Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
1821
A New Method for the Calibration of Site-Related Response Spectra
Published 2022-01-01“…The accuracy of the proposed calibration method is validated against the other four available methods using Qian’a earthquake records and actual engineering examples. …”
Get full text
Article -
1822
An information-DNA based method of information dissemination and evolution on Internet
Published 2022-11-01“…To solve the problem of how to trace the information content dissemination and evolution process on the Internet, an information DNA-based method of information dissemination and evolution on Internet was proposed.Firstly, semantic extraction of Internet information content was performed based on domain knowledge to form a key feature set of information content.Then, using the key feature set of information content, an information DNA construction method based on locally sensitive hashing was proposed.Finally, the usability and effectiveness of the proposed method were verified by public dataset.The problem of traceability of Internet homologous information dissemination and evolution process was solved by using information DNA as the core identifier, which was of great practical significance for the study of Internet information content dissemination, evolution tracing and the governance and guidance of Internet public opinion events.…”
Get full text
Article -
1823
Optimizing demand charge of data center base on PE method
Published 2016-03-01Subjects: “…PE method…”
Get full text
Article -
1824
Methods to Evaluate Peanut Maturity for Optimal Seed Quality and Yield
Published 2016-11-01“…This 8-page fact sheet discusses maturity assessment methods as well as steps for collecting and evaluating a maturity sample. …”
Get full text
Article -
1825
Simulation on the Self-Compacting Concrete by an Enhanced Lagrangian Particle Method
Published 2016-01-01“…The capability and results obtained from this method are discussed.…”
Get full text
Article -
1826
Application of Learning Analytics in Higher Education: Datasets, Methods and Tools
Published 2024-06-01“…The accumulation of big educational data on the platforms of universities and social media leads to the need to develop tools for extracting regularities from educational data, which can be used for understanding the behavioral patterns of students and teachers, improve teaching methods and the quality of the educational process, as well as form sound strategies and policies for universities development. …”
Get full text
Article -
1827
Evaluation of Bias in the Measurement of Condensable Particulate Matter with Method 202
Published 2020-08-01Subjects: Get full text
Article -
1828
Understanding of Applocation of 4-AAP Method to Volatile Phenol Measurement
Published 2002-01-01Get full text
Article -
1829
Research of Automobile Transmission Shaft based on Finite Element Method
Published 2016-01-01“…In order to improve the reliability and rationality of a automobile transmission shaft design,the free modal,torsional stiffness,static strength and fatigue strength of a transmission shaft are analyzed based on the finite element method. The result shows that the first-order natural frequency is 15% higher than the excitation frequency,so the resonance will be effectively avoided. …”
Get full text
Article -
1830
Methods of Collecting User Data in the Process of Building Commercial Website
Published 2012-06-01“…The presented methods are different as regards such criteria as: research type, stage of Website building, method goal, and advantages of the method.…”
Get full text
Article -
1831
Expanding the frontiers of electrocatalysis: advanced theoretical methods for water splitting
Published 2025-01-01Get full text
Article -
1832
Passive Initialization Method Based on Motion Characteristics for Monocular SLAM
Published 2019-01-01“…Visual SLAM techniques have proven to be effective methods for estimating robust position and attitude in the field of robotics. …”
Get full text
Article -
1833
Method of constructing an anonymous graph based on information loss estimation
Published 2016-06-01“…A potential attack based on degree information by re-identifying target vertexes from a sequence of published graphs was analyzed.To deal with this kind of attack,a k-anonymous graph stream constructing method based on information loss estimation was provided.Information loss caused by re-constructing graph was controlled by using the method of attributes generalization of nodes and the structure generalization of sub-graph.The disturbance in sub-graph was forbidden to prevent the attack.The method of measuring the information loss of nodes and structures during the anonymous process due to re-construction of graph was defined.A k-anonymity cluster algorithm based on greedy clustering algorithm was build,which realized anonymous partition according to the information loss.Finally,a method of constructing anonymous social network for the evolving social network with the least information loss was provided.The experiments on medical diagnostic data set show that the algorithm of constructing anonymous graph based on the information loss estimation can be used to control the loss of information.…”
Get full text
Article -
1834
Software diversity evaluating method based on gadget feature analysis
Published 2023-06-01“…Software diversity is commonly utilized in scenarios such as software distribution and operating systems to improves system resilience and security.However, existing software diversity evaluation methods are typically based on conventional code features and are relatively limited in scope, which can make it difficult to accurately reflect the security benefits of software diversity.To address this issue, a software diversity evaluation method was proposed from the perspective of ROP attack by analyzing the impact of software diversity on the difficulty of building a gadget attack chain, the attacker’s potentially available computing power, and the attacker’s cost of searching for gadgets in different variants.Metrics for the quality, practicability, and distribution of gadgets were integrated into this method.Testing was conducted using diversity technologies with different granularity.The evaluation results showed that the proposed method could accurately and comprehensively reflect the security gain brought by software diversity.It was observed that software diversity could relocate/modify/delete a large number of gadgets in the software, increasing the cost of attacking different software variants but also leading to different degrees of software expansion.Finally, an analysis and discussion of the advantages and disadvantages of existing diversity techniques were conducted based on the experimental results.…”
Get full text
Article -
1835
Least Square Homotopy Perturbation Method for Ordinary Differential Equations
Published 2021-01-01“…In this study, a new modification of the homotopy perturbation method (HPM) is introduced for various order boundary value problems (BVPs). …”
Get full text
Article -
1836
Life cycle cost-effectiveness estimation and optimization method for satellite
Published 2025-02-01“…In order to design satellite with low cost and high effectiveness, an optimization method of life cycle cost-effectiveness for satellites is proposed in this paper. …”
Get full text
Article -
1837
Secure data collection method of WSN based on mobile Sink
Published 2021-02-01“…At present, WSN data collection method based on mobile Sink has some problems, such as low detection rate of network attack and large memory cost, which makes the network vulnerable to network attack and difficult to be applied in practice.To solve this problem, a secure data collection WSN method of WSN based on mobile Sink was proposed, which used convex hull algorithm of energy perception to identify data collection points, used elliptic encryption algorithm (ECC) to generate key for all nodes in the network, used ElGamal algorithm to realize node identity and message authentication, and used support vector machine (SVM) to identify network attack types.The simulation results show that the proposed secure data collection method has good performance in attack detection rate, memory overhead and packet delivery rate.…”
Get full text
Article -
1838
Improvement in Analytical Methods for Determination of Sugars in Fermented Alcoholic Beverages
Published 2018-01-01“…Journal of Analytical Methods in Chemistry…”
Get full text
Article -
1839
Durability method on corrosion fatigue performance of AH 32 steel
Published 2019-04-01Subjects: “…Durability method…”
Get full text
Article -
1840
Role of radiological methods of diagnostics at simultaneous pancreas-kidney transplantation
Published 2015-12-01“…To characterize radiological methods of diagnostics of surgical complications after simultateous pankreas-kidney transplantation (SPKT).Material and methods. …”
Get full text
Article