Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
2301
Out-of-context misinformation detection method based on stance analysis
Published 2024-04-01“…Experimental results indicate that the incorporation of stance analysis significantly enhances the method's detection capabilities. Specifically, the accuracy of this method outperforms the state-of-the-art algorithm that employs Internet evidence for detection by 2.3%.…”
Get full text
Article -
2302
An Efficient Distributed Forensic System Based on Hadoop:Principle and Method
Published 2014-01-01Get full text
Article -
2303
Research on 5G MEC security assessment system and method
Published 2023-08-01“…Multi-access edge computing (MEC) is deployed at the edge of the network, enabling efficient and fast data processing in mobile networks, while also undertaking important security functions, making MEC a prime target for attackers.Therefore, MEC nodes will face huge security risks.How to accurately evaluate and quantify MEC security capabilities is an urgent issue to be solved.For accurately evaluating and quantifying MEC security capabilities, the MEC safety assessment system was proposed in combination with MEC safety risks.The assessment indicators selected in the assessment system comprehensively reflect the basic characteristics of MEC and its complete safety capability.Based on this evaluation system, the MEC security evaluation method was designed by using the analytic hierarchy process (AHP) and fuzzy evaluation, the MEC vulnerability scoring system was creatively proposed, and the evaluation indicators were provided based on the results of MEC vulnerability scoring system, the MEC security capability quantification value was finally calculated.The experimental result proves the effectiveness of the method.…”
Get full text
Article -
2304
Method to improve the performance of network time delay of EPA system
Published 2014-08-01“…In order to improve the performance of network-induced time delay of EPA (Ethernet for plant automation) networked control systems, the interacting mechanism between the control and the communication in EPA system was studied and EPA-CS (EPA cooperative scheduling) method was presented. Through setting their mutually cooperative time slices for function blocks that executed the control tasks and data transmission that executed the communication tasks, and through determining the executing time and frequencies of control tasks in their time slices, the method could accomplish the cooperation between control tasks and communication tasks in EPA system. …”
Get full text
Article -
2305
Families of (1,2)-symplectic metrics on full flag manifolds
Published 2002-01-01“…We obtain new families of (1,2)-symplectic invariant metrics on the full complex flag manifolds F(n). For n≥5, we characterize n−3 different n-dimensional families of (1,2)-symplectic invariant metrics on F(n). …”
Get full text
Article -
2306
On Coincidence Theorem in Intuitionistic Fuzzy b-Metric Spaces with Application
Published 2022-01-01“…The concept of intuitionistic fuzzy b-metric spaces (shortly, IFbMS) has been introduced and studied to generalize both the notion of intuitionistic fuzzy metric spaces and fuzzy b-metric spaces. …”
Get full text
Article -
2307
On Convergence of Fixed Points in G-Complete Fuzzy Metric Spaces
Published 2014-01-01“…We provide some results on the convergence of the sequence of fixed points for some different sequences of contraction mappings or fuzzy metrics in G-complete fuzzy metric spaces with the H-type t-norms. …”
Get full text
Article -
2308
Improvement of N-Acetylcysteine Loaded in PLGA Nanoparticles by Nanoprecipitation Method
Published 2018-01-01“…The results suggest that besides efficiently entrapping hydrophobic compounds, the nanoprecipitation method also has a high potential as an alternative entrapment method for hydrophilic compounds as well. …”
Get full text
Article -
2309
A Manual of Methods and Procedures for the Regional Waterway Management System
Published 2009-07-01“…TP-124, a 91-page illustrated manual by Robert Swett and David Fann, details the procedures that are necessary to complete a Regional Waterway Management System for Florida’s coastal canals and other waterways. …”
Get full text
Article -
2310
M-Polynomial and NM-Polynomial Methods for Topological Indices of Polymers
Published 2024-01-01“…This study addresses the limitations of conventional methods in dealing with dynamic molecular structures, focusing on the neighborhood M-polynomial (NM-polynomial), a pivotal polynomial for calculating degree-based TIs. …”
Get full text
Article -
2311
Algorithm for Calculating Statically Indeterminate Trusses Using the Force Method
Published 2024-12-01Subjects: Get full text
Article -
2312
Application Study of Sigmoid Regularization Method in Coke Quality Prediction
Published 2020-01-01“…A regularized network training method based on Sigmoid function is designed considering that redundancy of network structure may lead to the learning of undesired noise, in which weights having little impact on performance and leading to overfitting are removed in terms of computational complexity and training errors. …”
Get full text
Article -
2313
Boundedness of Commutators of Marcinkiewicz Integrals on Nonhomogeneous Metric Measure Spaces
Published 2015-01-01“…Let (X,d,μ) be a metric measure space satisfying the upper doubling condition and geometrically doubling condition in the sense of Hytönen. …”
Get full text
Article -
2314
User filtering based campus WLAN user clustering method
Published 2014-10-01“…With the widespread of smart terminals such as smart phones and smart pads,using MAC address as user identification in campus wireless local area network (WLAN) user clustering research cannot exactly represent user behavior.An user filtering based user clustering is proposed.This method filters users’ behavior data by their degree of activeness,and then further conducts clustering analysis of campus WLAN user behavior.The experimental result verifies the effectiveness of the proposed method.…”
Get full text
Article -
2315
A Novel Mesh Quality Improvement Method for Boundary Elements
Published 2012-01-01Get full text
Article -
2316
Hybrid Steepest-Descent Methods for Triple Hierarchical Variational Inequalities
Published 2015-01-01“…We introduce and analyze a relaxed iterative algorithm by combining Korpelevich’s extragradient method, hybrid steepest-descent method, and Mann’s iteration method. …”
Get full text
Article -
2317
MANAGEMENT OF THE PRODUCTION CAPACITY OF THE ENTERPRISE ON THE BASIS OF METHODS OF MATHEMATICAL PROGRAMMING
Published 2017-01-01Subjects: Get full text
Article -
2318
Different Methods for Measurements and Estimation of Pulse Wave Velocity are not Interchangeable
Published 2024-08-01“…Arterial stiffness has been measured in the office with SphygmoCor and 24 h with two oscillometric methods (Mobil-O-Graph and Arteriograph). ePWV was calculated using validated equation. …”
Get full text
Article -
2319
Research of the Method of Parameter Identification and Error Compensation of Industrial Robot
Published 2015-01-01“…Aiming at the lower absolute positioning accuracy of robot,the compensation method of establishing the robot kinematics error model through D- H method is put forward. …”
Get full text
Article -
2320
Evaluation method for network invulnerability based on shortest route number
Published 2009-01-01“…Fully connecting network has the best invulnerability,and also the shortest route numbers between nodes is important for network invulnerability.Therefore,by calculating shortest route numbers and comparing the topology dif-ference between target network and fully-connecting network,a method based on the shortest route numbers was pro-posed for evaluating network invulnerability.Further more,a method to evaluate node importance was proposed with it.The more the efficient shortest routes between one node and others,the more important the node was.Also,a method for calculating shortest way numbers between nodes was put forward because it is the key to evaluate model that is to calcu-late shortest route numbers.…”
Get full text
Article