Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
1601
New results on implementation of neuroscience methods in the study of bear brain
Published 2025-01-01Get full text
Article -
1602
Node Importance Measurement Method in Heterogeneous Information Satellite Network
Published 2022-06-01Get full text
Article -
1603
Critique and Analysis of the Textbook “Comparative Education: Foundation, Principles and Methods”
Published 2017-11-01“…Writing and preparation of the book "Comparative Education: Foundation, Principles and Methods " shows a deliberate attempt to present this science with respect to its theoretical foundations and principles. …”
Get full text
Article -
1604
An Approximate Quasi-Newton Bundle-Type Method for Nonsmooth Optimization
Published 2013-01-01“…In contrast with quasi-Newton bundle methods of Mifflin et al. (1998), we only assume that the values of the objective function and its subgradients are evaluated approximately, which makes the method easier to implement. …”
Get full text
Article -
1605
Video tamper detection method based on nonnegative tensor factorization
Published 2017-06-01“…The authenticity and integrity of video authentication is one of the important contents in information security field.A video tampering detection method based on non-negative tensor decomposition was proposed for video inter-frame tampering.First of all,spectral feature of video frame was extracted quickly.The video was described by a three-dimensional tensor which created by the main compression feature.The tensor was factorized by Tucker non-negative decomposition method and then the time dimension matrix was extracted to calculate correlation.Finally,the tampering position was determined by using the Chebyshev’s inequality.Experiments show that this method can detect the video inter-frame tampering quickly and robustly.…”
Get full text
Article -
1606
The comparison of post-proximal gastrectomy digestive tract reconstruction methods
Published 2025-01-01“…This study is to compare the performance of esophagogastrostomy (EG), jejunal interposition (JI), and double tract reconstruction (DTR) on post-PG reconstruction effectiveness. Methods A retrospective study was conducted using the clinical data of 94 PG patients who underwent digestive tract reconstruction by EG (37 patients), JI (29 patients) or DTR (28 patients). …”
Get full text
Article -
1607
Dynamic defense decision method for network real-time confrontation
Published 2019-12-01“…How to implement defense decision based on network external threat is the core problem of building network information defense system.Especially for the dynamic threat brought by real-time attack,scientific and effective defense decision is the key to construct network dynamic emergency defense system.Aiming at the problem of dynamic defense decision-making,firstly a network survivability game model based on attribute attack graph theory is designed.The attack and defense matrix is used to represent the attack and defense strategy and path,and the attack and defense strength and network survivability quantification method are given.Secondly,the single step and the multi-step attack and defense strategy payoff calculation method is proposed,and the defense decision is based on the attack and defensive strategy payoff.Finally,the effectiveness of the defense decision technology is verified through experiments.…”
Get full text
Article -
1608
Code vulnerability detection method based on graph neural network
Published 2021-06-01“…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
Get full text
Article -
1609
Methods for prevention of acute post-endoscopic retrograde cholangiopancreatography pancreatitis
Published 2020-06-01“…This review provides a broader summary of pharmacological methods and techniques aimed at reducing the risk of PEP.…”
Get full text
Article -
1610
A Case-Based Reasoning Method for Remanufacturing Process Planning
Published 2014-01-01“…To assess the usefulness and practicality of the proposed method, an illustrative example is given and the results are discussed.…”
Get full text
Article -
1611
A Comparative Study of Regularization Method in Structure Load Identification
Published 2018-01-01“…The TSVD based on GCV method has more advantages than the Tikhonov based on L-curve method. …”
Get full text
Article -
1612
Cloud Resource Allocation Method Based on Elastic Resource Adjustment
Published 2014-11-01“…The proposed method meets the users' satisfaction, effectively realizes the optimization of virtual machine resource cost, increases the cloud service provider revenue.…”
Get full text
Article -
1613
Applied aspects of modern non-blind image deconvolution methods
Published 2024-08-01Subjects: Get full text
Article -
1614
RETRACTED: Determination of thermal stress and strain in plates by the direct method
Published 2024-01-01Get full text
Article -
1615
Prediction of Chloride Diffusion in Concrete Structure Using Meshless Methods
Published 2016-01-01“…The numerical simulation methods at present mainly involve finite element methods (FEM), which are based on mesh generation. …”
Get full text
Article -
1616
Image generation classification method based on convolution neural network
Published 2016-09-01“…Using convolution neural network which though convolution and pooling extracting features of high dis-tinguish ability and then make fusion for classification of natural images and scanned documents.Experimental re-sults show that the classification accuracy of the proposed classification method is more than 93% on the SKL image database.The model is highly robust to font sizes and image formats.Through contrast experiment validated that preprocessing of image has a positive effect on the accuracy of the model and the time cost on training.…”
Get full text
Article -
1617
APDL Modeling Method of Accurate Mesh Model of Helical Gear
Published 2017-01-01“…The results of numerical experiment show that the meshing solid model of helical gear generated by the presented method has a good geometric precision,which can guarantee that the simulation results is credible.…”
Get full text
Article -
1618
ESTIMATION METHOD OF LOAD SPECTRUM DISTRIBUTION BASED ON EM ALGORITHM
Published 2020-01-01Subjects: Get full text
Article -
1619
Application of Fuzzy theory to project scheduling with critical path method
Published 2013-07-01“…The results obtained using the present method is compared with those obtained using other methods used in literature…”
Get full text
Article -
1620
Assessing the influence of playing method on the outcome of basketball shooting ability
Published 2023-06-01Subjects: “…play method…”
Get full text
Article