Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
2181
Method to generate attack graphs for assessing the overall security of networks
Published 2009-01-01“…In order to evaluate the overall security of networks, a new method for generating attack graphs was proposed.The method used breadth-first algorithm to search the dependence of network vulnerabilities.To solve the state explosion problem, the strategies that limited the number of attack steps and the reachability of state nodes were adopted in gener-ating attack graphs.The experimental results show that the generated attack graphs can help security administrators to evaluate the overall security of networks, and the adopted optimization strategies are effective to remove redundant edges and nodes in attack graphs and decrease the system overhead during generating attack graphs.…”
Get full text
Article -
2182
Exact Group Sequential Methods for Estimating a Binomial Proportion
Published 2013-01-01“…We first review existing sequential methods for estimating a binomial proportion. Afterward, we propose a new family of group sequential sampling schemes for estimating a binomial proportion with prescribed margin of error and confidence level. …”
Get full text
Article -
2183
Application of Ion-selective Electrode Method to Measuring Fluorides in Water
Published 2009-01-01Get full text
Article -
2184
A remark on the metric dimension in Riemannian manifolds of constant curvature
Published 2025-02-01Subjects: “…metric dimension…”
Get full text
Article -
2185
Adaptive user behavior's evaluation method based on network status
Published 2013-07-01“…This method can construct and dynamically adjust the evaluation indexes and their weight adaptive the actual data. …”
Get full text
Article -
2186
On iterative solution of nonlinear functional equations in a metric space
Published 1983-01-01“…Given that A and P as nonlinear onto and into self-mappings of a complete metric space R, we offer here a constructive proof of the existence of the unique solution of the operator equation Au=Pu, where u∈R, by considering the iterative sequence Aun+1=Pun (u0 prechosen, n=0,1,2,…). …”
Get full text
Article -
2187
A NEW FAILURE PROBABILITY COMPUTING METHOD FOR MECHANICAL COMPONENTS
Published 2020-01-01“…Based on univariate dimension reduction method( UDRM),edgeworth series and the relation of statistical moment,a method for calculation of failure probability of mechanical components is proposed. …”
Get full text
Article -
2188
Study on Vibration Reduction Method by Gear Staggering Phase Tuning
Published 2023-08-01Subjects: Get full text
Article -
2189
ANALYZING THE CRITERIA AFFECTING TRANSITION TO AIRPLANE BY COMPARING DIFFERENT METHODS
Published 2022-07-01“…This study is important since it compares three different methods for the purpose of criteria determination concerning the choice of transportation modes.…”
Get full text
Article -
2190
Research on networking troubleshooting method based on software defined network
Published 2016-12-01“…Based on the reaserch status of networking troubleshooting in software defined network,a new net-working troubleshooting method was proposed.A TCP packet marked in head field was sent and detailed forward information in every hop would be written in its data filed once the test packet was matched.Taking advantages of the programmable feature of the controller and OpenFlow extensible match,special flow table was designed for matching test-used packet.The analysis module extracted and split the forward information,and thus printed the suspicious network problem which can be used to track and located the problematic network node.The experiment results indicate that the proposed method is fairy efficient.…”
Get full text
Article -
2191
Method for Monitoring the Stator Core of a Powerful Turbo Generator
Published 2021-07-01“…The article is devoted to the development of an automatic method and device for monitoring the pressing of the stator core of a powerful turbo generator during its assembling at the manufacturer. …”
Get full text
Article -
2192
Padé-Sumudu-Adomian Decomposition Method for Nonlinear Schrödinger Equation
Published 2021-01-01“…The main purpose of this paper is to solve the nonlinear Schrödinger equation using some suitable analytical and numerical methods such as Sumudu transform, Adomian Decomposition Method (ADM), and Padé approximation technique. …”
Get full text
Article -
2193
Lean and eco-efficient method for evaluating the potency of tinidazole in tablets
Published 2024-12-01Subjects: “…microbiological method…”
Get full text
Article -
2194
The Referenced Vertex Ordering Problem: Theory, Applications, and Solution Methods
Published 2021-08-01“…Our branch-and-bound outperforms other existing solution methods: among 180 instances with 60 vertices, it solves 179 instances to optimality whereas the best existing method is only able to solve 109 of them. …”
Get full text
Article -
2195
-
2196
Wardowski Type Contractions and the Fixed-Circle Problem on S-Metric Spaces
Published 2018-01-01“…In this paper, we present new fixed-circle theorems for self-mappings on an S-metric space using some Wardowski type contractions, ψ-contractive, and weakly ψ-contractive self-mappings. …”
Get full text
Article -
2197
Action recognition method based on fusion of skeleton and apparent features
Published 2022-01-01“…Focusing on the issue that traditional skeletal feature-based action recognition algorithms were not easy to distinguish similar actions, an action recognition method based on the fusion of deep joints and manual apparent features was considered.The joint spatial position and constraints was firstly input into the long short-term memory (LSTM) model equipped with spatio-temporal attention mechanism to acquire spatio-temporal weighted and highly separable deep joint features.After that, heat maps were introduced to locate the key frames and joints, and manually extract the apparent features around the key joints that could be considered as an effective complement to the deep joint features.Finally, the apparent features and the deep skeleton features could be fused frame by frame to achieve effectively discriminating similar actions.Simulation results show that, compared with the state-of-the-art action recognition methods, the proposed method can distinguish similar actions effectively and then the accuracy of action recognition is promoted rather obviously.…”
Get full text
Article -
2198
A Method Calculating the Volume of Excavation and Filling of Large Canal
Published 2000-01-01Get full text
Article -
2199
SIMPLIFIED MEASUREING METHODS OF STRESSED-DEFORMED STATE OF AN EXPANDABLE SHELTER
Published 2015-04-01Get full text
Article -
2200
STUDY AND APPLICATIONS OF DETECTION METHOD FOR MACHINING QUALITY OF HELICAL SURFACE
Published 2017-01-01Subjects: Get full text
Article