Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
1901
Climatic Zoning of Khuzestan Province Based on Litten Ski Method
Published 2022-03-01“…The purpose of this study is to classify the climate of Khuzestan province based on litany-skiing method. The litany-skiing method uses the three basic elements of temperature, precipitation and coefficient. …”
Get full text
Article -
1902
Up-to-date methods of stomach functions investigation and their diagnostic potentials
Published 2011-09-01Subjects: Get full text
Article -
1903
Generalized Runge-Kutta Method with respect to the Non-Newtonian Calculus
Published 2015-01-01“…Theory and applications of non-Newtonian calculus have been evolving rapidly over the recent years. As numerical methods have a wide range of applications in science and engineering, the idea of the design of such numerical methods based on non-Newtonian calculus is self-evident. …”
Get full text
Article -
1904
Analytical Comparison of Stop Word Recognition Methods in Persian Texts
Published 2025-01-01“…Our findings indicate that the FastText-based approach outperformed the others with a detection accuracy of 96.98, suggesting that this method can lead to the development of an automatic, reliable, and efficient system.…”
Get full text
Article -
1905
Joint channel and impulsive noise estimation method for OFDM systems
Published 2018-03-01“…Aiming at the impulsive noise occurring in OFDM systems,an impulsive noise mitigation algorithm based on compressed sensing theory was proposed.The proposed algorithm firstly treated the channel impulse response and the impulsive noise as a joint sparse vector by exploiting the sparsity of both them.Then the sparse Bayesian learning framework was adopted to jointly estimate the channel impulse response,the impulsive noise and the data symbols,in which the data symbols were regarded as unknown parameters.Compared with the existing impulsive noise mitigation methods,the proposed algorithm not only utilized all subcarriers but also did not use any a priori information of the channel and impulsive noise.The simulation results show that the proposed algorithm achieves significant improvement on the channel estimation and bit error rate performance.…”
Get full text
Article -
1906
The “Hand-as-Foot” teaching method in the cervical lymph-node partitioning
Published 2025-02-01Get full text
Article -
1907
Safe hierarchical virtual network mapping method based on clustering
Published 2021-09-01“…Based on the 5G network environment, a security hierarchical virtual network mapping method based on K-means clustering was proposed.In particular, the idea of node security classification and the combination of K-menas clustering algorithm was involved to solve the key problems of low security and low mapping efficiency existing in current virtual network mapping.Compared with traditional methods, this research method improves the efficiency of virtual node mapping and enhances the network resilience.…”
Get full text
Article -
1908
Research on switch migration method based on minimum cost path
Published 2020-02-01Get full text
Article -
1909
Critical analysis of methods for measuring and monitoring of the population life quality
Published 2022-01-01“…Global, subnational and national quality of life assessment methods in relation to measurement tools have been compared and a comparative analysis has been presented in a summary graph.The author’s classification of quality of life management approaches has been presented. …”
Get full text
Article -
1910
Image inpainting forensics method based on dual branch network
Published 2022-12-01“…Image inpainting is a technique that uses information from known areas of an image to repair missing or damaged areas of the image.Image editing software based on it has made it easy to edit and modify the content of digital images without any specialized foundation.When image inpainting techniques are used to maliciously remove the content of an image, it will cause confidence crisis on the real image.Current researches in image inpainting forensics can only effectively detect a certain type of image inpainting.To address this problem, a passive forensic method for image inpainting was proposed, which is based on a two-branch network.The high-pass filtered convolutional network in the dual branch first used a set of high-pass filters to attenuate the low-frequency components in the image.Then features were extracted using four residual blocks, and two transposed convolutions were performed with 4x up-sampling to zoom in on the feature map.And thereafter a 5×5 convolution was used to attenuate the tessellation artifacts from the transposed convolutions to generate a discriminative feature map on the high-frequency components of the image.The dual-attention feature fusion branch in the dual branch first added a local binary pattern feature map to the image using a preprocessing block.Then the dual-attention convolution block was used to adaptively integrate the image’s local features and global dependencies to capture the differences in content and texture between the inpainted and pristine regions of the image.Additionally, the features extracted from the dual-attention convolution block were fused, and the feature maps were up-sampled identically to generate the discriminative image content and texture on the feature maps.The extensive experimental results show the proposed method improved the F1 score by 2.05% and the Intersection over Union(IoU) by 3.53% for the exemplar-based method and by 1.06% and 1.22% for the deep-learning-based method in detecting the inpainted region of the removed object.Visualization of the results shows that the edges of the removed objects can be accurately located on the detected inpainted area.…”
