Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
2401
Node Importance Measurement Method in Heterogeneous Information Satellite Network
Published 2022-06-01Get full text
Article -
2402
Critique and Analysis of the Textbook “Comparative Education: Foundation, Principles and Methods”
Published 2017-11-01“…Writing and preparation of the book "Comparative Education: Foundation, Principles and Methods " shows a deliberate attempt to present this science with respect to its theoretical foundations and principles. …”
Get full text
Article -
2403
On Cyclic Generalized Weakly C-Contractions on Partial Metric Spaces
Published 2013-01-01“…We give new results of a cyclic generalized weakly C-contraction in partial metric space. The results of this paper extend, generalize, and improve some fixed point theorems in the literature.…”
Get full text
Article -
2404
An Approximate Quasi-Newton Bundle-Type Method for Nonsmooth Optimization
Published 2013-01-01“…In contrast with quasi-Newton bundle methods of Mifflin et al. (1998), we only assume that the values of the objective function and its subgradients are evaluated approximately, which makes the method easier to implement. …”
Get full text
Article -
2405
Video tamper detection method based on nonnegative tensor factorization
Published 2017-06-01“…The authenticity and integrity of video authentication is one of the important contents in information security field.A video tampering detection method based on non-negative tensor decomposition was proposed for video inter-frame tampering.First of all,spectral feature of video frame was extracted quickly.The video was described by a three-dimensional tensor which created by the main compression feature.The tensor was factorized by Tucker non-negative decomposition method and then the time dimension matrix was extracted to calculate correlation.Finally,the tampering position was determined by using the Chebyshev’s inequality.Experiments show that this method can detect the video inter-frame tampering quickly and robustly.…”
Get full text
Article -
2406
The comparison of post-proximal gastrectomy digestive tract reconstruction methods
Published 2025-01-01“…This study is to compare the performance of esophagogastrostomy (EG), jejunal interposition (JI), and double tract reconstruction (DTR) on post-PG reconstruction effectiveness. Methods A retrospective study was conducted using the clinical data of 94 PG patients who underwent digestive tract reconstruction by EG (37 patients), JI (29 patients) or DTR (28 patients). …”
Get full text
Article -
2407
Dynamic defense decision method for network real-time confrontation
Published 2019-12-01“…How to implement defense decision based on network external threat is the core problem of building network information defense system.Especially for the dynamic threat brought by real-time attack,scientific and effective defense decision is the key to construct network dynamic emergency defense system.Aiming at the problem of dynamic defense decision-making,firstly a network survivability game model based on attribute attack graph theory is designed.The attack and defense matrix is used to represent the attack and defense strategy and path,and the attack and defense strength and network survivability quantification method are given.Secondly,the single step and the multi-step attack and defense strategy payoff calculation method is proposed,and the defense decision is based on the attack and defensive strategy payoff.Finally,the effectiveness of the defense decision technology is verified through experiments.…”
Get full text
Article -
2408
Code vulnerability detection method based on graph neural network
Published 2021-06-01“…The schemes of using neural networks for vulnerability detection are mostly based on traditional natural language processing ideas, processing the code as array samples and ignoring the structural features in the code, which may omit possible vulnerabilities.A code vulnerability detection method based on graph neural network was proposed, which realized function-level code vulnerability detection through the control flow graph feature of the intermediate language.Firstly, the source code was compiled into an intermediate representation, and then the control flow graph containing structural information was extracted.At the same time, the word vector embedding algorithm was used to initialize the vector of basic block to extract the code semantic information.Then both of above were spliced to generate the graph structure sample data.The multilayer graph neural network model was trained and tested on graph structure data features.The open source vulnerability sample data set was used to generate test data to evaluate the method proposed.The results show that the method effectively improves the vulnerability detection ability.…”
Get full text
Article -
2409
Methods for prevention of acute post-endoscopic retrograde cholangiopancreatography pancreatitis
Published 2020-06-01“…This review provides a broader summary of pharmacological methods and techniques aimed at reducing the risk of PEP.…”
Get full text
Article -
2410
A Case-Based Reasoning Method for Remanufacturing Process Planning
Published 2014-01-01“…To assess the usefulness and practicality of the proposed method, an illustrative example is given and the results are discussed.…”
Get full text
Article -
2411
A Comparative Study of Regularization Method in Structure Load Identification
Published 2018-01-01“…The TSVD based on GCV method has more advantages than the Tikhonov based on L-curve method. …”
Get full text
Article -
2412
Cloud Resource Allocation Method Based on Elastic Resource Adjustment
Published 2014-11-01“…For cloud computing operating environment, cloud service providers leased cloud resources provider of resources, to provide the service to the user of the scene, taking the optimization of a cloud service provider costs, increase the operation profit as the goal, the design of the virtual machine resource allocation method for cost optimization was proposed. The method comprehensively considered the spot, appointment and on-demand resource allocation model, control factor was introduced to avoid the resource risk, the resource allocation scheme for the optimization of the cost was formulated. …”
Get full text
Article -
2413
Applied aspects of modern non-blind image deconvolution methods
Published 2024-08-01Subjects: Get full text
Article -
2414
RETRACTED: Determination of thermal stress and strain in plates by the direct method
Published 2024-01-01Get full text
Article -
2415
Prediction of Chloride Diffusion in Concrete Structure Using Meshless Methods
Published 2016-01-01“…The numerical simulation methods at present mainly involve finite element methods (FEM), which are based on mesh generation. …”
Get full text
Article -
2416
Image generation classification method based on convolution neural network
Published 2016-09-01“…Using convolution neural network which though convolution and pooling extracting features of high dis-tinguish ability and then make fusion for classification of natural images and scanned documents.Experimental re-sults show that the classification accuracy of the proposed classification method is more than 93% on the SKL image database.The model is highly robust to font sizes and image formats.Through contrast experiment validated that preprocessing of image has a positive effect on the accuracy of the model and the time cost on training.…”
Get full text
Article -
2417
APDL Modeling Method of Accurate Mesh Model of Helical Gear
Published 2017-01-01“…The results of numerical experiment show that the meshing solid model of helical gear generated by the presented method has a good geometric precision,which can guarantee that the simulation results is credible.…”
Get full text
Article -
2418
ESTIMATION METHOD OF LOAD SPECTRUM DISTRIBUTION BASED ON EM ALGORITHM
Published 2020-01-01Subjects: Get full text
Article -
2419
Application of Fuzzy theory to project scheduling with critical path method
Published 2013-07-01“…The results obtained using the present method is compared with those obtained using other methods used in literature…”
Get full text
Article -
2420
Assessing the influence of playing method on the outcome of basketball shooting ability
Published 2023-06-01Subjects: “…play method…”
Get full text
Article