Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
2061
Diversity Perceptions in the UK Retail Industry: A Case of Tesco
Published 2023-03-01“…It can be argued that with exponential technological changes like the emergence of artificial intelligence, machine learning, the internet of things (IoT), etc. retailers around the world are facing continuous challenges in keeping their business model updated and relevant for sustainable business growth and profitability. …”
Get full text
Article -
2062
Research Progress in Methods to Estimate High-resolution Direction of Arrival
Published 2024-12-01“…Then, it analyzes the reasons for the limited resolution of traditional beamforming-based methods and discusses higher-resolution methods such as adaptive beamforming direction spectrum, subspace methods, and compressed sensing. …”
Get full text
Article -
2063
The design of experiments for the transcriptome studies by high-throughput sequencing methods
Published 2016-05-01“…The common questions in the design of the highthroughput sequencing experiments using RNA-Seq or Ribo-Seq methods are reviewed. The ENCODE guidelines (2011) as well as the recently published advances in the design of the studies of mammalian, animal and plant transcriptomes are also summarized in this review. …”
Get full text
Article -
2064
Approximation for Transient of Nonlinear Circuits Using RHPM and BPES Methods
Published 2013-01-01“…Therefore, in this paper, rational homotopy perturbation method and Boubaker Polynomials Expansion Scheme are applied to a differential equation from a nonlinear circuit. …”
Get full text
Article -
2065
Approximate Method for Solving the Linear Fuzzy Delay Differential Equations
Published 2015-01-01“…The detailed algorithm of the approach is provided. The approximate solution is compared with the exact solution to confirm the validity and efficiency of the method to handle linear fuzzy delay differential equation. …”
Get full text
Article -
2066
Routing control method of hot standby BRAS in IP MAN
Published 2016-01-01“…With the implementation of“Broadband China”strategy,IP services become more and more diversified,the demand for all kinds of security is also increasing.The key technology of BRAS hot backup and its realization method were introduced,realizing the seamless handover between primary and standby BRAS and effectively controlled the route range in BRAS.The routing was optimized to reduce traffic between interconnect circuits of primary and backup BRAS to improve the utilization efficiency of the circuit.…”
Get full text
Article -
2067
Novel topic detection method for microblog based on SVM filtration
Published 2013-09-01“…A detection method based on SVM filtration was proposed.The method uses text feature as imported vectors to filtrate microblog news,reducing the amount of calculation greatly.A single-pass clustering algorithm based on the improvement of high-frequency words sorting was proposed,which can detect isolated points commendably.Experimental results show that the method can detect news topics from massive microblog data efficiently.…”
Get full text
Article -
2068
Fast and Sensitive Method for Determination of Domoic Acid in Mussel Tissue
Published 2016-01-01“…In this work, we propose a very simple and fast analytical method to determine DA in mussel tissue. The method consists of two consecutive extractions and requires no purification steps, due to a reduction of the extraction of the interfering species and the application of very sensitive and selective HILIC-MS/MS method. …”
Get full text
Article -
2069
Covert Channel Construction Method Based on HTTP Composite Protocols
Published 2022-01-01“…Experimental results show that this method can resist the detection method based on application signature, protocol fingerprint detection method, and combination model detection method, and has strong concealment. …”
Get full text
Article -
2070
Recent trends in user studies: action research and qualitative methods
Published 1998-01-01“…</i> It attempted to set out what was, for the time, a novel perspective on appropriate methodologies for the study of human information seeking behaviour, focusing on qualitative methods and action research, arguing that the application of information research depended up its adoption into the managerial processes of organizations, rather than its self-evident relationship to any body of theory.…”
Get full text
Article -
2071
A Reliable Method for Identification of Antibiotics by Terahertz Spectroscopy and SVM
Published 2020-01-01“…However, conventional antibiotic identification methods have a low sensitivity and a long detection time. …”
Get full text
Article -
2072
Using artificial intelligence methods for the optimal synthesis of reversible networks
Published 2024-11-01“…The study focuses on the application of evolutionary artificial intelligence algorithms, specifically genetic algorithms and ant colony optimization algorithms, for the optimal synthesis of reversible circuits. As a result, a detailed description of the key concepts of the improved algorithms, simulation results, and comparison of the two methods is provided. …”
Get full text
Article -
2073
Polynomial estimation method for PN sequence based on reliability accumulation
Published 2012-09-01“…The issues of insufficient efficiency and poor error-tolerance of current high-order polynomial estimation me-thods under error conditions were studied.By combining the iterative berlekamp-massey(BM)algorithm in GF(2)and the improved Chase algorithm,a novel algorithm based on reliability accumulation was proposed.The sequence soft infor-mation was mapped to sequence reliability as the input information of BM algorithm,and the corresponding output relia-bility of estimated polynomial was accumulated as the rule of correct polynomial.In order to improve the estimation pre-cision,the candidate reliability-accumulated polynomial set were reduced by the characteristics of primitive polynomial in GF(2).The simulation results show that the proposed method is irrelevant with the tapped number of ator poly-nomial,and has a good estimation performance to estimate 17-order polynomials when the sequence BER is 18%.…”
Get full text
Article -
2074
Current methods for detecting and assessing HIV-1 antibody resistance
Published 2025-01-01“…In recent years, a variety of methods have been developed to detect, characterize and predict HIVAR. …”
Get full text
Article -
2075
The Circle Pure Rolling Method for Point Cloud Boundary Extraction
Published 2024-12-01“…We introduce a circle rolling method (CRM) for boundary extraction from 2D point clouds. …”
Get full text
Article -
2076
Review on the Method of Compensation Benefit Allocation for Cascade Hydropower Stations
Published 2020-01-01“…Under the model of cascade rolling development,there are significant compensation benefits in the joint operation of cascade hydropower stations.Scientific and reasonable allocation of compensation benefits becomes the key point to realize joint optimal operation of cascade hydropower stations.This paper first expounds the present situation and existing risk in cascade hydropower station operation management,specifies the compensation benefit types and principles for compensation benefit allocation,summarizes and analyzes the main methods and application examples of compensation benefit allocation of cascade hydropower stations,discusses the applicable conditions and advantages and disadvantages of various methods,analyzes the shortcomings in application examples through existing research,finally proposes the future research direction for allocation of compensation benefits of cascade hydropower stations,so as to provide the reference for sustainable development and utilization of river basin water resources.…”
Get full text
Article -
2077
High-order discontinuous Galerkin methods for the monodomain and bidomain models
Published 2024-12-01Subjects: “…discontinuous galerkin methods…”
Get full text
Article -
2078
Gibbets from the Middle Ages to Modern times. An interdisciplinary method
Published 2016-03-01Get full text
Article -
2079
Efficient segment pattern based method for malicious URL detection
Published 2015-11-01“…An efficient segment based method for detecting malicious URL was proposed.Firstly it analyzed the annotated malicious URLs in terms of three semantic segments,i.e.…”
Get full text
Article -
2080
Two-Stage Optimization Method for the Bearing Layout of Isolated Structure
Published 2021-01-01“…An integer programming method is adopted to optimize the number of each type of isolator. …”
Get full text
Article