Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
1941
Optical fiber eavesdropping detection method based on machine learning
Published 2020-11-01“…Optical fiber eavesdropping is one of the major hidden dangers of power grid information security,but detection is difficult due to its high concealment.Aiming at the eavesdropping problems faced by communication networks,an optical fiber eavesdropping detection method based on machine learning was proposed.Firstly,seven-dimensions feature vector extraction method was designed based on the influence of eavesdropping on the physical layer of transmission.Then eavesdropping was simulated and experimental feature vectors were collected.Finally,two machine learning algorithms were used for classification detection and model optimization.Experiments show that the performance of the neural network classification is better than the K-nearest neighbor classification,and it can achieve 98.1% eavesdropping recognition rate in 10% splitting ratio eavesdropping.…”
Get full text
Article -
1942
DESIGN DEVELOPMENT OF THE WATER SUPPLY WELLS AND METHODS OF THEIR CAPITAL REPAIR
Published 2016-03-01Get full text
Article -
1943
Reservoir ecological health assessment Methods: A systematic review
Published 2025-02-01“…This systematic literature review examined comprehensive methods for assessing the aquatic ecological health of artificial water reservoirs covering studies conducted globally from 1998 to 2023. …”
Get full text
Article -
1944
A New Scalar Quantization Method for Digital Image Watermarking
Published 2016-01-01“…In contrast to other known quantization methods, the detailed method here stipulates asymmetric distribution of quantized samples. …”
Get full text
Article -
1945
METHOD OF MAKING MANAGEMENT DECISION ON FINANCING THE ECONOMIC SECURITY OF ORGANIZATION
Published 2017-01-01“…There is a dependence of the value of averted damage from resource investments in building and maintaining the desired level of economic security, in a view of this, is found their optimum value. The method takes into account a number of requirements to build economic security, which further allows you to integrate it into the overall organization of the control loop. …”
Get full text
Article -
1946
Nano-Sized Ultrasound Contrast Agent: Salting-Out Method
Published 2010-03-01“…We describe the development of an echogenic, nano-sized polylactic acid UCA by adaptation of a salting-out method. The viscosity of the initial colloidal suspension (concentration and molecular weight of protective colloid [polyvinyl alcohol (PVA)] and concentration of polymer) was key in determining particle size and polydispersity (increasing viscosity increased both). …”
Get full text
Article -
1947
Design and Control Method of Switchable On- or Off-Ramp for Urban Highway
Published 2020-01-01Get full text
Article -
1948
Ranking Influential Nodes in Complex Networks with Information Entropy Method
Published 2020-01-01“…On the basis of the k-shell method, we propose an improved multiattribute k-shell method by using the iterative information in the decomposition process. …”
Get full text
Article -
1949
Uniqueness, Born Approximation, and Numerical Methods for Diffuse Optical Tomography
Published 2013-01-01“…If a priori information of the optical coefficient is known, DOT is reformulated to find a perturbation of the optical coefficients inverting the Born expansion which is an infinite series expansion with respect to the perturbation and the a priori information. Numerical methods for DOT are explained as methods inverting first- or second-order Born approximation or the Born expansion itself.…”
Get full text
Article -
1950
Reliability Assessment Based on GO Method of Metro Traction System
Published 2020-01-01“…A reliability assessment method based on the GO method of the MTS is proposed. …”
Get full text
Article -
1951
Research on Self-Monitoring Method for Anomalies of Satellite Atomic Clock
Published 2016-01-01“…Now, method based on PLL has been used successfully in China’s newest BeiDou navigation satellite.…”
Get full text
Article -
1952
RETRACTED: Microsurgical dissection methods for embryonic cloning of monozygotic twins
Published 2024-01-01Get full text
Article -
1953
Measuring Complexity in Manufacturing: Integrating Entropic Methods, Programming and Simulation
Published 2025-01-01Get full text
Article -
1954
A Cost-Sensitive Ensemble Method for Class-Imbalanced Datasets
Published 2013-01-01“…In imbalanced learning methods, resampling methods modify an imbalanced dataset to form a balanced dataset. …”
Get full text
Article -
1955
Analysis of Optimal RAP Content Based on Discrete Element Method
Published 2022-01-01“…Methods of recycling a large amount of waste asphalt mixture generated in pavement maintenance and decreasing the waste of existing resources are one of the problems that will be solved in the future. …”
Get full text
Article -
1956
Bifurcation Analysis with Aerodynamic-Structure Uncertainties by the Nonintrusive PCE Method
Published 2017-01-01“…The uncertain limit cycle oscillation (LCO) and bifurcation are simulated in the time domain with the stochastic PCE method. Bifurcation diagrams with uncertainties were quantified. …”
Get full text
Article -
1957
Study on Energy Consumption Assessment Method and Model of FTTH Network
Published 2012-09-01Get full text
Article -
1958
AN EXPERIMENT ON THE PROPOSED ONLINE ASSESSMENT AND EXAMINATION METHOD AT DALAT UNIVERSITY
Published 2024-06-01“…Along with online teaching are methods of online assessments and examinations. The biggest challenges to online assessments and examinations are internet speed, authentication of the examinee’s identity, and test authenticity, especially for classes with large numbers of students. …”
Get full text
Article -
1959
METHOD AND ALGORITHMS OF CALCULATION OF PARAMETERS OF RELIABILITY IN ACCORDANCE WITH MULTIVARIATE DATA
Published 2017-01-01“…The originality of methods consists in application of an fiducial approach. …”
Get full text
Article -
1960
Personalized trajectory privacy preserving method based on graph partition
Published 2015-03-01“…Experiment results on synthetic dataset show the effectiveness and reasonableness of proposed method.…”
Get full text
Article