Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
1501
Experimental evaluation of nanoclay assisted water based EOR method
Published 2025-01-01Get full text
Article -
1502
Mapping method from human to robot arms with different kinematics
Published 2025-01-01“…This method reconstructs the human arm model quickly and maps it to the dual-arm robot model. …”
Get full text
Article -
1503
The method of investigation of basic project parameters of microsatellite by random search
Published 2019-06-01Subjects: Get full text
Article -
1504
Survey on video image reconstruction method based on generative model
Published 2022-09-01“…Traditional video compression technology based on pixel correlation has limited performance improvement space, semantic compression has become the new direction of video compression coding, and video image reconstruction is the key link of semantic compression coding.First, the video image reconstruction methods for traditional coding optimization were introduced, including how to use deep learning to improve prediction accuracy and enhance reconstruction quality with super-resolution techniques.Second, the video image reconstruction methods based on variational auto-encoders, generative adversarial networks, autoregressive models and transformer models were discussed emphatically.Then, the models were classified according to different semantic representations of images.The advantages, disadvantages, and applicable scenarios of various methods were compared.Finally, the existing problems of video image reconstruction were summarized, and the further research directions were prospected.…”
Get full text
Article -
1505
Impact of Modern Technology on Social Research Methods in Educational Contexts
Published 2025-02-01Subjects: Get full text
Article -
1506
Radio channel estimation method based on quadratic differentials probability
Published 2017-01-01“…The fifth generation (5G) mobile communication technology has the characteristics of high speed and large bandwidth,which makes the fading of radio signal in time domain and frequency domain more obviously.With the increase of differential values statistical step and the spatial sampling interval,the channel estimation method based on the differential probability can't track the deep fading area and the peak area was over-tacked.In view of the above problems,a channel estimation method based on quadratic differentials probability was proposed.Firstly,the valley point and peak point of the fading curve were found.Then,the estimated differential values of deep fading area and peak area were improved by quadratic differential probability.Finally,the estimated gains were obtained by the difference operation.Simulation results show that,this method can improve the whole tracking performance effectively and reduce the tracking error.…”
Get full text
Article -
1507
Using the Scientific Method to Engage Mathematical Modeling: An Investigation of pi
Published 2016-01-01“… The purpose of this paper is to explain how to use the scientific method as the framework to introduce mathematical model. …”
Get full text
Article -
1508
FAULT DIAGNOSIS METHOD OF ROLLING BEARING BASED ON EEMD-CNN
Published 2020-01-01“…After calculating a series of indexes of reconstructed signals,using CNN and various methods to diagnose faults. The results shows that the method used in this paper can effectively carry out fault diagnosis. …”
Get full text
Article -
1509
STRUCTURE RELIABILITY CALCULATION METHOD BASED ON IMPROVED NEURAL NETWORK
Published 2021-01-01“…Finally, the reliability calculation results were calculated with the Monte Carlo method. The results show that the proposed method improves the fitting accuracy and gives consideration to the calculation efficiency, which verifies the superiority and feasibility of the proposed method.…”
Get full text
Article -
1510
Design of Prestressed Cable Dome Using Minor Perturbation Method
Published 2024-12-01Subjects: Get full text
Article -
1511
Network-assisted optimal rate control methods in cognitive networks
Published 2013-05-01Get full text
Article -
1512
A detection method of Android system vulnerabilities based on matching
Published 2016-05-01“…Android system has occupied the majority share of smart mobile operating systems.However,Android system has worrying security issues.It frequently bursts high-risk vulnerabilities in recent years,which is a big security risk to the majority of Android users.Android system vulnerabilities were studied,and a rapid detection method of Android system vulnerabilities based on matching was proposed.A script-based vulnerability scanning tool was also designed.Through the evaluation of experiments,the tool is running well.…”
Get full text
Article -
1513
Acute enteritis with pelvic SBRT: Influence of bowel delineation methods
Published 2025-05-01“…Methods and materials: In this prospective study, patients with high-risk prostate cancer treated with WP-SBRT were identified. …”
