Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
2681
Subarrayed Antenna Array Synthesis Using Ternary Adjusting Method
Published 2014-01-01“…Ternary adjusting method is proposed and combined with particle swarm optimization (PSO) algorithm for subarrayed antenna array synthesis. …”
Get full text
Article -
2682
A Simulation Accelerating Method Based on CUDA with Kepler GPU
Published 2015-10-01Subjects: Get full text
Article -
2683
RESULTS OF THE AUDIT OF CALCULATIONS WITH PERSONNEL ON PAYMENT IN THE ORGANIZATIONS OF RETAIL TRADE
Published 2018-06-01Get full text
Article -
2684
Computational Methods for Solving Linear Fuzzy Volterra Integral Equation
Published 2017-01-01“…However, according to comparison of these methods, we conclude that the variational iteration method provides more accurate results.…”
Get full text
Article -
2685
Cryopreservation Method for Preventing Freeze-Fracture of Small Muscle Samples
Published 2025-01-01“…This method decreased the occurrence of freeze-fractures by an order of magnitude, to ~4%, whereas the traditional method of cryopreservation resulted in ~56% freeze-fracturing.…”
Get full text
Article -
2686
THE PROBLEMS OF RETAIL ELECTRICITY MARKET COMPETITION DEVELOPMENT OF THE RUSSIAN FEDERATION
Published 2018-11-01Subjects: “…retail electricity market…”
Get full text
Article -
2687
Shortest-Way: An Improved Empirical Transition Method for Signal Coordination
Published 2017-01-01“…Four fundamental insights into transition methods are provided from the perspective of traffic engineers. …”
Get full text
Article -
2688
ABOUT THE APPROACH AND METHOD OF DETERMINING THE VALUE OF ROYALTIES FOR THE DEVELOPMENT OF MINERALS
Published 2019-10-01“…The author’s approach and the method of determining the value of royalties for the development of mineral resources have been explained in the article. …”
Get full text
Article -
2689
Research on unsupervised domain adaptive bearing fault diagnosis method
Published 2024-06-01“…Then, the feature distributions output of the source domain and the target domain were converged by the method of reversing labels in the generative adversarial network. …”
Get full text
Article -
2690
Optimizing low complexity encoding method for systematic polar code
Published 2018-07-01Get full text
Article -
2691
Uncertainty analysis of varying inertia estimation based on Bayesian method
Published 2025-04-01“…The Bayesian inertia estimation method (BIEM) is proposed to estimate power system varying inertia and quantify estimation uncertainty from a Bayesian statistical and modeling perspective. …”
Get full text
Article -
2692
Research on the backbone network cache method based on application-awareness
Published 2017-12-01“…Based on over 900 million HTTP requests from an ISP backbone network,the HTTP characteristic of different content types from a wide range of perspectives was analyzed,including request composition,size,popularity and temporal dynamics,and an application-aware backbone network cache method was proposed,referred to as AACM.The experiment results show that in the case of a slight increase in cache space,the hit ratio of the online-video increases 15%, and the total source traffic and cache I/O load reduced by about half.…”
Get full text
Article -
2693
Debt Brake: Putting the Potential Output Estimation Method to the Test
Published 2022-11-01“…Abstract The coalition agreement of the federal government states that there needs to be a review of the details of the debt brake, especially the rules for determining the production potential. …”
Get full text
Article -
2694
SDN security control and forwarding method based on cipher identification
Published 2018-02-01“…Aimed at the limited matching fields and the lack of effective data source authentication mechanism in the software defined networking (SDN),a SDN security control forwarding method based on cipher identification was proposed.First,the cipher identification was generated according to the user identity,file attributes or business content and other characteristics,and the data stream was marked by the cipher identification and signed with the private key based on the cipher identification.Then,when the data stream entered and left the network,the forwarding device verified its signature to ensure the authenticity of the data.At the same time,the cipher identification was designed as a matching item recognized by the forwarding device,and the network forwarding behavior was defined based on the cipher identification,so a fine-grained network control capability could be formed based on people,things,and business flow.Finally,the validity of the method is verified by experimental analysis.…”
Get full text
Article -
2695
Method of Prevent the for Years for a Change of Precision Punching Die
Published 2016-01-01“…The method and best heat treatment process to prevent the"for years for a change"of precision punching dies are presented. …”
Get full text
Article -
2696
Container escape detection method based on heterogeneous observation chain
Published 2023-01-01“…Aiming at the problem of high false negative rate in container escape detection technologies, a real-time detecting method of heterogeneous observation was proposed.Firstly, the container escape behavior utilizing kernel vulnerabilities was modeled, and the critical attributes of the process were selected as observation points.A heterogeneous observation method was proposed with “privilege escalation” as the detection criterion.Secondly, the kernel module was adopted to capture the attribute information of the process in real time, and the process provenance graph was constructed.The scale of the provenance graph was reduced through container boundary identification technology.Finally, a heterogeneous observation chain was built based on the process attribute information, and the prototype system HOC-Detector was implemented.The experiments show that HOC-Detector can successfully detect all container escapes using kernel vulnerabilities in the test dataset, and the increased runtime overhead is less than 0.8%.…”
Get full text
Article -
2697
Comparison of Predictive Control Methods for High Consumption Industrial Furnace
Published 2013-01-01Get full text
Article -
2698
Application of Local Fractional Homotopy Perturbation Method in Physical Problems
Published 2020-01-01“…It is difficult for nonlinear models to obtain the closed form of the solution, and in many cases, only an approximation of the real solution can be obtained. The perturbation method is a wave equation solution using HPM compared with the Fourier series method, and both methods results are good agreement. …”
Get full text
Article -
2699
Interrogating the Traditional Methods of Crime Control of the Alago Ethnic Group
Published 2022-11-01“… This study investigates the Alago traditional methods of crime control. The analysis in the research is predicated on social control theory as the theoretical based. …”
Get full text
Article -
2700
Pattern synthesis method for arbitrary arrays with desired mainloble response
Published 2014-09-01“…A pattern synthesis method based on adaptive array theory and convex optimization principle was proposed for arbitrary arrays,especially considering the influence of different orientation on array pattern.Firstly,the array pattern with special sideloble shape is obtained by adaptive array theory method; and then,the mainloble pointing to 0° is taken as reference to determine the pattern mainloble with variant steering angle.Finally,the optimal array pattern synthesis with desired mainloble response is converted to a second-order cone programming problem.The resulting optimization problem is nonconvex and is implemented via iterative algorithms of convex optimization,which can be solved using the second-order cone programming method at each iteration.Taking the method developed can obtain satisfied mainlobe response and less synthesized error in sideloble region.Theoretical analyses and simulation results show that the synthe-sized pattern has the same mainloble performance as the desired mainlabole in different orientation,and also the sideloble can maintain the shape to suppress the dynamic interference.…”
Get full text
Article