Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
1461
An Energy-Domain IR NUC Method Based on Unsupervised Learning
Published 2025-01-01“…To obtain accurate blackbody temperature, emissivity, and waveband measurements, an energy-domain infrared nonuniformity method based on unsupervised learning is proposed. …”
Get full text
Article -
1462
Moral competence of dental students: an explanatory mixed-methods study
Published 2025-01-01“…Abstract Aim The present study aimed to investigate the level of four components of moral skills, including moral sensitivity, moral reasoning, moral motivation, and moral courage, among dental students and explore the factors affecting their engagement in moral behavior. Method This is an explanatory mixed-method study conducted in two quantitative and qualitative phases. …”
Get full text
Article -
1463
Study on Disease Mechanism and Theoretical Quantification Method of Tunnel Structure
Published 2019-01-01“…Compared with the diversity of tunnel disease detection methods, there are few studies on the methods of quantifying and evaluating the main structural diseases of the lining. …”
Get full text
Article -
1464
Extraction of Cattle Retinal Vascular Patterns with Different Segmentation Methods
Published 2024-12-01“…Therefore, in some countries, biometric identification methods are being developed and used as alternatives to overcome the disadvantages of traditional methods. …”
Get full text
Article -
1465
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
1466
Mechanical and Biochemical Methods for Rigor Measurement: Relationship with Eating Quality
Published 2019-01-01“…Accurate measurements of both the biochemical and mechanical characteristics that underpin muscle and its transformation into meat are key factors to an improved understanding of meat quality, but also this early-stage measurements may be useful to develop methods to predict final meat texture. It is the goal of this review to present the available research literature on the historical and contemporary analyses that could be applied in early postmortem stages (pre-rigor and rigor) to determine the biochemical and physical characteristics of the meat that can potentially impact the eating quality.…”
Get full text
Article -
1467
THE TA'LIQAT METHOD OF SHEIKH SULAIMAN ARRASULI ON THE TAFSIR JALALAIN
Published 2023-12-01“…This research applies a philology-based qualitative method in which manuscripts are the main source with related tafsir books as the research subject. …”
Get full text
Article -
1468
Scenario-Planning Method for Cost Estimation Using Morphological Analysis
Published 2019-01-01“…This study proposes a scenario-planning method that uses morphological analysis for the estimation of construction cost. …”
Get full text
Article -
1469
A FOUR-POINT EQUIVALENT METHOD OF THE BOLTED JOINTS STIFFNESS
Published 2017-01-01“…The experimental results show that this method is feasible.…”
Get full text
Article -
1470
Efficient diagnosis of diabetes mellitus using an improved ensemble method
Published 2025-01-01“…The second phase employed the same algorithms alongside sequential ensemble methods—XG Boost, AdaBoostM1, and Gradient Boosting—using an average voting algorithm for binary classification. …”
Get full text
Article -
1471
STUDY ON LOAD EQUIVALENT METHOD AND LOAD SPECTRUM OF THE BOOM OF LOADER
Published 2018-01-01“…Based on the measured load of the 5 t loader working device,the method of solving the load with the attitude change to the local coordinate system of the boom has been studied and the MATLAB software to write the corresponding data processing program has been sued to obtain the loader arm under the fixed attitude of the load time course. …”
Get full text
Article -
1472
Performance evaluation of different estimation methods for missing rainfall data
Published 2016-09-01Subjects: Get full text
Article -
1473
An Easy-to-Understand Method to Construct Desired Distance-Like Measures
Published 2021-01-01“…This paper recommends in a plausible reasoning manner an easy-to-understand method to construct desired distance-like measures: to fuse easy-to-obtain (or easy to be coined by practitioners) pseudo-semi-metrics, pseudo-metrics, or metrics by making full use of well-known t-norms, t-conorms, aggregation operators, and similar operators (easy to be coined by practitioners). …”
Get full text
Article -
1474
Evolution-Operator-Based Single-Step Method for Image Processing
Published 2006-01-01“…<p>This work proposes an evolution-operator-based single-time-step method for image and signal processing. The key component of the proposed method is a local spectral evolution kernel (LSEK) that analytically integrates a class of evolution partial differential equations (PDEs). …”
Get full text
Article -
1475
Pattern-Based Test Suite Reduction Method for Smart Contracts
Published 2025-01-01“…The article presents the test suite reduction method for smart contracts, which exploits the knowledge of their design manner. …”
Get full text
Article -
1476
A New Website Fingerprinting Method for Tor Hidden Service
Published 2025-01-01“…The experimental results show that compared with existing state-of-the-art techniques, the proposed method exhibits better performance in terms of key performance metrics.…”
Get full text
Article -
1477
Programmable data processing method and system design for polymorphic network
Published 2022-04-01“…Aiming at the problems of compatible with multiple route identification, network protocols and network application data processing faced by multimodal networks, a programmable data processing method compatible with multiple modes was proposed.Through the mode recognition and classify module to identify packets of different network modes, the data type, offset and length were used to represent multiple types of data, and the modal data processing pipeline was formed by using the matching action data table with selectable matching algorithm and processing action to process data of different types of network.A prototype system for data processing of polymorphic network was implemented and verified by using the proposed method.Experimental results show that the modal data processing pipeline can isolate the network of different modes and ensure the performance independence, the type of matching algorithm and the length of the processed data will affect the forwarding performance of the system, while the type of data will not.…”
Get full text
Article -
1478
New Spectrophotometric and Fluorimetric Methods for Determination of Fluoxetine in Pharmaceutical Formulations
Published 2009-01-01“…New simple and sensitive spectrophotometric and fluorimetric methods have been developed and validated for the determination of fluoxetine hydrochloride (FLX) in its pharmaceutical formulations. …”
Get full text
Article -
1479
Space frame structures in domestic design practice and their installation methods
Published 2024-07-01Subjects: Get full text
Article -
1480
Hamming Distance Method with Subjective and Objective Weights for Personnel Selection
Published 2014-01-01“…Multicriteria decision making (MCDM) is one of the methods that popularly has been used in solving personnel selection problem. …”
Get full text
Article