Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
2861
Fuzzy Filtering Method for Color Videos Corrupted by Additive Noise
Published 2014-01-01“…A novel method for the denoising of color videos corrupted by additive noise is presented in this paper. …”
Get full text
Article -
2862
The Lisf of the Articles Published in the Journal "DEVICES AND METHODS OF MEASUREMENTS" in 2019
Published 2019-12-01Get full text
Article -
2863
Multi-version consolidation method for block-level backup data
Published 2011-01-01“…Historical version backup data query efficiency was dependent on the version chain length in a multi-version backup data storage system.A novel block-level backup data multi-version consolidation method was presented for this problem.Any version of a historical full system snapshot could be generated within the incremental backup data version sequence.Theoretical analysis showed that it could increase the target snapshot version query efficiency significantly in the version chain.A variable-length block version merging algorithm was presented to decrease the computing complex-ity in the process of snapshot version merging,according to the block-level backup data distribution features.Finally,the concrete applications and performance analysis for block-level version consolidation method was also introduced.The simulated experiments results expose that the version consolidation method can eliminate redundant version of backup data with the same version chain length,and it can increase full system recovery efficiency than traditional methods sig-nificantly.…”
Get full text
Article -
2864
THE INFERENCE METHOD OF WHEEL LOAD BASED ON THE ACCELERATION OF AXLE HEAD
Published 2016-01-01“…A new load spectrum measuring method which can instead of the six-component measuring wheel was carried out in this paper. …”
Get full text
Article -
2865
Tax haven as a method for tax optimization in holding structures
Published 2024-12-01Get full text
Article -
2866
ABNORMAL BLOOD LIPIDS LEVELS (DYSLIPIDEMIA) TREATMENT WITH ACUPUNCTURE METHOD
Published 2022-03-01Subjects: “…acupuncture method…”
Get full text
Article -
2867
SAT-based lazy formal analysis method for security protocols
Published 2014-11-01“…A SAT-based security protocol formalization analysis method named SAT-LMC is proposed.The method introduces optimized the initial state and transformational rules with “lazy” idea.The efficiency of detection is significantly improved.Moreover,by adding support for strong type flaw attack defect,the attack detection becomes more comprehensive.A security protocol analysis tool is implemented based on the method; a type flaw attack is detected for protocol Otway-Rees.For OAuth2.0 protocol,analysis shows that there is a kind of man-in-the-middle attack of the authorization code in some application scenarios.…”
Get full text
Article -
2868
Implementation of the Spectral Method for Determining of Measuring Instruments' Dynamic Characteristics
Published 2020-06-01“…The spectral method for establishing dynamic response of measuring instruments basically requires determining the amplitude spectrum of the signal in its informative part that includes the amplitude spectrum at zero frequency. …”
Get full text
Article -
2869
Noether Symmetry Method for Hamiltonian Mechanics Involving Generalized Operators
Published 2021-01-01“…And finally, two applications are presented to illustrate the methods and results.…”
Get full text
Article -
2870
Method of Webshell detection based on multi-view feature fusion
Published 2020-06-01“…Webshell is a malicious script file on the Web.It is usually uploaded by the attacker to the target server to achieve the purpose of illegal access control.In order to overcome the shortcoming of the existing Webshell detection methods,such as single network traffic behavior,simple by passed signature comparison,and easily bypassed signature comparison,a method of Webshell detection based on multi-view feature fusion for PHP Webshell detecting was proposed.Firstly,multiple features including lexical features,syntactic features,and abstract features were extracted.Secondly,fisher score was used to sort and filter all features according to the degree of importance.Finally,a model that can effectively distinguish Webshell from normal scripts was established through SVM.The large-scale experiment in real-world scenario shows that the final accuracy of our model can reach 92.1%.…”
Get full text
Article -
2871
Robust Scheduling Method of TT&C Resource in Satellite Network
Published 2023-03-01“…The continuous growth of satellite network scale brings great challenges to the eff ective scheduling of TT&C resources.Aff ected by weather and other factors, the performance of the satellite-ground link is of high uncertainty.In order to took into both resource utilization and task reliability, a robust scheduling method of TT&C resources was proposed.This method could arranged the start time and duration of the transmission window for TT&C tasks by the predicted the channel state distribution of satelliteground link and the task distribution in the planning period, and optimized the resource allocation scheme by backward iteration to maximized the expected profit of the tasks.The experimental results showed that compared with the traditional non-robust scheduling method, the scheduling method proposed could obtain more task profi t under diff erent channel distributions and achieve the improvement of both resource utilization and task reliability.…”
Get full text
Article -
2872
An entropic regularization method for solving systems of fuzzy linear inequalities
Published 2002-01-01“…An entropic regularization method is introduced for solving such a problem. Some computational results are included.…”
Get full text
Article -
2873
Methods of examination of agglutinant sands and quality of decorative and jewelry castings
Published 2000-11-01Get full text
Article -
2874
A Transfer Learning Method to Generate Synthetic Synoptic Magnetograms
Published 2024-01-01“…Toward this goal, we develop a method called Transfer‐Solar‐GAN which combines a conditional generative adversarial network with a transfer learning approach to overcome training data set limitations. …”
Get full text
Article -
2875
Constrained C0 Finite Element Methods for Biharmonic Problem
Published 2012-01-01“…This paper presents some constrained C0 finite element approximation methods for the biharmonic problem, which include the C0 symmetric interior penalty method, the C0 nonsymmetric interior penalty method, and the C0 nonsymmetric superpenalty method. …”
Get full text
Article -
2876
RETRACTED: Automated method for assessing the degree of intellectualization in the “Smart City”
Published 2024-01-01Get full text
Article -
2877
Current Pattern Dynamic Visualization Based on Improved Eular Method
Published 2003-01-01Get full text
Article -
2878
A simple method for automatic recreation of railway horizontal alignments
Published 2024-10-01“…The main objective is to propose a simple method for automatically obtaining optimized recreated alignments located as close as possible to an existing one. …”
Get full text
Article -
2879
Identifying the educational components of technology commercialization of universities with metacombination method
Published 2024-11-01“…At the end of the research, it is suggested that the authorities, with a more detailed understanding of the underlying conditions and factors of success in technology commercialization in universities, should formulate policies and design effective implementation plans.ConclusionThe current research was conducted with the aim of identifying the educational components of the commercialization of technology in universities with the meta-combination method. …”
Get full text
Article -
2880
A Novel Method of Skeletonization of Complex Shapes Based on Bisectors
Published 2024-01-01“…This paper aims to develop a novel mathematical algorithm to approximate the skeleton of a non-polygonal shape and to compare it to the most used methods. The mathematical technique of skeletonization is used as a reference to validate and compare the proposed method to the most used ones. …”
Get full text
Article