Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
1561
Fine-grained privacy operation control method for layout documents
Published 2023-05-01“…In view of the problem of privacy information disclosure caused by uncontrolled forwarding in the context of frequent exchange of privacy information, a fine-grained privacy operation control method for layout documents was proposed, which could achieve differentiated fine-grained privacy operation control according to the requirements of the sharer during the sharing process of privacy information.For the received multimodal layout document, the existing privacy operation control strategy was extracted, which combined the current sharer’s use attribute and the receiver’s privacy protection ability and other factors.The privacy operation control strategy was generated iteratively, and an abstract control strategy generation algorithm framework was given.Based on the iterative privacy operation control strategy and combined with specific operation scenarios, the differentiated data-masking control, exchange boundary control and local use control were carried out for different modes of information components, and the abstract privacy operation control algorithm framework was given.A prototype system for privacy operation control of OFD (open fixed-layout document) was developed to verify the above algorithms.The generation and delivery of iterative privacy operation control strategy based on friendship, as well as the differential data-masking control, exchange boundary control and local use control of OFD were implemented in the instant messaging system.…”
Get full text
Article -
1562
Method for Identifying Abnormal Hot Spots on the Surface of Composite Insulators
Published 2024-12-01“…【Objective】To avoid the operational risk of high-voltage transmission lines caused by thermal faults of composite insulators, a method for identifying abnormal hot spots on the surface of composite insulators is studied.…”
Get full text
Article -
1563
New Heuristic Local Search Method for University Course Timetabling
Published 2023-02-01Subjects: “…heuristic method…”
Get full text
Article -
1564
Gear Fault Diagnosis Method Based on Deep Transfer Learning
Published 2023-05-01“…Aiming at the problem of insufficient gear fault samples, a fault diagnosis method of transfer learning based on Hilbert-Huang spectrum and pre-trained VGG16 model is proposed. …”
Get full text
Article -
1565
Wavelet Analysis Method to Solve the Problem of Wireless Location Tracking
Published 2013-10-01Get full text
Article -
1566
Innovation in rural areas – methods to improve the quality of citizens life
Published 2024-11-01Get full text
Article -
1567
Fourier Spectral Method for a Class of Nonlinear Schrödinger Models
Published 2021-01-01“…The Fourier spectral method is applied to approximate the spatial direction, and fourth order exponential time-differencing Runge-Kutta method is used to discrete temporal direction. …”
Get full text
Article -
1568
Integrated Study of the Dinitrobenzene Electroreduction Mechanism by Electroanalytical and Computational Methods
Published 2011-01-01“…Electroreduction of 1,2-, 1,3-, and 1,4-dinitrobenzenes in DMF has been investigated by a set of experimental (cyclic voltammetry, chronoamperometry, and controlled potential electrolysis) and theoretical methods (digital simulation and quantum chemical calculations). …”
Get full text
Article -
1569
Methods of Control of the Leishmania infantum Dog Reservoir: State of the Art
Published 2011-01-01“…The contemporary use of direct and indirect methods is even more effective in reducing seroprevalence in dogs.…”
Get full text
Article -
1570
Structure Preprocessing Method for the System of Unclosed Linear Algebraic Equations
Published 2022-01-01“…The complexity of open linear algebraic equations makes it difficult to obtain analytical solutions, and preprocessing techniques can be applied to coefficient matrices, which has become an effective method to accelerate the convergence of iterative methods. …”
Get full text
Article -
1571
FOREIGN FORMS, METHODS AND TOOLS OF REORGANIZATION OF A CREDIT INSTITUTION
Published 2016-02-01“…In the article on the example of the United States of America, The United Kingdom of Great Britain and Northern Ireland, France and Germany, are considered foreign forms, methods and tools for the reorganization of a credit institution, draws conclusions about the possibility of using the experience of these countries in the Russian Federation.…”
Get full text
Article -
1572
An Online Monitoring Method for Bond Wire Fatigue in IGBT Module
Published 2024-01-01Get full text
Article -
1573
Study on Method of Monitoring and Appraisal of River Area-Source Pollution
Published 2003-01-01Get full text
Article -
1574
Streaming online log parsing method based on heuristic rule
Published 2024-04-01Subjects: Get full text
Article -
1575
Solution to an Optimal Control Problem via Canonical Dual Method
Published 2009-01-01“…The analytic solution to an optimal control problem is investigated using the canonical dual method. By means of the Pontryagin principle and a transformation of the cost functional, the optimal control of a nonconvex problem is obtained. …”
Get full text
Article -
1576
Analysis and avoidance method of 5G atmospheric duct interference
Published 2022-04-01“…., the avoidance and adjustment method of atmospheric duct interfered cells was proposed.The impact of the atmospheric duct interference is reduced and the quality of 5G networks is ensures.…”
Get full text
Article -
1577
Data hiding method based on color table expansion technique
Published 2009-01-01“…Based on color table expansion technique for indexed images,a data hiding method was proposed,and the se-curity and the hiding capacity were analyzed.The analysis results show that this method has very strong security and very high hiding capacity.Secret data can be hidden in an indexed cover image to generate a stego-image with the same visual effect as the cover image and resumed without distortion from the stego-image if the correct key is used.In addition,the statistical feature of the secret data is completely covered up by using random data,so the stego-image is statistically in-dependent of the secret data.…”
Get full text
Article -
1578
Waste cooking oil pretreatment using microwave and ultrasound methods
Published 2023-06-01“…Results showed that the pretreatment methods led to good results where the best biodiesel yield was 98%, obtained with US pretreatment, while MW led to a yield of 96%. …”
Get full text
Article -
1579
An indirect boundary integral method for an oscillatory Stokes flow problem
Published 2003-01-01Get full text
Article -
1580
DDNS + gateway separation method for interconnect of distributed data center
Published 2013-09-01Subjects: Get full text
Article