Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
3021
Efficient Sensor Localization Method with Classifying Environmental Sensor Data
Published 2012-12-01“…For indoor localization, methods that use the received signal strength (RSS) of wireless sensors are used instead of a global positioning system because of the lack of availability of a global positioning system for indoor environments. …”
Get full text
Article -
3022
Matrix method for solving linear complex vector functional equations
Published 2002-01-01“…We give a new matrix method for solving both homogeneous and nonhomogeneous linear complex vector functional equations with constant complex coefficients.…”
Get full text
Article -
3023
Numerical and Analytical Methods for Variational Inequalities and Related Problems with Applications
Published 2012-01-01Get full text
Article -
3024
Double Controlled Partial Metric Type Spaces and Convergence Results
Published 2021-01-01“…In this paper, we firstly propose the notion of double controlled partial metric type spaces, which is a generalization of controlled metric type spaces, partial metric spaces, and double controlled metric type spaces. …”
Get full text
Article -
3025
Modified Homotopy Perturbation Method for Solving Fractional Differential Equations
Published 2014-01-01“…This work will present a numerical comparison between the considered method and some other methods through solving various fractional differential equations in applied fields. …”
Get full text
Article -
3026
Prioritization method for frontier DMUs: a distance-based approach
Published 2004-01-01“…Andersen et al. and Mehrabian et al. proposed two methods for ranking efficient units, but both methods break down in some cases. …”
Get full text
Article -
3027
DAMAGE IDENTIFICATION STUDY OF PLATE STRUCTURES BASED ON WAVELET METHOD
Published 2018-01-01“…The study results show that this method is valid for the damage identification of location and damage severity of 2 D plate,which can be expected to provide some thinking and reference value for vehicle structures’ damage identification.…”
Get full text
Article -
3028
An Analytical Method for Calculating Short-Term Space Interception Probability
Published 2019-01-01“…However, the Monte Carlo (MC) based simulation method not only consumes a lot of computation time but also theoretically lacks interpretability. …”
Get full text
Article -
3029
THREE-DIMENSIONAL RECONSTRUCTION BY SART METHOD WITH MINIMIZATION OF THE TOTAL VARIATION
Published 2015-11-01“…The algebraic reconstruction method with simultaneous iterations SART considered in this work as one of the most promising of iterative methods, suitable for the tomographic problems. …”
Get full text
Article -
3030
New Objective Refraction Metric Based on Sphere Fitting to the Wavefront
Published 2017-01-01“…For pupil radii r0≤2 mm, the new metric predicts the equivalent sphere with similar accuracy (<0.1D), however, for r0>2 mm, the mean error of traditional metrics can increase beyond 0.25D, and the MTR remains accurate. …”
Get full text
Article -
3031
A Manual of Methods and Procedures for the Regional Waterway Management System
Published 2009-07-01“…TP-124, a 91-page illustrated manual by Robert Swett and David Fann, details the procedures that are necessary to complete a Regional Waterway Management System for Florida’s coastal canals and other waterways. …”
Get full text
Article -
3032
Sensitive Bromatometric Methods for the Determination of Sumatriptan Succinate in Pharmaceutical Formulations
Published 2011-01-01“…The two methods are based on the bromination of STS by a known excess of in situ generated bromine followed by determination of unreacted bromine by reacting with a fixed amount of methyl orange (Method A) or indigo carmine (Method B) and measuring the absorbance at 508 or 610 nm. …”
Get full text
Article -
3033
Synthesis of Hyperbranched Polymer Using Slow Monomer Addition Method
Published 2012-01-01“…This paper details the synthesis of a well-defined hyperbranched polymer using a slow monomer addition method. …”
Get full text
Article -
3034
A Vs-Based Logistic Regression Method for Liquefaction Evaluation
Published 2021-01-01“…The performance of the new formula on liquefaction evaluation is compared with existing liquefaction evaluation methods including the Andrus method and the Chinese code method. …”
Get full text
Article -
3035
Automated Windows domain penetration method based on reinforcement learning
Published 2023-08-01“…Windows domain provides a unified system service for resource sharing and information interaction among users.However, this also introduces significant security risks while facilitating intranet management.In recent years, intranet attacks targeting domain controllers have become increasingly prevalent, necessitating automated penetration testing to detect vulnerabilities and ensure the ongoing maintenance of office network operations.Then efficient identification of attack paths within the domain environment is crucial.The penetration process was first modeled using reinforcement learning, and attack paths were then discovered and verified through the interaction of the model with the domain environment.Furthermore, unnecessary states in the reinforcement learning model were trimmed based on the contribution differences of hosts to the penetration process, aiming to optimize the path selection strategy and improve the actual attack efficiency.The Q-learning algorithms with solution space refinement and exploration policy optimization were utilized to filter the optimal attack path.By employing this method, all security threats in the domain can be automatically verified, providing a valuable protection basis for domain administrators.Experiments were conducted on typical Windows domain scenarios, and the results show that the optimal path is selected from the thirteen efficient paths generated by the proposed method, while also providing better performance optimization in terms of domain controller intrusion, domain host intrusion, attack steps, convergence, and time cost compared to other approaches.…”
Get full text
Article -
3036
Solving Quantum Dynamics with a Lie-Algebra Decoupling Method
Published 2025-01-01“…Here, we present a tutorial for how the quantum dynamics of systems can be solved using a Lie-algebra decoupling method. The approach involves identifying a Lie algebra that governs the dynamics of the system, enabling the derivation of differential equations to solve the Schrödinger equation. …”
Get full text
Article -
3037
Research of the two-criteria estimation method for linear regression models
Published 2025-01-01“…The paper is devoted to the research of the two-criteria estimation method for linear regressions. The first criterion corresponds to the least absolute deviations, the second – to the non-strict ordinary least squares. …”
Get full text
Article -
3038
Fixed Point Theory in α-Complete Metric Spaces with Applications
Published 2014-01-01“…The aim of this paper is to introduce new concepts of α-η-complete metric space and α-η-continuous function and establish fixed point results for modified α-η-ψ-rational contraction mappings in α-η-complete metric spaces. …”
Get full text
Article -
3039
An adjustable bio-sealing method for rock fracture leakage mitigation
Published 2025-01-01“…The results showed that the RAM-based bio-sealing method can seal and bond the small aperture rock fractures with high efficiency and uniform precipitation by adjusting the CS concentration. …”
Get full text
Article -
3040
The space of entire functions of two variables as a metric space
Published 1978-01-01Subjects: Get full text
Article