Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
2901
The Examination of the Concept of Health Literacy through Bibliometric Analysis Method
Published 2025-01-01“…This article provides a general overview of research conducted on the concept of health literacy using bibliometric methods. The Web of Science (WoS) database was utilized as the data source for gathering information. …”
Get full text
Article -
2902
Comparative Study on Different Drying Methods of Fish Oil Microcapsules
Published 2017-01-01“…This study compared the effects of different drying methods, for example, spray drying (SD), freeze drying (FD), and spray freeze drying (SFD) on the microencapsulation of fish oil. …”
Get full text
Article -
2903
Automatic Optical Path Alignment Method for Optical Biological Microscope
Published 2024-12-01“…The traditional automatic alignment methods for OBMs rely heavily on complex masker-detection techniques. …”
Get full text
Article -
2904
Simulation of a Centrifugal Pump by Using the Harmonic Balance Method
Published 2015-01-01“…The harmonic balance method was used for the flow simulation in a centrifugal pump. …”
Get full text
Article -
2905
A Fabrication Method for Memristors with Graphene Top Electrodes and their Characterization
Published 2024-03-01“…E-beam evaporation and sputtering were used for depositing bottom metal electrodes and active layer respectively. Graphene was produced using the chemical vapor deposition (CVD) method and subsequently transferred using the fishing technique. …”
Get full text
Article -
2906
Research Methods Used in Library and Information Science Theses: An Evaluation
Published 1996-12-01“…A literature analysis and an evaluation are made on the findings of researches which examine the research methods employed in library science and information science dissertations. …”
Get full text
Article -
2907
Selected Methods of Rejecting Arguments for Determinism in Tense Logic Systems
Published 2024-12-01Get full text
Article -
2908
METHOD OF FILTER SELECTION FOR SPECLE-NOISE SMOOTHING IN SAR IMAGES
Published 2016-09-01“…A method for comparison of different SAR image filtration techniques is presented. …”
Get full text
Article -
2909
Application Method of Smart Dynamic DNS in Huge e-Commerce
Published 2014-01-01“…First the e-Commerce network architecture was put forward, and a detailed discussion was made on each part of the network architecture, a kind of smart dynamic domain name system and the optimal routing method of user access of e-Commerce were designed, at last the user access to electronic commerce exchange process was given.…”
Get full text
Article -
2910
Adversarial training driven malicious code detection enhancement method
Published 2022-09-01“…To solve the deficiency of the malicious code detector’s ability to detect adversarial input, an adversarial training driven malicious code detection enhancement method was proposed.Firstly, the applications were preprocessed by a decompiler tool to extract API call features and map them into binary feature vectors.Secondly, the Wasserstein generative adversarial network was introduced to build a benign sample library to provide a richer combination of perturbations for malicious sample evasion detectors.Then, a perturbation reduction algorithm based on logarithmic backtracking was proposed.The benign samples were added to the malicious code in the form of perturbations, and the added benign perturbations were culled dichotomously to reduce the number of perturbations with fewer queries.Finally, the adversarial malicious code samples were marked as malicious and the detector was retrained to improve its accuracy and robustness of the detector.The experimental results show that the generated malicious code adversarial samples can evade the detector well.Additionally, the adversarial training increases the target detector’s accuracy and robustness.…”
Get full text
Article -
2911
Method for assessing the theoretical characteristics of small axial hydraulic turbines
Published 2023-12-01“…This article based on an analysis of existing methods for designing and using a mathematical model of a hydraulic turbine with simplified blades, proposes a method for designing and analyzing the theoretical characteristics of the resulting hydraulic turbine. …”
Get full text
Article -
2912
Estimation of Damage Degree of Buildings in Earthquakes by Statistical Modeling Method
Published 2024-09-01Subjects: Get full text
Article -
2913
The Fruit Recognition and Evaluation Method Based on Multi-Model Collaboration
Published 2025-01-01“…In this study, we propose a fruit recognition and evaluation method based on multi-model collaboration. Firstly, the detection model was used to accurately locate and crop the fruit area, and then the cropped image was input into the classification module for detailed classification. …”
Get full text
Article -
2914
Study on Performance Evaluation of Service Supply Chain by Extension Method
Published 2021-01-01“…The result turns out to be good, which is consistent with the actual situation, indicating that the evaluation system and method are effective and reliable.…”
Get full text
Article -
2915
Named Entity Recognition Method Based on Multi-Feature Fusion
Published 2025-01-01Get full text
Article -
2916
Dam Risk Identification Method Based on EAHP-EWM-TOPSIS
Published 2024-01-01Subjects: Get full text
Article -
2917
Novel DOA estimation method for coherent wideband LFM signals
Published 2012-03-01“…A novel direction of arrival (DOA) estimation method for coherent wideband linear frequency modulation (LFM) signals was proposed.Based on the dechirping property of LFM signal in fractional Fourier domain,a new array data model was constructed,then the matrix reconstruction and MUSIC algorithm were used to estimate the DOA of coherent LFM signals.If there were multiple groups of coherent LFM signals incident,separated them in different energy-concentrated domains first,then carried the DOA estimation on each of the groups.Owing to fully excavating the time-frequency information included in observed signals,this method has good resolution ability and anti-noise performance,and the number of DOA that can be resolved is also increased.In addition,this method has no array redundancy and aperture loss,and can be applied to arbitrary array manifold.Simulation results show that this method can obtain nearly 8dB signal-to-noise ratio gain compared with the conventional method.…”
Get full text
Article -
2918
Synthetic–schematic representation of the model of clinical diagnostic-therapeutic method
Published 2007-04-01“…The use of a systemic approach in the theoretical analysis of the clinical method has allowed the elaboration of an schematic and synthetic representation of the new model of clinical diagnostic- therapeutic method developed from the conception of the medical assistance as a taking decisions process. …”
Get full text
Article -
2919
Methods of state support of real estate market and its classification
Published 2019-05-01Subjects: Get full text
Article -
2920
Fixed Points for Multivalued Mappings in Uniformly Convex Metric Spaces
Published 2008-01-01“…The purpose of this paper is to ensure the existence of fixed points for multivalued nonexpansive weakly inward nonself-mappings in uniformly convex metric spaces. This extends a result of Lim (1980) in Banach spaces. …”
Get full text
Article