Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
2141
Corrigendum to “Bolt Detection Signal Analysis Method Based on ICEEMD”
Published 2021-01-01Get full text
Article -
2142
BUILDING AN EFFECTIVE SYSTEM OF MANAGEMENT ACCOUNTING AT THE ENTERPRISES OF RETAIL TRADE
Published 2017-07-01Get full text
Article -
2143
Fuzzy Interpolation and Other Interpolation Methods Used in Robot Calibrations
Published 2012-01-01“…A novel interpolation algorithm, fuzzy interpolation, is presented and compared with other popular interpolation methods widely implemented in industrial robots calibrations and manufacturing applications. …”
Get full text
Article -
2144
RESEARCH ON MODELING METHOD OF EQUIVALENT TURNING FORCE MODEL (MT)
Published 2023-01-01Get full text
Article -
2145
RESEARCH ON ACCELERATED FATIGUE TESTING METHOD OF THE WORM AND GEAR TRANSMISSION
Published 2015-01-01“…This paper presented specific calculation method,and analyzed reliability and feasibility of accelerated fatigue of worm and gear.…”
Get full text
Article -
2146
IMPROVED FINITE ELEMENT TRANSFER MATRIX METHOD FOR STRUCTURAL DYNAMICS
Published 2015-01-01“…The finite element transfer matrix method provides an efficient means to solve complex engineering problems,the state vector of traditional finite element transfer matrix method usually include linear and angular displacement,resulting in solving the transient dynamic problems has a strong dependence on numerical method. …”
Get full text
Article -
2147
Benefits of the New Laboratory Methods of the Vigilance of the Health of Cienfuegos Population
Published 2015-03-01Get full text
Article -
2148
Coincidence Points of Weaker Contractions in Partially Ordered Metric Spaces
Published 2013-01-01“…We prove new coincidence point theorems for the -contractions and generalized Meir-Keeler-type --contractions in partially ordered metric spaces. Our results generalize many recent coincidence point theorems in the literature.…”
Get full text
Article -
2149
Automatic method for searching integral distinguishers of ARX block ciphers
Published 2018-05-01“…Firstly,based on three subsets division property propagation technique,the propagation function of the K-set and L-set of ARX block ciphers was constructed respectively.All vectors in L-set affected the propagation of K-set when propagate through xored round key operation.With SAT/SMT solver,round reduced integral propagation functions of ARX block ciphers could be established.Finally,by exhausting all possible input integral characteristics with proper data complexity,round reduced integral distinguishers of ARX block ciphers could be found.The proposed method can be used for searching integral distinguishers of ARX block ciphers including SIMON-like family block ciphers,HIGHT,SPECK family block ciphers and LEA effectively.…”
Get full text
Article -
2150
Clustering-based dynamic privacy preserving method for social networks
Published 2015-11-01“…Due to the dynamic characteristics of the social network graph structure,an effective dynamic privacy preserving method was needed.To solve the problems of the existing dynamic privacy preservation methods,such as attacker’s too little background knowledge and the low adaptability to the dynamic characteristics of graph structure,a clustering-based dynamic privacy preservation method was provided.The analysis shows that the proposed method can resist many kinds of background knowledge attacks and has good adaptability to the dynamic characteristics of the social network graph structure.…”
Get full text
Article -
2151
THz-SAR Vibrating Target Imaging via the Bayesian Method
Published 2017-01-01“…An improved algorithm based on an excellent Bayesian approach, that is, the expansion-compression variance-component (ExCoV) method, has been proposed for reconstructing scattering coefficients of vibrating targets, which provides more robust and efficient initialization and overcomes the deficiencies of sidelobes as well as artifacts arising from the traditional correlation method. …”
Get full text
Article -
2152
GDPR-oriented intelligent checking method of privacy policies compliance
Published 2023-12-01“…The implementation of the EU’s General Data Protection Regulation (GDPR) has resulted in the imposition of over 300 fines since its inception in 2018.These fines include significant penalties for prominent companies like Google, which were penalized for their failure to provide transparent and comprehensible privacy policies.The GDPR, known as the strictest data protection laws in history, has made companies worldwide more cautious when offering cross-border services, particularly to the European Union.The regulation's territorial scope stipulates that it applies to any company providing services to EU citizens, irrespective of their location.This implies that companies worldwide, including domestic enterprises, are required to ensure compliance with GDPR in their privacy policies, especially those involved in international operations.To meet this requirement, an intelligent detection method was introduced.Machine learning and automation technologies were utilized to automatically extract privacy policies from online service companies.The policies were converted into a standardized format with a hierarchical structure.Through natural language processing, the privacy policies were classified, allowing for the identification of relevant GDPR concepts.In addition, a constructed GDPR taxonomy was used in the detection mechanism to identify any missing concepts as required by GDPR.This approach facilitated intelligent detection of GDPR-oriented privacy policy compliance, providing support to domestic enterprises while they provided cross-border services to EU users.Analysis of the corpus samples reveals the current situation that mainstream online service companies generally fail to meet GDPR compliance requirements.…”
Get full text
Article -
2153
Machine Learning Methods for Forecasting Intermittent Tin Ore Production
Published 2024-10-01“…This study's findings show that a serial combination of the Random Forest classification method and CatBoost forecasting can produce accurate tin ore production forecasts for the selected CSD (RMSE = 0.271, MAE = 0.179, MAE = 0.730, F1-score = 0,80). …”
Get full text
Article -
2154
Two Symbol Expansion Methods and Their Application to Reversible Data Hiding
Published 2025-01-01“…This paper proposes two reversible data hiding methods that utilize symbolization of correlations between adjacent pixels: 1) Haar transform representation and 2) pixel concatenation. …”
Get full text
Article -
2155
Packet Reordering Metrics to Enable Performance Comparison in IP-Networks
Published 2020-01-01“…Despite the existence of several metrics to perform measurements on out-of-order packets, few works have used these metrics for comparative purposes. …”
Get full text
Article -
2156
Approximation method of multiple consistency constraint under differential privacy
Published 2021-06-01Subjects: Get full text
Article -
2157
Cyclic Mappings and Further Results in B-Metric-Like Spaces
Published 2021-01-01“…B-metric-like space is one of the generalized metric spaces; in fact, the research work in B-metric-like spaces is attractive. …”
Get full text
Article -
2158
A Novel Element Detection Method in Audio Sensor Networks
Published 2013-02-01“…The experiments demonstrate that our proposed method achieves better results compared to the state-of-the-art methods while using smaller online training sets.…”
Get full text
Article -
2159
Training methods for high-altitude acclimatization and its applications in military
Published 2025-01-01Get full text
Article -
2160
Density Formula in Malliavin Calculus by Using Stein’s Method and Diffusions
Published 2025-01-01Subjects: Get full text
Article