Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
2241
Moral competence of dental students: an explanatory mixed-methods study
Published 2025-01-01Subjects: Get full text
Article -
2242
Study on Disease Mechanism and Theoretical Quantification Method of Tunnel Structure
Published 2019-01-01“…Compared with the diversity of tunnel disease detection methods, there are few studies on the methods of quantifying and evaluating the main structural diseases of the lining. …”
Get full text
Article -
2243
Extraction of Cattle Retinal Vascular Patterns with Different Segmentation Methods
Published 2024-12-01“…In Türkiye, the ear tagging method is widely used for animal identification. However, this traditional method has many significant disadvantages such as lost tags, the ability to copy and replicate tags, and negative impacts on animal welfare. …”
Get full text
Article -
2244
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
2245
Mechanical and Biochemical Methods for Rigor Measurement: Relationship with Eating Quality
Published 2019-01-01“…Accurate measurements of both the biochemical and mechanical characteristics that underpin muscle and its transformation into meat are key factors to an improved understanding of meat quality, but also this early-stage measurements may be useful to develop methods to predict final meat texture. It is the goal of this review to present the available research literature on the historical and contemporary analyses that could be applied in early postmortem stages (pre-rigor and rigor) to determine the biochemical and physical characteristics of the meat that can potentially impact the eating quality.…”
Get full text
Article -
2246
THE TA'LIQAT METHOD OF SHEIKH SULAIMAN ARRASULI ON THE TAFSIR JALALAIN
Published 2023-12-01“…This research applies a philology-based qualitative method in which manuscripts are the main source with related tafsir books as the research subject. …”
Get full text
Article -
2247
Scenario-Planning Method for Cost Estimation Using Morphological Analysis
Published 2019-01-01“…This study proposes a scenario-planning method that uses morphological analysis for the estimation of construction cost. …”
Get full text
Article -
2248
A FOUR-POINT EQUIVALENT METHOD OF THE BOLTED JOINTS STIFFNESS
Published 2017-01-01“…The experimental results show that this method is feasible.…”
Get full text
Article -
2249
Efficient diagnosis of diabetes mellitus using an improved ensemble method
Published 2025-01-01“…The second phase employed the same algorithms alongside sequential ensemble methods—XG Boost, AdaBoostM1, and Gradient Boosting—using an average voting algorithm for binary classification. …”
Get full text
Article -
2250
STUDY ON LOAD EQUIVALENT METHOD AND LOAD SPECTRUM OF THE BOOM OF LOADER
Published 2018-01-01“…Based on the measured load of the 5 t loader working device,the method of solving the load with the attitude change to the local coordinate system of the boom has been studied and the MATLAB software to write the corresponding data processing program has been sued to obtain the loader arm under the fixed attitude of the load time course. …”
Get full text
Article -
2251
Mathilde Arrivé, Le Primitivisme mélancolique d’Edward S. Curtis
Published 2020-02-01Get full text
Article -
2252
Performance evaluation of different estimation methods for missing rainfall data
Published 2016-09-01Subjects: Get full text
Article -
2253
An Easy-to-Understand Method to Construct Desired Distance-Like Measures
Published 2021-01-01“…This paper recommends in a plausible reasoning manner an easy-to-understand method to construct desired distance-like measures: to fuse easy-to-obtain (or easy to be coined by practitioners) pseudo-semi-metrics, pseudo-metrics, or metrics by making full use of well-known t-norms, t-conorms, aggregation operators, and similar operators (easy to be coined by practitioners). …”
Get full text
Article -
2254
Evolution-Operator-Based Single-Step Method for Image Processing
Published 2006-01-01“…<p>This work proposes an evolution-operator-based single-time-step method for image and signal processing. The key component of the proposed method is a local spectral evolution kernel (LSEK) that analytically integrates a class of evolution partial differential equations (PDEs). …”
Get full text
Article -
2255
INTERACTIVE PROMOTION INSTRUMENTS AS A TREND IN RETAIL COMMUNICATIONS SOLUTIONS
Published 2017-01-01Subjects: Get full text
Article -
2256
Pattern-Based Test Suite Reduction Method for Smart Contracts
Published 2025-01-01“…The article presents the test suite reduction method for smart contracts, which exploits the knowledge of their design manner. …”
Get full text
Article -
2257
A New Website Fingerprinting Method for Tor Hidden Service
Published 2025-01-01“…The experimental results show that compared with existing state-of-the-art techniques, the proposed method exhibits better performance in terms of key performance metrics.…”
Get full text
Article -
2258
Programmable data processing method and system design for polymorphic network
Published 2022-04-01“…Aiming at the problems of compatible with multiple route identification, network protocols and network application data processing faced by multimodal networks, a programmable data processing method compatible with multiple modes was proposed.Through the mode recognition and classify module to identify packets of different network modes, the data type, offset and length were used to represent multiple types of data, and the modal data processing pipeline was formed by using the matching action data table with selectable matching algorithm and processing action to process data of different types of network.A prototype system for data processing of polymorphic network was implemented and verified by using the proposed method.Experimental results show that the modal data processing pipeline can isolate the network of different modes and ensure the performance independence, the type of matching algorithm and the length of the processed data will affect the forwarding performance of the system, while the type of data will not.…”
Get full text
Article -
2259
New Spectrophotometric and Fluorimetric Methods for Determination of Fluoxetine in Pharmaceutical Formulations
Published 2009-01-01“…New simple and sensitive spectrophotometric and fluorimetric methods have been developed and validated for the determination of fluoxetine hydrochloride (FLX) in its pharmaceutical formulations. …”
Get full text
Article -
2260
Space frame structures in domestic design practice and their installation methods
Published 2024-07-01Subjects: Get full text
Article