Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
2081
Penser le corps-marchandise avec Alfred Sohn-Rethel
Published 2020-07-01Subjects: “…Sohn-Rethel…”
Get full text
Article -
2082
Research of nonparametric density estimation algorithms by applying clustering methods
Published 2023-09-01Subjects: Get full text
Article -
2083
Spectrophotometric Method for the Determination of Carboxin in its Formulations and Environmental Samples
Published 2011-01-01“…Simple, precise, rapid, sensitive and accurate spectrophotometric methods have been developed for the estimation of carboxin in pure form and in its formulations. …”
Get full text
Article -
2084
Active deception defense method based on dynamic camouflage network
Published 2020-02-01“…In view of the problem that the existing honeypots often fail to resist the penetration attack due to the lack of confidentiality,an active deception defense method based on dynamic camouflage network (DCN) was presented.The definition of DCN was given firstly,and then the attacker-defender scenario of active deception based on DCN was described.Next,the interaction process of the attacker-defender scenario was modeled by using a signaling game,whose equilibrium can guide the selection of optimal deception strategy.Furthermore,to quantify the payoffs accurately,the two-layer threat penetration graph (TLTPG) was introduced.Finally,the solution for game equilibrium was designed,through which pure strategy and mixed strategy could be calculated simultaneously.The experimental results show that,based on the dynamic camouflage network,the perfect Bayesian equilibrium can provide effective guidance for the defender to implement the optimal defense strategy and maximize the benefits of the defender.In addition,the characteristics and rules of active deception defense DCN-based are summarized.…”
Get full text
Article -
2085
Methods of Forming Orthogonal Components of Input Signals for Relay Protection
Published 2019-02-01“…One of the more popular methods and the proposed method acted as the formers of orthogonal components under study. …”
Get full text
Article -
2086
Estimation level of public welfare on the basis of methods of intellectual analysis
Published 2020-07-01“…The aim of the work is to develop the mathematical model for measuring the welfare of Ukraine using methods of intellectual analysis, namely, the theory of fuzzy sets. …”
Get full text
Article -
2087
Immediate results of aortic valve reconstruction using Ozaki method
Published 2018-06-01“…The aim – to evaluate the immediate results of reconstruction of the aortic valve using Ozaki method, to analyze the most important aspects of perioperative management of these patients. …”
Get full text
Article -
2088
Thinking of Method for Judging the Cost Price in Bidding of Project Construction
Published 2004-01-01Get full text
Article -
2089
Objects outline delineation by nonliniear filtration methods for boundary pixels
Published 2022-12-01“…This affects exist between methods of redefining border pixels and algorithms of outline objects segmentation: Sharra, Pruitta, Sobel. …”
Get full text
Article -
2090
Note on the Solution of Transport Equation by Tau Method and Walsh Functions
Published 2010-01-01“…We also present Tau method, and it was proved that it is a good approximate to exact solutions. …”
Get full text
Article -
2091
Enrichment and Separation of Methane Gas by Vacuum Pressure Swing Adsorption
Published 2021-01-01“…In China, owing to the methane concentration being below 0.75%, the coal ventilation air methane (CVAM) is usually emitted directly into the atmosphere, rather than utilized, which not only causes huge waste of energy but also exerts potential hazards to the greenhouse effect. …”
Get full text
Article -
2092
A Parameterized Method for Air-Quality Diagnosis and Its Applications
Published 2012-01-01“…A parameterized method is developed to diagnose the air quality in Beijing and other cities with an index termed (parameters linking air-quality to meteorological elements PLAM) derived from a correlation between PM10 and relevant weather elements based on the data between 2000 and 2007. …”
Get full text
Article -
2093
Research on Three-Dimensional Extension of Barzilai-Borwein-like Method
Published 2025-01-01“…The Barzilai-Borwein (BB) method usually uses BB stepsize for iteration so as to eliminate the line search step in the steepest descent method. …”
Get full text
Article -
2094
Applicability of Annual Runoff Interpolation and Extension Method in a Reservoir
Published 2023-01-01Get full text
Article -
2095
The methods of treatment of atrial fibrillation in patients with valvular heart disease
Published 2019-03-01“…The article presents literature data on the methods of treatment of atrial fibrillation in patients with valvular heart disease. …”
Get full text
Article -
2096
Modified Sinc-Galerkin Method for Nonlinear Boundary Value Problems
Published 2013-01-01“…This paper presents a modified Galerkin method based on sinc basis functions to numerically solve nonlinear boundary value problems. …”
Get full text
Article -
2097
Adversarial examples detection method based on boundary values invariants
Published 2020-02-01“…Nowadays,deep learning has become one of the most widely studied and applied technologies in the computer field.Deep neural networks(DNNs) have achieved greatly noticeable success in many applications such as image recognition,speech,self-driving and text translation.However,deep neural networks are vulnerable to adversarial examples that are generated by perturbing correctly classified inputs to cause DNN modes to misbehave.A boundary check method based on traditional programs by fitting the distribution to find the invariants in the deep neural network was proposed and it use the invariants to detect adversarial examples.The selection of training sets was irrelevant to adversarial examples.The experiment results show that proposed method can effectively detect the current adversarial example attacks on LeNet,vgg19 model,Mnist,Cifar10 dataset,and has a low false positive rate.…”
Get full text
Article -
2098
Error Analysis and Numeric Simulation Research of Parallel Seismic Method
Published 2022-01-01“…The parallel seismic method is an effective method to detect the length of pile. …”
Get full text
Article -
2099
Validation of a New Cognitive Screening Method for Stroke Patients
Published 2019-01-01“…Methods. We analyzed new cognitive screening method concurrent validity by comparing it in two groups formed on the basis of a comprehensive neuropsychological examination for 77 stroke patients. …”
Get full text
Article -
2100
Bayesian Q learning method with Dyna architecture and prioritized sweeping
Published 2013-11-01“…In order to balance this trade-off, a probability distribution was used in Bayesian Q learning method to de-scribe the uncertainty of the Q value and choose actions with this distribution. …”
Get full text
Article