Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
2741
Climatic Zoning of Khuzestan Province Based on Litten Ski Method
Published 2022-03-01“…The purpose of this study is to classify the climate of Khuzestan province based on litany-skiing method. The litany-skiing method uses the three basic elements of temperature, precipitation and coefficient. …”
Get full text
Article -
2742
Up-to-date methods of stomach functions investigation and their diagnostic potentials
Published 2011-09-01Subjects: Get full text
Article -
2743
Generalized Runge-Kutta Method with respect to the Non-Newtonian Calculus
Published 2015-01-01“…Theory and applications of non-Newtonian calculus have been evolving rapidly over the recent years. As numerical methods have a wide range of applications in science and engineering, the idea of the design of such numerical methods based on non-Newtonian calculus is self-evident. …”
Get full text
Article -
2744
Analytical Comparison of Stop Word Recognition Methods in Persian Texts
Published 2025-01-01“…Our findings indicate that the FastText-based approach outperformed the others with a detection accuracy of 96.98, suggesting that this method can lead to the development of an automatic, reliable, and efficient system.…”
Get full text
Article -
2745
Joint channel and impulsive noise estimation method for OFDM systems
Published 2018-03-01“…Aiming at the impulsive noise occurring in OFDM systems,an impulsive noise mitigation algorithm based on compressed sensing theory was proposed.The proposed algorithm firstly treated the channel impulse response and the impulsive noise as a joint sparse vector by exploiting the sparsity of both them.Then the sparse Bayesian learning framework was adopted to jointly estimate the channel impulse response,the impulsive noise and the data symbols,in which the data symbols were regarded as unknown parameters.Compared with the existing impulsive noise mitigation methods,the proposed algorithm not only utilized all subcarriers but also did not use any a priori information of the channel and impulsive noise.The simulation results show that the proposed algorithm achieves significant improvement on the channel estimation and bit error rate performance.…”
Get full text
Article -
2746
The “Hand-as-Foot” teaching method in the cervical lymph-node partitioning
Published 2025-02-01Get full text
Article -
2747
Safe hierarchical virtual network mapping method based on clustering
Published 2021-09-01“…Based on the 5G network environment, a security hierarchical virtual network mapping method based on K-means clustering was proposed.In particular, the idea of node security classification and the combination of K-menas clustering algorithm was involved to solve the key problems of low security and low mapping efficiency existing in current virtual network mapping.Compared with traditional methods, this research method improves the efficiency of virtual node mapping and enhances the network resilience.…”
Get full text
Article -
2748
Research on switch migration method based on minimum cost path
Published 2020-02-01Get full text
Article -
2749
Critical analysis of methods for measuring and monitoring of the population life quality
Published 2022-01-01“…Global, subnational and national quality of life assessment methods in relation to measurement tools have been compared and a comparative analysis has been presented in a summary graph.The author’s classification of quality of life management approaches has been presented. …”
Get full text
Article -
2750
Image inpainting forensics method based on dual branch network
Published 2022-12-01“…Image inpainting is a technique that uses information from known areas of an image to repair missing or damaged areas of the image.Image editing software based on it has made it easy to edit and modify the content of digital images without any specialized foundation.When image inpainting techniques are used to maliciously remove the content of an image, it will cause confidence crisis on the real image.Current researches in image inpainting forensics can only effectively detect a certain type of image inpainting.To address this problem, a passive forensic method for image inpainting was proposed, which is based on a two-branch network.The high-pass filtered convolutional network in the dual branch first used a set of high-pass filters to attenuate the low-frequency components in the image.Then features were extracted using four residual blocks, and two transposed convolutions were performed with 4x up-sampling to zoom in on the feature map.And thereafter a 5×5 convolution was used to attenuate the tessellation artifacts from the transposed convolutions to generate a discriminative feature map on the high-frequency components of the image.The dual-attention feature fusion branch in the dual branch first added a local binary pattern feature map to the image using a preprocessing block.Then the dual-attention convolution block was used to adaptively integrate the image’s local features and global dependencies to capture the differences in content and texture between the inpainted and pristine regions of the image.Additionally, the features extracted from the dual-attention convolution block were fused, and the feature maps were up-sampled identically to generate the discriminative image content and texture on the feature maps.The extensive experimental results show the proposed method improved the F1 score by 2.05% and the Intersection over Union(IoU) by 3.53% for the exemplar-based method and by 1.06% and 1.22% for the deep-learning-based method in detecting the inpainted region of the removed object.Visualization of the results shows that the edges of the removed objects can be accurately located on the detected inpainted area.…”
