Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
2661
Methods to Evaluate Peanut Maturity for Optimal Seed Quality and Yield
Published 2016-11-01“…This 8-page fact sheet discusses maturity assessment methods as well as steps for collecting and evaluating a maturity sample. …”
Get full text
Article -
2662
Simulation on the Self-Compacting Concrete by an Enhanced Lagrangian Particle Method
Published 2016-01-01“…The capability and results obtained from this method are discussed.…”
Get full text
Article -
2663
Application of Learning Analytics in Higher Education: Datasets, Methods and Tools
Published 2024-06-01“…The accumulation of big educational data on the platforms of universities and social media leads to the need to develop tools for extracting regularities from educational data, which can be used for understanding the behavioral patterns of students and teachers, improve teaching methods and the quality of the educational process, as well as form sound strategies and policies for universities development. …”
Get full text
Article -
2664
Evaluation of Bias in the Measurement of Condensable Particulate Matter with Method 202
Published 2020-08-01Subjects: Get full text
Article -
2665
Understanding of Applocation of 4-AAP Method to Volatile Phenol Measurement
Published 2002-01-01Get full text
Article -
2666
Research of Automobile Transmission Shaft based on Finite Element Method
Published 2016-01-01“…In order to improve the reliability and rationality of a automobile transmission shaft design,the free modal,torsional stiffness,static strength and fatigue strength of a transmission shaft are analyzed based on the finite element method. The result shows that the first-order natural frequency is 15% higher than the excitation frequency,so the resonance will be effectively avoided. …”
Get full text
Article -
2667
Methods of Collecting User Data in the Process of Building Commercial Website
Published 2012-06-01“…The presented methods are different as regards such criteria as: research type, stage of Website building, method goal, and advantages of the method.…”
Get full text
Article -
2668
Expanding the frontiers of electrocatalysis: advanced theoretical methods for water splitting
Published 2025-01-01“…The development of efficient and cost-effective electrocatalysts is crucial for advancing this technology, especially given the reliance on expensive transition metals, such as Pt and Ir, in traditional catalysts. …”
Get full text
Article -
2669
Passive Initialization Method Based on Motion Characteristics for Monocular SLAM
Published 2019-01-01“…Visual SLAM techniques have proven to be effective methods for estimating robust position and attitude in the field of robotics. …”
Get full text
Article -
2670
Method of constructing an anonymous graph based on information loss estimation
Published 2016-06-01“…A potential attack based on degree information by re-identifying target vertexes from a sequence of published graphs was analyzed.To deal with this kind of attack,a k-anonymous graph stream constructing method based on information loss estimation was provided.Information loss caused by re-constructing graph was controlled by using the method of attributes generalization of nodes and the structure generalization of sub-graph.The disturbance in sub-graph was forbidden to prevent the attack.The method of measuring the information loss of nodes and structures during the anonymous process due to re-construction of graph was defined.A k-anonymity cluster algorithm based on greedy clustering algorithm was build,which realized anonymous partition according to the information loss.Finally,a method of constructing anonymous social network for the evolving social network with the least information loss was provided.The experiments on medical diagnostic data set show that the algorithm of constructing anonymous graph based on the information loss estimation can be used to control the loss of information.…”
Get full text
Article -
2671
Software diversity evaluating method based on gadget feature analysis
Published 2023-06-01“…Software diversity is commonly utilized in scenarios such as software distribution and operating systems to improves system resilience and security.However, existing software diversity evaluation methods are typically based on conventional code features and are relatively limited in scope, which can make it difficult to accurately reflect the security benefits of software diversity.To address this issue, a software diversity evaluation method was proposed from the perspective of ROP attack by analyzing the impact of software diversity on the difficulty of building a gadget attack chain, the attacker’s potentially available computing power, and the attacker’s cost of searching for gadgets in different variants.Metrics for the quality, practicability, and distribution of gadgets were integrated into this method.Testing was conducted using diversity technologies with different granularity.The evaluation results showed that the proposed method could accurately and comprehensively reflect the security gain brought by software diversity.It was observed that software diversity could relocate/modify/delete a large number of gadgets in the software, increasing the cost of attacking different software variants but also leading to different degrees of software expansion.Finally, an analysis and discussion of the advantages and disadvantages of existing diversity techniques were conducted based on the experimental results.…”
Get full text
Article -
2672
Least Square Homotopy Perturbation Method for Ordinary Differential Equations
Published 2021-01-01“…In this study, a new modification of the homotopy perturbation method (HPM) is introduced for various order boundary value problems (BVPs). …”
Get full text
Article -
2673
Life cycle cost-effectiveness estimation and optimization method for satellite
Published 2025-02-01“…In order to design satellite with low cost and high effectiveness, an optimization method of life cycle cost-effectiveness for satellites is proposed in this paper. …”
Get full text
Article -
2674
Secure data collection method of WSN based on mobile Sink
Published 2021-02-01“…At present, WSN data collection method based on mobile Sink has some problems, such as low detection rate of network attack and large memory cost, which makes the network vulnerable to network attack and difficult to be applied in practice.To solve this problem, a secure data collection WSN method of WSN based on mobile Sink was proposed, which used convex hull algorithm of energy perception to identify data collection points, used elliptic encryption algorithm (ECC) to generate key for all nodes in the network, used ElGamal algorithm to realize node identity and message authentication, and used support vector machine (SVM) to identify network attack types.The simulation results show that the proposed secure data collection method has good performance in attack detection rate, memory overhead and packet delivery rate.…”
Get full text
Article -
2675
Improvement in Analytical Methods for Determination of Sugars in Fermented Alcoholic Beverages
Published 2018-01-01“…Journal of Analytical Methods in Chemistry…”
Get full text
Article -
2676
Durability method on corrosion fatigue performance of AH 32 steel
Published 2019-04-01Subjects: “…Durability method…”
Get full text
Article -
2677
Role of radiological methods of diagnostics at simultaneous pancreas-kidney transplantation
Published 2015-12-01“…To characterize radiological methods of diagnostics of surgical complications after simultateous pankreas-kidney transplantation (SPKT).Material and methods. …”
Get full text
Article -
2678
An Algebraic Method on the Eigenvalues and Stability of Delayed Reaction-Diffusion Systems
Published 2013-01-01“…The eigenvalues and stability of the delayed reaction-diffusion systems are considered using the algebraic methods. Firstly, new algebraic criteria to determine the pure imaginary eigenvalues are derived by applying the matrix pencil and the linear operator methods. …”
Get full text
Article -
2679
New method of text representation model based on neural network
Published 2017-04-01“…Method of text representation model was proposed to extract word-embedding from text feature.Firstly,the word-embedding of the dual word-embedding list based on dictionary index and the corresponding part of speech index was created.Then,feature vectors was obtained further from these extracted word-embeddings by using Bi-LSTM recurrent neural network.Finally,the sentence vectors were processed by mean-pooling layer and text categorization was classified by softmax layer.The training effects and extraction performance of the combination model of Bi-LSTM and double word-embedding neural network were verified.The experimental results show that this model not only performs well in dealing with the high-quality text feature vector and the expression sequence,but also significantly outperforms other three kinds of neural networks,which includes LSTM,LSTM+context window and Bi-LSTM.…”
Get full text
Article -
2680
A Class of Steffensen-Type Iterative Methods for Nonlinear Systems
Published 2014-01-01“…By considering a frozen Jacobian, we provide a class of m-step methods with order of convergence m+1. A new method named as Steffensen-Schulz scheme is also contributed. …”
Get full text
Article