Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
1441
Application of finite-difference methods to parameter identification of agroecological models
Published 2001-12-01“… A typical parameter identification problem arisen in agroecological modeling is described and a finite difference method to solve an appropriate inverse problem is proposed. …”
Get full text
Article -
1442
TPEFD:an SDN-based efficient elephant flow detection method
Published 2017-05-01Get full text
Article -
1443
Intelligent adaptation and integrated scheduling method for computing and networking resources
Published 2023-08-01Get full text
Article -
1444
Detection and elimination method for deception jamming based on an antenna array
Published 2018-05-01“…Considering this, a detection and elimination method for deception jamming is proposed based on a specially designed array for the aircraft. …”
Get full text
Article -
1445
Spectral Analysis of Large Finite Element Problems by Optimization Methods
Published 1994-01-01“…Recently an efficient method for the solution of the partial symmetric eigenproblem (DACG, deflated-accelerated conjugate gradient) was developed, based on the conjugate gradient (CG) minimization of successive Rayleigh quotients over deflated subspaces of decreasing size. …”
Get full text
Article -
1446
Fault analysis on elliptic curve cryptosystems with sliding window method
Published 2012-01-01Subjects: Get full text
Article -
1447
Interaction based on method for spam detection in online social networks
Published 2015-07-01“…In online social networks,advertisements,rumors and malicious links are propagated by spammers arbitrarily.They not only disturb users’usualaccess,but also bring about network security threats and social panics.In an attempt to deal with the spam problems,an information diffusion model was proposed to capture the features of spam propagation.Propagation behaviors are quantitatively analyzed to detect spam messages with a decision tree-based method.The effectiveness of proposed detection model is evaluated with real data from the micro-bloggingnetwork of Sina.The experimental results show that proposed model can effectively detect spams in Sina micro-bloggingnetwork.…”
Get full text
Article -
1448
Hypernetwork link prediction method based on the SCL-CMM model
Published 2024-06-01“…Extensive comparative experiments were conducted on nine real datasets, demonstrating that this method significantly outperformed existing methods in terms of AUC score and recall rate.…”
Get full text
Article -
1449
Computational Method for Global Sensitivity Analysis of Reactor Neutronic Parameters
Published 2012-01-01“…The method is illustrated and tested on a two-group cross-section dependent problem. …”
Get full text
Article -
1450
Nonuniformity Correction Method of Infrared Detector Based on Statistical Properties
Published 2024-01-01“…Experiments on simulated noisy and real images show that our method accurately eliminates nonuniform IR noise without causing blurring and provides optimal peak signal-to-noise ratio and structural similarity.…”
Get full text
Article -
1451
Research Progress on High-Intermediate Frequency Extension Methods of SEA
Published 2019-01-01“…To improve the basic theory of SEA and knowledge of intermediate frequency extension methods, as well as attract the attention of domestic scholars, this paper describes classical SEA and intermediate frequency extension methods. …”
Get full text
Article -
1452
Application of DEM Method to Analysis of Hydrological Features in the Water Basin
Published 2001-01-01Get full text
Article -
1453
Overhead Power Line Tension Estimation Method Using Accelerometers
Published 2025-01-01Get full text
Article -
1454
Mathematical model and its fast numerical method for the tumor growth
Published 2015-07-01Subjects: Get full text
Article -
1455
Malnutrition in Chronic Pancreatitis: Causes, Assessment Methods, and Therapeutic Management
Published 2020-01-01“…The aim of this review paper is recognized if we can improve the nutritional status of patients with CP. Methods. This paper is based on systematic literature review according to the PubMed. …”
Get full text
Article -
1456
An optimized method for counting viral particles using electron microscopy
Published 2019-05-01“…The method includes a concentration of viral particles on the polyethersulfone membrane applied in centrifugal concentrators and subsequent calculation using an electron microscope. …”
Get full text
Article -
1457
Equitable technology development: A framework and methods for scientists and engineers
Published 2025-06-01Subjects: Get full text
Article -
1458
An Efficiency Control Method Based on SFSM for Massive Crowd Rendering
Published 2018-01-01“…This paper proposes a method of efficiency control for massive crowd rendering. …”
Get full text
Article -
1459
LDoS attack detection method based on simple statistical features
Published 2022-11-01“…Traditional low-rate denial of service (LDoS) attack detection methods were complex in feature extraction, high in computational cost, single in experimental data background settings, and outdated in attack scenarios, so it was difficult to meet the demand for LDoS attack detection in a real network environment.By studying the principle of LDoS attack and analyzing the features of LDoS attack traffic, a detection method of LDoS attack based on simple statistical features of network traffic was proposed.By using the simple statistical features of network traffic packets, the detection data sequence was constructed, the time correlation features of input samples were extracted by deep learning technology, and the LDoS attack judgment was made according to the difference between the reconstructed sequence and the original input sequence.Experimental results show that the proposed method can effectively detect the LDoS attack traffic in traffic and has strong adaptability to heterogeneous network traffic.…”
Get full text
Article -
1460
Fault Diagnosis Method of Gear based on Adaptive Demodulated Resonance
Published 2018-01-01“…Firstly,the original signal is decomposed into several IMFs,and the signal is reconstructed by using the correlation coefficient method to highlight the fault characteristic signal. …”
Get full text
Article