Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
1841
An Algebraic Method on the Eigenvalues and Stability of Delayed Reaction-Diffusion Systems
Published 2013-01-01“…The eigenvalues and stability of the delayed reaction-diffusion systems are considered using the algebraic methods. Firstly, new algebraic criteria to determine the pure imaginary eigenvalues are derived by applying the matrix pencil and the linear operator methods. …”
Get full text
Article -
1842
New method of text representation model based on neural network
Published 2017-04-01“…Method of text representation model was proposed to extract word-embedding from text feature.Firstly,the word-embedding of the dual word-embedding list based on dictionary index and the corresponding part of speech index was created.Then,feature vectors was obtained further from these extracted word-embeddings by using Bi-LSTM recurrent neural network.Finally,the sentence vectors were processed by mean-pooling layer and text categorization was classified by softmax layer.The training effects and extraction performance of the combination model of Bi-LSTM and double word-embedding neural network were verified.The experimental results show that this model not only performs well in dealing with the high-quality text feature vector and the expression sequence,but also significantly outperforms other three kinds of neural networks,which includes LSTM,LSTM+context window and Bi-LSTM.…”
Get full text
Article -
1843
A Class of Steffensen-Type Iterative Methods for Nonlinear Systems
Published 2014-01-01“…By considering a frozen Jacobian, we provide a class of m-step methods with order of convergence m+1. A new method named as Steffensen-Schulz scheme is also contributed. …”
Get full text
Article -
1844
Subarrayed Antenna Array Synthesis Using Ternary Adjusting Method
Published 2014-01-01“…Ternary adjusting method is proposed and combined with particle swarm optimization (PSO) algorithm for subarrayed antenna array synthesis. …”
Get full text
Article -
1845
A Simulation Accelerating Method Based on CUDA with Kepler GPU
Published 2015-10-01Subjects: Get full text
Article -
1846
Computational Methods for Solving Linear Fuzzy Volterra Integral Equation
Published 2017-01-01“…However, according to comparison of these methods, we conclude that the variational iteration method provides more accurate results.…”
Get full text
Article -
1847
Cryopreservation Method for Preventing Freeze-Fracture of Small Muscle Samples
Published 2025-01-01“…This method decreased the occurrence of freeze-fractures by an order of magnitude, to ~4%, whereas the traditional method of cryopreservation resulted in ~56% freeze-fracturing.…”
Get full text
Article -
1848
Shortest-Way: An Improved Empirical Transition Method for Signal Coordination
Published 2017-01-01“…Four fundamental insights into transition methods are provided from the perspective of traffic engineers. …”
Get full text
Article -
1849
ABOUT THE APPROACH AND METHOD OF DETERMINING THE VALUE OF ROYALTIES FOR THE DEVELOPMENT OF MINERALS
Published 2019-10-01“…The author’s approach and the method of determining the value of royalties for the development of mineral resources have been explained in the article. …”
Get full text
Article -
1850
Research on unsupervised domain adaptive bearing fault diagnosis method
Published 2024-06-01“…Then, the feature distributions output of the source domain and the target domain were converged by the method of reversing labels in the generative adversarial network. …”
Get full text
Article -
1851
Optimizing low complexity encoding method for systematic polar code
Published 2018-07-01Get full text
Article -
1852
Uncertainty analysis of varying inertia estimation based on Bayesian method
Published 2025-04-01“…The Bayesian inertia estimation method (BIEM) is proposed to estimate power system varying inertia and quantify estimation uncertainty from a Bayesian statistical and modeling perspective. …”
Get full text
Article -
1853
Research on the backbone network cache method based on application-awareness
Published 2017-12-01“…Based on over 900 million HTTP requests from an ISP backbone network,the HTTP characteristic of different content types from a wide range of perspectives was analyzed,including request composition,size,popularity and temporal dynamics,and an application-aware backbone network cache method was proposed,referred to as AACM.The experiment results show that in the case of a slight increase in cache space,the hit ratio of the online-video increases 15%, and the total source traffic and cache I/O load reduced by about half.…”
Get full text
Article -
1854
Debt Brake: Putting the Potential Output Estimation Method to the Test
Published 2022-11-01Get full text
Article -
1855
SDN security control and forwarding method based on cipher identification
Published 2018-02-01“…Aimed at the limited matching fields and the lack of effective data source authentication mechanism in the software defined networking (SDN),a SDN security control forwarding method based on cipher identification was proposed.First,the cipher identification was generated according to the user identity,file attributes or business content and other characteristics,and the data stream was marked by the cipher identification and signed with the private key based on the cipher identification.Then,when the data stream entered and left the network,the forwarding device verified its signature to ensure the authenticity of the data.At the same time,the cipher identification was designed as a matching item recognized by the forwarding device,and the network forwarding behavior was defined based on the cipher identification,so a fine-grained network control capability could be formed based on people,things,and business flow.Finally,the validity of the method is verified by experimental analysis.…”
Get full text
Article -
1856
Method of Prevent the for Years for a Change of Precision Punching Die
Published 2016-01-01“…The method and parameters of heat treatment of dies are as follows. …”
Get full text
Article -
1857
Container escape detection method based on heterogeneous observation chain
Published 2023-01-01“…Aiming at the problem of high false negative rate in container escape detection technologies, a real-time detecting method of heterogeneous observation was proposed.Firstly, the container escape behavior utilizing kernel vulnerabilities was modeled, and the critical attributes of the process were selected as observation points.A heterogeneous observation method was proposed with “privilege escalation” as the detection criterion.Secondly, the kernel module was adopted to capture the attribute information of the process in real time, and the process provenance graph was constructed.The scale of the provenance graph was reduced through container boundary identification technology.Finally, a heterogeneous observation chain was built based on the process attribute information, and the prototype system HOC-Detector was implemented.The experiments show that HOC-Detector can successfully detect all container escapes using kernel vulnerabilities in the test dataset, and the increased runtime overhead is less than 0.8%.…”
Get full text
Article -
1858
Comparison of Predictive Control Methods for High Consumption Industrial Furnace
Published 2013-01-01Get full text
Article -
1859
Application of Local Fractional Homotopy Perturbation Method in Physical Problems
Published 2020-01-01“…It is difficult for nonlinear models to obtain the closed form of the solution, and in many cases, only an approximation of the real solution can be obtained. The perturbation method is a wave equation solution using HPM compared with the Fourier series method, and both methods results are good agreement. …”
Get full text
Article -
1860
Interrogating the Traditional Methods of Crime Control of the Alago Ethnic Group
Published 2022-11-01“… This study investigates the Alago traditional methods of crime control. The analysis in the research is predicated on social control theory as the theoretical based. …”
Get full text
Article