Get full text
Article -
1911
Explicit Solution of Telegraph Equation Based on Reproducing Kernel Method
Published 2012-01-01“…We propose a reproducing kernel method for solving the telegraph equation with initial conditions based on the reproducing kernel theory. …”
Get full text
Article -
1912
CS-based data collection method for airborne clustering WSN
Published 2015-05-01“…A data acquisition scheme which was suitable for airborne clustering WSN was proposed.On the one hand,this scheme adopts the random compressive sampling could reduce the amount of sampling data of the cluster nodes ef-fectively,and greatly reducing the hardware requirements of the cluster nodes; on the other hand,put forward a MP re-construction method based on composite chaotic-genetic algorithm expressly,which combined the excellent local searching characteristics of chaos theory with the powerful global search ability of genetic algorithm,could improve the signal reconstruction performance of the cluster head or Sink effectively.The experimental results show that,by dimin-ishing the sampling frequency to 1/8 of the original sampling frequency,this random compressive sensing scheme can dramatically reduce the sampling quantity,and the reconstruction precision can reach 10<sup>-7</sup>magnitude.This random com-pressive sensing scheme provides a useful idea for practical WSN.…”
Get full text
Article -
1913
Cross-language refactoring detection method based on edit sequence
Published 2024-12-01“…Aiming at the problems of unreliable commit message caused by developers not consistently recording refactoring operations, and language singularityin deep learning-based refactoring detection methods, a cross-language refactoring detection method RefCode was proposed. …”
Get full text
Article -
1914
Methods for preliminary determination of pemetrexed in macromolecular drug-carrier systems
Published 2016-03-01“…This method shows linear range of 2.230–223.0 μmol L−1. …”
Get full text
Article -
1915
Analysis of Random Difference Equations Using the Differential Transformation Method
Published 2024-01-01“…The differential transformation method (DTM) is one of the best methods easily applied to linear and nonlinear difference equations with random coefficients. …”
Get full text
Article -
1916
Data processing method for telecom data based on projection pursuit
Published 2016-12-01“…Based on this, a data processing method based on projection pursuit was proposed. The result demonstrates the effectiveness of the scheme.…”
Get full text
Article -
1917
SDN security prediction method based on bayesian attack graph
Published 2021-11-01“…Existing researchers use threat modeling and security analysis system to evaluate and predict SDN (software defined network) security threats, but this method does not consider the vulnerability utilization of SDN controller and the location of devices in the network, so the security evaluation is not accurate.In order to solve the above problems, according to the probability of device vulnerability utilization and device criticality, combined with PageRank algorithm, a algorithm to calculate the importance of each device in SDN was designed; according to SDN attack graph and Bayesian theory, a method to measure the success probability of device being attacked was designed.On this basis, a SDN security prediction method based on Bayesian attack graph was proposed to predict the attacker's attack path.Experimental results show that this method can accurately predict the attacker's attack path and provide more accurate basis for security defense.…”
Get full text
Article -
1918
Adaptive Dual-Polarization Filtering Method for Countering Active Jamming
Published 2020-01-01“…In order to counter active jamming, an adaptive polarization filtering method based on dual polarization radar is put forward. …”
Get full text
Article -
1919
An Efficient Compact Difference Method for Temporal Fractional Subdiffusion Equations
Published 2019-01-01“…In this paper, a high-order compact finite difference method is proposed for a class of temporal fractional subdiffusion equation. …”
Get full text
Article -
1920
Method of individual communication transmitter identification based on maximum correntropy
Published 2016-12-01“…To measure the similarity between the fine features of communication transmitters, a method of individual communication transmitter identification based on maximum correntropy was put forward. …”
Get full text
Article