Get full text
Article -
1514
Magnetostatic Active Contour Model with Classification Method of Sparse Representation
Published 2020-01-01“…In this paper, a magnetostatic active contour model with a classification method of sparse representation is proposed. First, rough edge information is obtained with some edge detectors. …”
Get full text
Article -
1515
SECONDARY FEEDBACK RIDGE ESTIMATION METHOD FOR STRUCTURAL DAMAGE DETECTION
Published 2024-08-01“…To overcome the ill⁃posed least square problem in sensitivity equations,a secondary feedback ridge estimation method was proposed to detect structural damages based on modal flexibility changes.Modal eigenvalues and mode shapes were utilized to assemble the modal flexibility matrix,which was used to establish linear equations for detecting elemental damage severities by modal flexibility changes.During the damage localization stage,damage sites were primarily assessed using the non⁃negative least square method and the feedback ridge technique.Since the damage localization results obtained by the two methods were typically disturbed by different undamaged elements,suspicious damaged elements were comprehensively determined by taking the intersection of the two sets of damage localization results.At the damage quantification stage,the diagonal entries of the regularization matrix corresponding to suspicious elements were decreased and the diagonal entries associated with other elements were augmented.Then the second feedback ridge estimation was conducted to accomplish damage quantification.The numerical analysis of a simply supported beam indicates that the proposed method is more robust in resisting noise,compared with the non⁃negative least square method and feedback ridge estimation technique.Regardless of whether it is damage localization or damage quantification,the proposed method demonstrates higher reliability in detecting accuracy.…”
Get full text
Article -
1516
Out-of-context misinformation detection method based on stance analysis
Published 2024-04-01“…Experimental results indicate that the incorporation of stance analysis significantly enhances the method's detection capabilities. Specifically, the accuracy of this method outperforms the state-of-the-art algorithm that employs Internet evidence for detection by 2.3%.…”
Get full text
Article -
1517
An Efficient Distributed Forensic System Based on Hadoop:Principle and Method
Published 2014-01-01Get full text
Article -
1518
Research on 5G MEC security assessment system and method
Published 2023-08-01“…Multi-access edge computing (MEC) is deployed at the edge of the network, enabling efficient and fast data processing in mobile networks, while also undertaking important security functions, making MEC a prime target for attackers.Therefore, MEC nodes will face huge security risks.How to accurately evaluate and quantify MEC security capabilities is an urgent issue to be solved.For accurately evaluating and quantifying MEC security capabilities, the MEC safety assessment system was proposed in combination with MEC safety risks.The assessment indicators selected in the assessment system comprehensively reflect the basic characteristics of MEC and its complete safety capability.Based on this evaluation system, the MEC security evaluation method was designed by using the analytic hierarchy process (AHP) and fuzzy evaluation, the MEC vulnerability scoring system was creatively proposed, and the evaluation indicators were provided based on the results of MEC vulnerability scoring system, the MEC security capability quantification value was finally calculated.The experimental result proves the effectiveness of the method.…”
Get full text
Article -
1519
Method to improve the performance of network time delay of EPA system
Published 2014-08-01“…In order to improve the performance of network-induced time delay of EPA (Ethernet for plant automation) networked control systems, the interacting mechanism between the control and the communication in EPA system was studied and EPA-CS (EPA cooperative scheduling) method was presented. Through setting their mutually cooperative time slices for function blocks that executed the control tasks and data transmission that executed the communication tasks, and through determining the executing time and frequencies of control tasks in their time slices, the method could accomplish the cooperation between control tasks and communication tasks in EPA system. …”
Get full text
Article -
1520
Improvement of N-Acetylcysteine Loaded in PLGA Nanoparticles by Nanoprecipitation Method
Published 2018-01-01“…The results suggest that besides efficiently entrapping hydrophobic compounds, the nanoprecipitation method also has a high potential as an alternative entrapment method for hydrophilic compounds as well. …”
Get full text
Article