Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
2221
Detection and elimination method for deception jamming based on an antenna array
Published 2018-05-01“…Considering this, a detection and elimination method for deception jamming is proposed based on a specially designed array for the aircraft. …”
Get full text
Article -
2222
The SSIM index is not a metric and it is badly evaluate the similarity of images
Published 2019-08-01“…It acquired the status of an unofficial international standard for assessing image quality in the presence of a template, often referred to as the image quality metric. This article debunks some of the myths that have arisen around this index. …”
Get full text
Article -
2223
Spectral Analysis of Large Finite Element Problems by Optimization Methods
Published 1994-01-01“…Recently an efficient method for the solution of the partial symmetric eigenproblem (DACG, deflated-accelerated conjugate gradient) was developed, based on the conjugate gradient (CG) minimization of successive Rayleigh quotients over deflated subspaces of decreasing size. …”
Get full text
Article -
2224
Fault analysis on elliptic curve cryptosystems with sliding window method
Published 2012-01-01Subjects: Get full text
Article -
2225
Interaction based on method for spam detection in online social networks
Published 2015-07-01“…In online social networks,advertisements,rumors and malicious links are propagated by spammers arbitrarily.They not only disturb users’usualaccess,but also bring about network security threats and social panics.In an attempt to deal with the spam problems,an information diffusion model was proposed to capture the features of spam propagation.Propagation behaviors are quantitatively analyzed to detect spam messages with a decision tree-based method.The effectiveness of proposed detection model is evaluated with real data from the micro-bloggingnetwork of Sina.The experimental results show that proposed model can effectively detect spams in Sina micro-bloggingnetwork.…”
Get full text
Article -
2226
Hypernetwork link prediction method based on the SCL-CMM model
Published 2024-06-01“…An effective method for the internal interaction within modeling reality systems is provided by graphs; however, they have been unable to effectively display and capture the high-order heterogeneity that widely exists between multiple entities. …”
Get full text
Article -
2227
Computational Method for Global Sensitivity Analysis of Reactor Neutronic Parameters
Published 2012-01-01“…The method is illustrated and tested on a two-group cross-section dependent problem. …”
Get full text
Article -
2228
Nonuniformity Correction Method of Infrared Detector Based on Statistical Properties
Published 2024-01-01“…Experiments on simulated noisy and real images show that our method accurately eliminates nonuniform IR noise without causing blurring and provides optimal peak signal-to-noise ratio and structural similarity.…”
Get full text
Article -
2229
Research Progress on High-Intermediate Frequency Extension Methods of SEA
Published 2019-01-01“…To improve the basic theory of SEA and knowledge of intermediate frequency extension methods, as well as attract the attention of domestic scholars, this paper describes classical SEA and intermediate frequency extension methods. …”
Get full text
Article -
2230
Application of DEM Method to Analysis of Hydrological Features in the Water Basin
Published 2001-01-01Get full text
Article -
2231
Overhead Power Line Tension Estimation Method Using Accelerometers
Published 2025-01-01Get full text
Article -
2232
Mathematical model and its fast numerical method for the tumor growth
Published 2015-07-01Subjects: Get full text
Article -
2233
Malnutrition in Chronic Pancreatitis: Causes, Assessment Methods, and Therapeutic Management
Published 2020-01-01“…The aim of this review paper is recognized if we can improve the nutritional status of patients with CP. Methods. This paper is based on systematic literature review according to the PubMed. …”
Get full text
Article -
2234
An optimized method for counting viral particles using electron microscopy
Published 2019-05-01“…The method includes a concentration of viral particles on the polyethersulfone membrane applied in centrifugal concentrators and subsequent calculation using an electron microscope. …”
Get full text
Article -
2235
Equitable technology development: A framework and methods for scientists and engineers
Published 2025-06-01Subjects: Get full text
Article -
2236
Metrics for Evaluating Telemedicine in Randomized Controlled Trials: Scoping Review
Published 2025-01-01“…Furthermore, the specific metrics that can be used as cross-disciplinary indicators when comparing telemedicine and face-to-face care also remain undefined. …”
Get full text
Article -
2237
An Efficiency Control Method Based on SFSM for Massive Crowd Rendering
Published 2018-01-01“…This paper proposes a method of efficiency control for massive crowd rendering. …”
Get full text
Article -
2238
LDoS attack detection method based on simple statistical features
Published 2022-11-01“…Traditional low-rate denial of service (LDoS) attack detection methods were complex in feature extraction, high in computational cost, single in experimental data background settings, and outdated in attack scenarios, so it was difficult to meet the demand for LDoS attack detection in a real network environment.By studying the principle of LDoS attack and analyzing the features of LDoS attack traffic, a detection method of LDoS attack based on simple statistical features of network traffic was proposed.By using the simple statistical features of network traffic packets, the detection data sequence was constructed, the time correlation features of input samples were extracted by deep learning technology, and the LDoS attack judgment was made according to the difference between the reconstructed sequence and the original input sequence.Experimental results show that the proposed method can effectively detect the LDoS attack traffic in traffic and has strong adaptability to heterogeneous network traffic.…”
Get full text
Article -
2239
Fault Diagnosis Method of Gear based on Adaptive Demodulated Resonance
Published 2018-01-01“…Firstly,the original signal is decomposed into several IMFs,and the signal is reconstructed by using the correlation coefficient method to highlight the fault characteristic signal. …”
Get full text
Article -
2240
An Energy-Domain IR NUC Method Based on Unsupervised Learning
Published 2025-01-01“…To obtain accurate blackbody temperature, emissivity, and waveband measurements, an energy-domain infrared nonuniformity method based on unsupervised learning is proposed. …”
Get full text
Article