Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
1101
Computing Exponential for Iterative Splitting Methods: Algorithms and Applications
Published 2011-01-01“…Iterative splitting methods have a huge amount to compute matrix exponential. …”
Get full text
Article -
1102
Effective Partitioning Method With Predictable Hardness for CircuitSAT
Published 2025-01-01“…A distinctive feature of the proposed partitioning methods is that they make it possible to estimate the hardness (e.g. the total runtime of a SAT solver on all subproblems) of a partitioning via the Monte Carlo method. …”
Get full text
Article -
1103
Cookie based online tracing method for cyberlockers resource
Published 2016-12-01“…Experimental results show that this method performs good efficiency and scalability.…”
Get full text
Article -
1104
A Lissajous Curve–Based Method for Busbar Protection
Published 2024-01-01“…In this paper, a novel time-domain method based on the orientation analysis of the superimposed current component Lissajous curves is presented for busbar protection. …”
Get full text
Article -
1105
Research on the method of virtual machine deployment in cloud computing
Published 2015-03-01“…A method of virtual machine deployment was proposed. …”
Get full text
Article -
1106
Decision analytical methods for assessing the efficacy of agroecology interventions
Published 2023-04-01“…We also outline the conceptual relationships between decision analysis methods and agroecology, and examine how decision analysis methods can be applied to support decision-making for agroecological transitions. …”
Get full text
Article -
1107
Energy-saving privacy data secure aggregation method
Published 2014-11-01“…For the Internet of things(IoT) secure data aggregation issues,data privacy-preserving and limited computation ability and energy of nodes should be tradeoff.Based on analyzing the pros-and-cons of current works,a low energy-consuming secure data aggregation method (LCSDA) was proposed.This method uses shortest path principle to choose neighbor nodes and generates the data aggregation paths in the cluster based on prim minimum spanning tree algorithm.Simulation results show that this method could effectively cut down energy consumption and reduce the probability of cluster head node being captured,in the same time preserving data privacy.…”
Get full text
Article -
1108
METHOD AND CONTROL SET-UP OF SILICON WAFER FLATNESS
Published 2015-04-01“…The method was suggested and the laser control set-up was developed of the arrow bend and bend profile of the semiconductor wafers. …”
Get full text
Article -
1109
Spectrophotometric Method for the Determination of Oxaliplatin in Pure and Dosage Forms
Published 2006-01-01“…A simple and reproducible spectrophotometric method has been developed for the estimation of Oxaliplatin in pure and dosage forms. …”
Get full text
Article -
1110
Finite Volume Method for the Launch Safety of Energetic Materials
Published 2021-01-01“…A computer program based on the finite volume method and viscoelastic statistical crack mechanics model is developed to study the ignition of energetic materials. …”
Get full text
Article -
1111
An Asynchronous Data Transmission Method in Heterogeneous Wireless Networks
Published 2020-01-01“…The results show that our proposed method effectively reduces data transmission time and balances channel transmission throughput.…”
Get full text
Article -
1112
A Review of Computational Electromagnetic Methods for Graphene Modeling
Published 2016-01-01“…The advantages and drawbacks of each method are discussed and numerical examples of these methods are given to illustrate their performance and application.…”
Get full text
Article -
1113
Lightweight authentication method for network interconnection control protocols
Published 2018-11-01“…As network interconnection controls are required for the space-earth integrated network and the limited resources are not suitable for high computing complexity degree authentication methods,a lightweight authentication method for network interconnection control protocols is proposed.Through the calculation of limited resources,using the idea of random fill,It design and implement public key encryption and signature algorithm which is components of the networks interconnection control authentication protocol.Formal analysis tool Scyther is used to analyze the security of the protocol.Comparing with other secure communication protocols,the method can meet the requirements of resource-constrained networks and ensure the safety.…”
Get full text
Article -
1114
On a general convergence for Broyden like update method
Published 1991-01-01Subjects: Get full text
Article -
1115
The strong formulation finite element method: stability and accuracy
Published 2014-07-01“…This method uses a hybrid scheme given by the Differential Quadrature Method (DQM) and the Finite Element Method (FEM). …”
Get full text
Article -
1116
Retracted: Application of Laser Scanning Technology in Digital Method
Published 2023-01-01Get full text
Article -
1117
Retracted: Early Stroke Prediction Methods for Prevention of Strokes
Published 2023-01-01Get full text
Article -
1118
New method of intelligent data transmission for IoV
Published 2019-06-01“…Internet of vehicle (IoV) is a hot research topic of the intelligent transportation,and the research of new method of the intelligent data transmission is one of the key technologies.In order to solve the problem of intelligent data transmission of IoV,a kind of new method which includes the important parameters such as vehicle density,vehicle speed,data transmission rate and data delay was proposed.By setting up network model of IoV and delaying function,the optimal routing method for intelligent data transmission which is based on Markovian decision theory was designed.Through comparison experiments with the relative methods show that the performance on improving the data transmission rate and shortening the delay of data transmission of IoV,it has important value for many applications of intelligent transportation with IoV,such as vehicle dynamic remote monitoring.…”
Get full text
Article -
1119
ANALYSIS OF CONTROL METHODS FOR LED BACKLIGHTING OF DISPLAY DEVICES
Published 2018-08-01“…The analysis of control methods for LED backlighting of display devices is carried out. …”
Get full text
Article -
1120
Classification of Iranian weather types based on Woś method
Published 2025-06-01“…Furthermore, the application of Ward's clustering method facilitated the identification of three distinct climatic groups. …”
Get full text
Article