Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
1301
Approximation for Transient of Nonlinear Circuits Using RHPM and BPES Methods
Published 2013-01-01“…Therefore, in this paper, rational homotopy perturbation method and Boubaker Polynomials Expansion Scheme are applied to a differential equation from a nonlinear circuit. …”
Get full text
Article -
1302
Approximate Method for Solving the Linear Fuzzy Delay Differential Equations
Published 2015-01-01“…We propose an algorithm of the approximate method to solve linear fuzzy delay differential equations using Adomian decomposition method. …”
Get full text
Article -
1303
Routing control method of hot standby BRAS in IP MAN
Published 2016-01-01“…With the implementation of“Broadband China”strategy,IP services become more and more diversified,the demand for all kinds of security is also increasing.The key technology of BRAS hot backup and its realization method were introduced,realizing the seamless handover between primary and standby BRAS and effectively controlled the route range in BRAS.The routing was optimized to reduce traffic between interconnect circuits of primary and backup BRAS to improve the utilization efficiency of the circuit.…”
Get full text
Article -
1304
Novel topic detection method for microblog based on SVM filtration
Published 2013-09-01“…A detection method based on SVM filtration was proposed.The method uses text feature as imported vectors to filtrate microblog news,reducing the amount of calculation greatly.A single-pass clustering algorithm based on the improvement of high-frequency words sorting was proposed,which can detect isolated points commendably.Experimental results show that the method can detect news topics from massive microblog data efficiently.…”
Get full text
Article -
1305
Fast and Sensitive Method for Determination of Domoic Acid in Mussel Tissue
Published 2016-01-01“…In this work, we propose a very simple and fast analytical method to determine DA in mussel tissue. The method consists of two consecutive extractions and requires no purification steps, due to a reduction of the extraction of the interfering species and the application of very sensitive and selective HILIC-MS/MS method. …”
Get full text
Article -
1306
Covert Channel Construction Method Based on HTTP Composite Protocols
Published 2022-01-01“…Experimental results show that this method can resist the detection method based on application signature, protocol fingerprint detection method, and combination model detection method, and has strong concealment. …”
Get full text
Article -
1307
Recent trends in user studies: action research and qualitative methods
Published 1998-01-01“…</i> It attempted to set out what was, for the time, a novel perspective on appropriate methodologies for the study of human information seeking behaviour, focusing on qualitative methods and action research, arguing that the application of information research depended up its adoption into the managerial processes of organizations, rather than its self-evident relationship to any body of theory.…”
Get full text
Article -
1308
A Reliable Method for Identification of Antibiotics by Terahertz Spectroscopy and SVM
Published 2020-01-01“…However, conventional antibiotic identification methods have a low sensitivity and a long detection time. …”
Get full text
Article -
1309
Using artificial intelligence methods for the optimal synthesis of reversible networks
Published 2024-11-01“…This enables the use of synthesis methods to create quantum reversible logical computing devices, which in turn promotes the development of quantum technologies. …”
Get full text
Article -
1310
Polynomial estimation method for PN sequence based on reliability accumulation
Published 2012-09-01“…The issues of insufficient efficiency and poor error-tolerance of current high-order polynomial estimation me-thods under error conditions were studied.By combining the iterative berlekamp-massey(BM)algorithm in GF(2)and the improved Chase algorithm,a novel algorithm based on reliability accumulation was proposed.The sequence soft infor-mation was mapped to sequence reliability as the input information of BM algorithm,and the corresponding output relia-bility of estimated polynomial was accumulated as the rule of correct polynomial.In order to improve the estimation pre-cision,the candidate reliability-accumulated polynomial set were reduced by the characteristics of primitive polynomial in GF(2).The simulation results show that the proposed method is irrelevant with the tapped number of ator poly-nomial,and has a good estimation performance to estimate 17-order polynomials when the sequence BER is 18%.…”
Get full text
Article -
1311
Current methods for detecting and assessing HIV-1 antibody resistance
Published 2025-01-01“…In recent years, a variety of methods have been developed to detect, characterize and predict HIVAR. …”
Get full text
Article -
1312
The Circle Pure Rolling Method for Point Cloud Boundary Extraction
Published 2024-12-01“…We introduce a circle rolling method (CRM) for boundary extraction from 2D point clouds. …”
Get full text
Article -
1313
Review on the Method of Compensation Benefit Allocation for Cascade Hydropower Stations
Published 2020-01-01“…Under the model of cascade rolling development,there are significant compensation benefits in the joint operation of cascade hydropower stations.Scientific and reasonable allocation of compensation benefits becomes the key point to realize joint optimal operation of cascade hydropower stations.This paper first expounds the present situation and existing risk in cascade hydropower station operation management,specifies the compensation benefit types and principles for compensation benefit allocation,summarizes and analyzes the main methods and application examples of compensation benefit allocation of cascade hydropower stations,discusses the applicable conditions and advantages and disadvantages of various methods,analyzes the shortcomings in application examples through existing research,finally proposes the future research direction for allocation of compensation benefits of cascade hydropower stations,so as to provide the reference for sustainable development and utilization of river basin water resources.…”
Get full text
Article -
1314
High-order discontinuous Galerkin methods for the monodomain and bidomain models
Published 2024-12-01Subjects: “…discontinuous galerkin methods…”
Get full text
Article -
1315
Gibbets from the Middle Ages to Modern times. An interdisciplinary method
Published 2016-03-01Get full text
Article -
1316
Efficient segment pattern based method for malicious URL detection
Published 2015-11-01“…An efficient segment based method for detecting malicious URL was proposed.Firstly it analyzed the annotated malicious URLs in terms of three semantic segments,i.e.…”
Get full text
Article -
1317
Two-Stage Optimization Method for the Bearing Layout of Isolated Structure
Published 2021-01-01“…An integer programming method is adopted to optimize the number of each type of isolator. …”
Get full text
Article -
1318
Research of nonparametric density estimation algorithms by applying clustering methods
Published 2023-09-01Subjects: Get full text
Article -
1319
Spectrophotometric Method for the Determination of Carboxin in its Formulations and Environmental Samples
Published 2011-01-01“…Simple, precise, rapid, sensitive and accurate spectrophotometric methods have been developed for the estimation of carboxin in pure form and in its formulations. …”
Get full text
Article -
1320
Active deception defense method based on dynamic camouflage network
Published 2020-02-01“…In view of the problem that the existing honeypots often fail to resist the penetration attack due to the lack of confidentiality,an active deception defense method based on dynamic camouflage network (DCN) was presented.The definition of DCN was given firstly,and then the attacker-defender scenario of active deception based on DCN was described.Next,the interaction process of the attacker-defender scenario was modeled by using a signaling game,whose equilibrium can guide the selection of optimal deception strategy.Furthermore,to quantify the payoffs accurately,the two-layer threat penetration graph (TLTPG) was introduced.Finally,the solution for game equilibrium was designed,through which pure strategy and mixed strategy could be calculated simultaneously.The experimental results show that,based on the dynamic camouflage network,the perfect Bayesian equilibrium can provide effective guidance for the defender to implement the optimal defense strategy and maximize the benefits of the defender.In addition,the characteristics and rules of active deception defense DCN-based are summarized.…”
Get full text
Article