Get full text
Article -
2751
Explicit Solution of Telegraph Equation Based on Reproducing Kernel Method
Published 2012-01-01“…We propose a reproducing kernel method for solving the telegraph equation with initial conditions based on the reproducing kernel theory. …”
Get full text
Article -
2752
CS-based data collection method for airborne clustering WSN
Published 2015-05-01“…A data acquisition scheme which was suitable for airborne clustering WSN was proposed.On the one hand,this scheme adopts the random compressive sampling could reduce the amount of sampling data of the cluster nodes ef-fectively,and greatly reducing the hardware requirements of the cluster nodes; on the other hand,put forward a MP re-construction method based on composite chaotic-genetic algorithm expressly,which combined the excellent local searching characteristics of chaos theory with the powerful global search ability of genetic algorithm,could improve the signal reconstruction performance of the cluster head or Sink effectively.The experimental results show that,by dimin-ishing the sampling frequency to 1/8 of the original sampling frequency,this random compressive sensing scheme can dramatically reduce the sampling quantity,and the reconstruction precision can reach 10<sup>-7</sup>magnitude.This random com-pressive sensing scheme provides a useful idea for practical WSN.…”
Get full text
Article -
2753
Cross-language refactoring detection method based on edit sequence
Published 2024-12-01“…Aiming at the problems of unreliable commit message caused by developers not consistently recording refactoring operations, and language singularityin deep learning-based refactoring detection methods, a cross-language refactoring detection method RefCode was proposed. …”
Get full text
Article -
2754
Methods for preliminary determination of pemetrexed in macromolecular drug-carrier systems
Published 2016-03-01“…This method shows linear range of 2.230–223.0 μmol L−1. …”
Get full text
Article -
2755
Analysis of Random Difference Equations Using the Differential Transformation Method
Published 2024-01-01“…The differential transformation method (DTM) is one of the best methods easily applied to linear and nonlinear difference equations with random coefficients. …”
Get full text
Article -
2756
Data processing method for telecom data based on projection pursuit
Published 2016-12-01“…Based on this, a data processing method based on projection pursuit was proposed. The result demonstrates the effectiveness of the scheme.…”
Get full text
Article -
2757
SDN security prediction method based on bayesian attack graph
Published 2021-11-01“…Existing researchers use threat modeling and security analysis system to evaluate and predict SDN (software defined network) security threats, but this method does not consider the vulnerability utilization of SDN controller and the location of devices in the network, so the security evaluation is not accurate.In order to solve the above problems, according to the probability of device vulnerability utilization and device criticality, combined with PageRank algorithm, a algorithm to calculate the importance of each device in SDN was designed; according to SDN attack graph and Bayesian theory, a method to measure the success probability of device being attacked was designed.On this basis, a SDN security prediction method based on Bayesian attack graph was proposed to predict the attacker's attack path.Experimental results show that this method can accurately predict the attacker's attack path and provide more accurate basis for security defense.…”
Get full text
Article -
2758
Determinant of Financial Distress on The Retail Public Companies: Indonesia Case
Published 2025-01-01“…Background: The retail sector plays a significant role in the Indonesian economy. …”
Get full text
Article -
2759
Adaptive Dual-Polarization Filtering Method for Countering Active Jamming
Published 2020-01-01“…In order to counter active jamming, an adaptive polarization filtering method based on dual polarization radar is put forward. …”
Get full text
Article -
2760
An Efficient Compact Difference Method for Temporal Fractional Subdiffusion Equations
Published 2019-01-01“…In this paper, a high-order compact finite difference method is proposed for a class of temporal fractional subdiffusion equation. …”
Get full text
Article