Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
1361
Multi-station positioning accuracy and enhancement method for 5G
Published 2023-09-01“…RAT-dependent is a satellite independent positioning technology of 5G.3GPP gives the Cramer-Rao lower bound (CRLB) of the positioning accuracy under the ideal condition of a single station and the simulation positioning accuracy of multi-station under different network configurations.Based on the actual network conditions, the analysis framework, accuracy range of multi-station positioning accuracy and the corresponding improvement method were proposed.The experimental results show that the RAT-dependent positioning accuracy is closely related to network technologies, and the positioning accuracy of the optimized scheme can be improved by 20%~30% compared with the non-optimized scheme.…”
Get full text
Article -
1362
User role analysis method based on directed topological potential
Published 2014-12-01“…The majority of real-world networks are directed,weighted and dynamic.Aiming at the problem of node role analysis in directed weighted network,a novel node role analysis method based on directed topological potential is pro-posed,which can divide nodes into four roles based on their behavior pattern and local influence.Then,a node role-based dynamic networks evolution analysis method is introduced,which can model the dynamics of behavioral roles represent-ing the main connectivity patterns over time and detect the significant event.The experiment results indicate that pro-posed approaches can effectively estimate the node role and detect the dynamics of network evolution.…”
Get full text
Article -
1363
Speaker verification method based on deep information divergence maximization
Published 2021-07-01“…To solve the problem that the nonlinear relationship between speaker representations cannot be accurately captured in speaker verification, an objective function based on depth information divergence maximization was proposed.It could implicitly represent the nonlinear relationship between speaker representations by calculating the similarity between their distributions.Under the supervision of the optimization goal of maximizing the statistical correlation, the deep neural network was optimized towards the direction that the within-class data was more compact and the between-class data were far away from each other, and finally the discrimination of deep speaker representation space could be effectively improved.Experimental results show that compared with other deep learning methods, the relative EER of the proposed method is reduced by 15.80% at most, which significantly improves the system performance.…”
Get full text
Article -
1364
Analyzing chaotic systems with multi-step methods: Theory and simulations
Published 2025-02-01Get full text
Article -
1365
An Underdetermined Blind Source Separation Method with Application to Modal Identification
Published 2019-01-01“…In this paper, we first review the drawbacks of the conventional BSS methods and then propose a novel underdetermined BSS method for addressing the modal identification with limited sensors. …”
Get full text
Article -
1366
Design method of secure computing protocol for deep neural network
Published 2020-08-01Get full text
Article -
1367
POSSIBILITIES OF SELF-ORGANIZATION METHODS IN PREDICTING EMERGENCY SITUATIONS IN MINING
Published 2019-12-01Subjects: Get full text
Article -
1368
An Efficient Higher-Order Quasilinearization Method for Solving Nonlinear BVPs
Published 2013-01-01“…The construction of higher-order convergent methods depends on a decomposition method which is different from Adomain decomposition method (Motsa and Sibanda, 2013). …”
Get full text
Article -
1369
Wu’s Characteristic Set Method for SystemVerilog Assertions Verification
Published 2013-01-01“…We propose a verification solution based on characteristic set of Wu’s method towards SystemVerilog assertion checking over digital circuit systems. …”
Get full text
Article -
1370
The repertory grids method in the investigation of cognitive differentiation in the sphereof communication
Published 2019-04-01Subjects: “…repertory grids method…”
Get full text
Article -
1371
Method, Design, and Evaluation of an Exoskeleton for Lifting a Load In Situ
Published 2021-01-01“…This paper presents a design method and realization of an exoskeleton for a specific scenario of lifting a load in situ. …”
Get full text
Article -
1372
Bending Moment Calculations for Piles Based on the Finite Element Method
Published 2013-01-01“…Using the finite element analysis program ABAQUS, a series of calculations on a cantilever beam, pile, and sheet pile wall were made to investigate the bending moment computational methods. The analyses demonstrated that the shear locking is not significant for the passive pile embedded in soil. …”
Get full text
Article -
1373
Corrigendum to “Bolt Detection Signal Analysis Method Based on ICEEMD”
Published 2021-01-01Get full text
Article -
1374
Fuzzy Interpolation and Other Interpolation Methods Used in Robot Calibrations
Published 2012-01-01“…A novel interpolation algorithm, fuzzy interpolation, is presented and compared with other popular interpolation methods widely implemented in industrial robots calibrations and manufacturing applications. …”
Get full text
Article -
1375
RESEARCH ON MODELING METHOD OF EQUIVALENT TURNING FORCE MODEL (MT)
Published 2023-01-01Get full text
Article -
1376
RESEARCH ON ACCELERATED FATIGUE TESTING METHOD OF THE WORM AND GEAR TRANSMISSION
Published 2015-01-01“…This paper presented specific calculation method,and analyzed reliability and feasibility of accelerated fatigue of worm and gear.…”
Get full text
Article -
1377
IMPROVED FINITE ELEMENT TRANSFER MATRIX METHOD FOR STRUCTURAL DYNAMICS
Published 2015-01-01“…The finite element transfer matrix method provides an efficient means to solve complex engineering problems,the state vector of traditional finite element transfer matrix method usually include linear and angular displacement,resulting in solving the transient dynamic problems has a strong dependence on numerical method. …”
Get full text
Article -
1378
Benefits of the New Laboratory Methods of the Vigilance of the Health of Cienfuegos Population
Published 2015-03-01Get full text
Article -
1379
Automatic method for searching integral distinguishers of ARX block ciphers
Published 2018-05-01“…Firstly,based on three subsets division property propagation technique,the propagation function of the K-set and L-set of ARX block ciphers was constructed respectively.All vectors in L-set affected the propagation of K-set when propagate through xored round key operation.With SAT/SMT solver,round reduced integral propagation functions of ARX block ciphers could be established.Finally,by exhausting all possible input integral characteristics with proper data complexity,round reduced integral distinguishers of ARX block ciphers could be found.The proposed method can be used for searching integral distinguishers of ARX block ciphers including SIMON-like family block ciphers,HIGHT,SPECK family block ciphers and LEA effectively.…”
Get full text
Article -
1380
Clustering-based dynamic privacy preserving method for social networks
Published 2015-11-01“…Due to the dynamic characteristics of the social network graph structure,an effective dynamic privacy preserving method was needed.To solve the problems of the existing dynamic privacy preservation methods,such as attacker’s too little background knowledge and the low adaptability to the dynamic characteristics of graph structure,a clustering-based dynamic privacy preservation method was provided.The analysis shows that the proposed method can resist many kinds of background knowledge attacks and has good adaptability to the dynamic characteristics of the social network graph structure.…”
Get full text
Article