Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
2461
Financial phishing detection method based on sensitive characteristics of webpage
Published 2017-02-01“…The method matches number of sensitive text using multiple pattern matching algorithm AC_SC (AC suitable for Chinese). …”
Get full text
Article -
2462
A Service Recommendation Method Based on Requirements for the Cloud Environment
Published 2021-01-01“…Compared to the traditional collaborative filtering method and the deviation-based method, our method improves the recommendation accuracy without lowering the efficiency.…”
Get full text
Article -
2463
Using linguistic, psychosemantic and psychological analysis method in applied research
Published 2016-06-01Subjects: “…method…”
Get full text
Article -
2464
The introduction of the metric system of weights and measures in the Omsk district in the 1920s
Published 2024-05-01Subjects: Get full text
Article -
2465
Advances in MS-Based Analytical Methods: Innovations and Future Trends
Published 2018-01-01“…Journal of Analytical Methods in Chemistry…”
Get full text
Article -
2466
Method of botnet network nodes detection base on communication similarity
Published 2018-10-01“…At present,the botnet detection method mostly relies on the analysis of the network communication activity or the communication content.The former carries on the statistical analysis to the characteristic of the data flow,does not involve the content in the data flow,has the strong superiority in the detection encryption type aspect,but the accuracy is low.The latter relies on the prior knowledge to examine,has the strong accuracy,but the generality of detection is low.The communication similarity was defined according to Jaccard similarity coefficient,and a method of calculating communication similarity based on user request DNS (domain name system) was proposed,which was used for botnet node detection based on network traffic.Finally,based on the spark framework,the experimental results show that the proposed method can be used in the detection of botnet nodes effectively.…”
Get full text
Article -
2467
C-SHAP: A Hybrid Method for Fast and Efficient Interpretability
Published 2025-01-01“…To address this, we introduce C-SHAP (Clustering-Boosted SHAP), a hybrid method that combines SHAP with K-means clustering to reduce execution times significantly while preserving interpretability. …”
Get full text
Article -
2468
The Mixed Type Splitting Methods for Solving Fuzzy Linear Systems
Published 2014-01-01Get full text
Article -
2469
Quantitative method for network security situation based on attack prediction
Published 2017-10-01“…To predict the attack behaviors accurately and comprehensively as well as to quantify the threat of attack,a quantitative method for network security situation based on attack prediction was proposed.By fusing the situation factors of attacker,defender and network environment,the capability of attacker and the exploitability rate of vulnerability were evaluated utilizing the real-time detected attack events,and the expected time-cost for attack-defense were further calculated.Then an attack prediction algorithm based on the dynamic Bayesian attack graph was designed to infer the follow-up attack actions.At last,the attack threat was quantified as the security risk situation from two levels of the hosts and the overall network.Experimental analysis indicates that the proposed method is suitable for the real adversarial network environment,and is able to predict the occurrence time of attack accurately and quantify the attack threat reasonably.…”
Get full text
Article -
2470
Research on the rapid diagnosis method for hunting of high-speed trains
Published 2025-02-01“…On this basis, an effective diagnostic method has been proposed. With a focus on practical engineering applications, a rapid screening index for identifying potential issues has been proposed, significantly enhancing the efficiency of diagnostic processes.…”
Get full text
Article -
2471
Preparation and Properties of Sodium Carboxymethyl Cellulose Microspheres by Dropping Method
Published 2025-01-01Get full text
Article -
2472
Air quality investigation using functional data analysis methods
Published 2023-11-01Get full text
Article -
2473
Successful Management of Immune Thrombocytopenia Presenting with Lethal Alveolar Hemorrhage
Published 2019-01-01“…However, there is little evidence for the utilization of this treatment for acute ITP or acute exacerbation of chronic ITP. We report the case details of three elderly ITP patients presenting with lethal diffuse alveolar hemorrhage. …”
Get full text
Article -
2474
An Interpretable Prediction Method for Tobacco Drying Process Based on CGTNN
Published 2025-01-01Get full text
Article -
2475
A New Method for Predicting Non‐Recurrent Geomagnetic Storms
Published 2023-08-01“…This study proposes a new method that includes the spectral whitening method and CEEMDAN‐CWT for predicting non‐recurrent geomagnetic storms. …”
Get full text
Article -
2476
Building method of distributed COW disk on network computing environment
Published 2012-07-01Get full text
Article -
2477
Comparison of different methods for identification of meat species in meat products
Get full text
Article -
2478
APPLICATION OF SPECIAL IRONS, PRODUCED BY METHOD OF FROSTING, FOR FRICTIONS OF CLUTCHES
Published 2009-08-01Get full text
Article -
2479
Application of an Improved TF-IDF Method in Literary Text Classification
Published 2022-01-01“…With the purpose of classifying the literary texts in this study, this work proposes an improved IDF method for the problem of feature words appearing several times and having diverse meanings in different fields. …”
Get full text
Article -
2480
The First Integral Method to the Nonlinear Schrodinger Equations in Higher Dimensions
Published 2013-01-01“…This method provides polynomial first integrals for autonomous planar systems. …”
Get full text
Article