data will be abandoned.PyFuzzer,a novel automatic in-memory fuzz testing tool combining static analysis,dynamic analysis and in-memory fuzz testing,was presented.The tool is highly automatic and effective.Compared with 4n FTP Fuzzer in testing WarFTPD and Serv-U,PyFuzzer can discover all vulnerabilities and improve test efficiency greatly.…”
Get full text
Article -
962
Method for router online security risk assessment quantification
Published 2013-11-01“…The experiment results show the method is effective in calculating the quantitive risk of the router and helpful for administrators to assess security risks.…”
Get full text
Article -
963
CIP Method of Characteristics for the Solution of Tide Wave Equations
Published 2018-01-01“…The CIP-MOC (Constrained Interpolation Profile/Method of Characteristics) is proposed to solve the tide wave equations with large time step size. …”
Get full text
Article -
964
Introduction to deep learning methods for multi‐species predictions
Published 2025-01-01“…Methods in Ecology and Evolution…”
Get full text
Article -
965
Climatic Characteristics and Determination Method for Freezing Rain in China
Published 2017-01-01Get full text
Article -
966
Wind Turbine Aerodynamic Performance by Lifting Line Method
Published 1998-01-01“…Predictions are, shown to compare favorably with existing numerical data from more involved free wake methods, but require less computational effort. Thereby, the present method may be a very useful tool for calculating the aerodynamic loads on horizontal-axis wind turbine blades.…”
Get full text
Article -
967
REGULATION AND ROLLING QUALITY CONTROL ON THE BASIS OF STATISTICAL METHODS
Published 2009-05-01“…It is shown that introduction of statistical method of control will allow to reduce efforts for production, delivery of the samples to the laboratory of mechanical testing, and to reduce the expenses as well.…”
Get full text
Article -
968
Random 2D Composites and the Generalized Method of Schwarz
Published 2015-01-01“…This method is related to the traditional method based on the average probabilistic values involving the n-point correlation functions. …”
Get full text
Article -
969
The New Method of Sensor Data Privacy Protection for IoT
Published 2021-01-01“…This article introduces the new method of sensor data privacy protection method for IoT. …”
Get full text
Article -
970
Trajectory privacy protection method based on location obfuscation
Published 2018-07-01“…In the process of continuous queries,a method of trajectory privacy protection based on location obfuscation was proposed to solve the problem that K-anonymity was difficult to guarantee user privacy in third party architectrue.Firstly,the (G-1) query obfuscation locations through the location prediction was obtained and the dummy location selection mechanism,and then sent them together with the user’s real query location to different anonymizers to form cloaking regions and sent them to the LBS server for queries,and the query results were returned to the user by different anonymizers.In this method,the user’s real query location was confused by the location obfuscation,and the attacker couldn’t deduce the user’s trajectory from a single anonymizer or the LBS server.The method can enhance the privacy of the user’s trajectory and can effectively solve the performance bottleneck in the single anonymizer structure.Security analysis shows the security of the proposed approach,and experiments show this method can reduce the number of interactions between the user and the LBS server and the overhead of the single anonymizer.…”
Get full text
Article -
971
A New Method of Network Index Data Forecast
Published 2013-03-01“…As the expansion of communication industry, the network data tends to be diverse, comp1ex and numerous.Therefore, the management and optimization become more and more difficu1t.And the index data forecast requires higher and higher accuracy.How to manage the network data effective1y and comprehensive1y turns to be a capita1 issue.A new method of network index data forecast was studied.…”
Get full text
Article -
972
Harmonising Theory: Integrating Singing With Grounded Theory Methods
Published 2025-01-01“…International Journal of Qualitative Methods…”
Get full text
Article -
973
Efficient method of constructing parameters in R-ate paring
Published 2010-01-01“…In order to accelerate the computing of Tate paring, a new technique of selection method of parameters (A,B) based on R-ate technique had been proposed. …”
Get full text
Article -
974
Spatial error concealment method based on tensor voting
Published 2011-01-01“…As the existing spatial error concealment algorithms is lack of the recovery accuracy in complex texture areas,a spatial error concealment method based on tensor voting was proposed,which extracted structural information by using tensor voting.On this basis,an improved spatial error concealment algorithm which combined with the traditional algo-rithms was further proposed.Firstly the lost marc blocks were classified into three categories,and then the appropriate concealment method was chose to recover the lost macro blocks according to the type of lost macro blocks.Experimental results show that the proposed method improves the recovery accuracy effectively and avoids the edge disorder phe-nomenon,especially in the region with more complex texture,the subjective and objective quality of concealed image is improved greatly.…”
Get full text
Article -
975
Application of the Moment Of Inertia method to the Critical-Plane Approach
Published 2016-10-01“…The Moment-Of-Inertia (MOI) method has been proposed by the authors to solve some of the shortcomings of convex-enclosure methods, when they are used to calculate path-equivalent ranges and mean components of complex non-proportional (NP) multiaxial load histories. …”
Get full text
Article -
976
Botnet detecting method based on group-signature filter
Published 2010-01-01“…A botnet detecting method was presented based on group-signature filter,suitable for the traditional signatures matching algorithm.Using multiple member signatures to filter the packets of hosts from Intranet,the proposed method is able to handle the shortened and scattered signatures at a space expense of O(tmn).The simulated experiment proves the correctness and validity of the detecting method.…”
Get full text
Article -
977
Privacy protection method on time-series data publication
Published 2015-11-01“…A differential privacy model was proposed based on the sampling filtering and the mechanism of evaluation.Firstly,fixed sampling method was used to sample the original data and the non-sampling data be published directly.Secondly,for the sampling date,utilize the differential privacy mechanism to add the noise.Then,use Kalman to correct the sampling date.Finally,use the mutual information to evaluate data under different sampling intervals.Through the experiment,it is proved that the mechanism can achieve a good balance between the practicality and protective.…”
Get full text
Article -
978
RSA-based image recognizable adversarial attack method
Published 2021-10-01“…Adversarial attack is an important part of deep learning security research.Relying on the RSA signature schemes and RSA encryption schemes in cryptography, an adversarial attack method that adversarial examples can be recognized by a specific classifier is proposed.Through the idea of one pixel attack, the normal image can have the ability to make other classifier misclassify while embedding additional information.It can be used in classifier authorization management, online image anti-counterfeiting, etc.The experiment show that the adversarial examples can be recognized under the specific classifier, and the disturbance noise is difficult to detect by the human eye.…”
Get full text
Article -
979
Coupling Analysis of Research Methods for Hydrological Model Uncertainty
Published 2022-01-01“…To reduce the average bandwidth of the forecast interval while increasing the interval coverage,this paper conducted a coupling analysis of dual EnKF and GLUE,two methods to research the hydrological model uncertainty and obtained the dual E-G method.Taking the Xin'anjiang model as an example,the paper used three evaluation indicators (i.e.…”
Get full text
Article -
980
Cryptococcus neoformans in the sputum: a noninvasive diagnostic method
Published 2025-01-01Get full text
Article