Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
3041
INTERNATIONAL EXPERIENCE AND COMPARATIVE ANALYSIS OF ALTERNATIVE DISPUTE RESOLUTION METHODS
Published 2024-12-01Get full text
Article -
3042
Low complexity codebook search method in massive MIMO system
Published 2019-01-01“…In Massive MIMO systems for 5G networks,precoding technology is one of the key technologies.Aiming at user side codebook search method of the discrete Fourier transform (DFT) rotation codebook,a low complexity search algorithm was proposed.In this algorithm,all horizontal and vertical codebooks were grouped separately according to the characteristics that the precoding vectors with the same column of DFT rotation codebooks had the smallest chordal distance and the smaller chordal distance have the stronger correlation,and then the optimal horizontal and vertical codewords with maximum channel gain were obtained to form 3D precoding code-books.The simulation results indicate that the searching complexity of the proposed method is significantly reduced under conditions of insuring the system performance,moreover,this advantage becomes greater with the number of antennas increasing.…”
Get full text
Article -
3043
Ultrasonic localization method based on receiver array optimization schemes
Published 2018-11-01“…The simulation results are visualized and compared with the existing methods. The positioning accuracy measured by our method is increased significantly.…”
Get full text
Article -
3044
Key features and guidelines for the application of microbial alpha diversity metrics
Published 2025-01-01“…Abstract Studies of microbial communities vary widely in terms of analysis methods. In this growing field, the wide variety of diversity measures and lack of consistency make it harder to compare different studies. …”
Get full text
Article -
3045
A UWB NLOS identification method under pedestrian occlusion
Published 2023-12-01“…Ultrawideband (UWB) is a hot technology for indoor positioning with large bandwidth, strong anti-interference ability, and high multipath resolution capacity.However, due to the complex indoor environment, UWB signal propagation will inevitably be blocked, resulting in non-line-of-sight (NLOS) propagation, which greatly reduces the accuracy of UWB positioning.Therefore, identifying NLOS signals accurately and discarding or correcting them are important to alleviate the problem of the decline in positioning accuracy.The majority of present NLOS identification work focuses on scenes with building structures such as walls.Further discussion is needed for scenes obscured by pedestrians.Since the impact of human obstacles on the signals is more complex and cannot be ignored, the NLOS identification under pedestrian occlusion was studied.By comparing a variety of machine learning methods and signal feature combinations, the random forest method based on the three-dimensional features of the first path signal power, the received signal power, and the measured distance was proposed.These features with fewer dimensions and easy extraction were used to achieve a high identification percentage for NLOS.The experimental results based on the measured data of different devices show that the NLOS identification accuracy based on the proposed method reaches 99.05%, 99.32% and 98.81% respectively.…”
Get full text
Article -
3046
Network security situation evaluation method for multi-step attack
Published 2017-01-01“…Aiming at analyzing the influence of multi-step attack,as well as reflecting the system’s security situation accurately and comprehensively,a network security situation evaluation method for multi-step attack was proposed.This method firstly clustered security events into several attack scenes,which was used to identify the attacker.Then the attack path and the attack phase were identified by causal correlation of every scene.Finally,combined with the attack phase as well as the threat index,the quantitative standard was established to evaluate the network security situation.The proposed method is assessed by two network attack-defense experiments,and the results illustrate accuracy and effectiveness of the method.…”
Get full text
Article -
3047
A Vegetable-Price Forecasting Method Based on Mixture of Experts
Published 2025-01-01“…This study conducts a comprehensive analysis of the performance of traditional methods, deep learning approaches, and cutting-edge large language models in vegetable-price forecasting using multiple predictive performance metrics. …”
Get full text
Article -
3048
Fixed Point Problems in Cone Rectangular Metric Spaces with Applications
Published 2020-01-01“…In this paper, we introduce an ordered implicit relation and investigate some new fixed point theorems in a cone rectangular metric space subject to this relation. Some examples are presented as illustrations. …”
Get full text
Article -
3049
Intelligent Diagnosis Method of Gear Faults based on MGAN and CNN
Published 2022-07-01“…An intelligent diagnosis method of gear faults based on MGAN (Mixture Generative Adversarial Nets) and CNN (Convolutional Neural Networks) is proposed. …”
Get full text
Article -
3050
Epidemiological methods in transition: Minimizing biases in classical and digital approaches.
Published 2025-01-01“…Therefore, we briefly describe some of the possible biases arising from varied collection methods and sources, and offer some recommendations to better explore the potential of Digital Epidemiology, particularly on how to help reduce inequity.…”
Get full text
Article -
3051
Secure network coding method merged with timestamp and homomorphic signature
Published 2013-04-01“…A secure network coding method merged with timestamp and homomorphic signature which can solve security issues in wireless multi-hop networks was proposed.The timestamp into RSA-based homomorphic signature scheme was brought and used to produce random coefficients of net it possible to defend pollution attacks and replay attacks simultaneously while maintaining the homomorphic property of the signature.The analysis that mainly focus on was the influence of random coefficients on decoding probability of network coding a security of the proposed scheme.Results indicate that the proposed scheme can defend pollution attacks and replay attacks simultaneously,and the ratio of overhead between RSA-based homomorphic signature scheme and the proposed scheme is approximates 1.…”
Get full text
Article -
3052
Method of reliability coefficients with adjustable values for steel structures design
Published 2024-09-01Subjects: “…modified partial factor method…”
Get full text
Article -
3053
Technology of special castings fabrication using die casting method
Published 2003-08-01“…In the article there are examined the questions of receiving of the critical details slugs by cast under pressure in heavy conditions, when overchargings run up to 100 g. …”
Get full text
Article -
3054
Development of Difference Spectroscopic Method for the Estimation of Balsalazide in Bulk and in Formulation
Published 2009-01-01“…A simple, precise and accurate difference spectroscopic method has been developed for the estimation of balsalazide in bulk and in pharmaceutical dosage form. …”
Get full text
Article -
3055
Cultural Method Considerations for Integrated Weed Management in Agronomic Crops
Published 2021-05-01“… This article provides growers with information on various cultural methods to increase weed control in their fields, reduce herbicide inputs, and contribute to integrated weed management. …”
Get full text
Article -
3056
Attack path prediction method based on causal knowledge net
Published 2016-10-01“…The existing attack path prediction methods can not accurately reflect the variation of the following attack path caused by the capability of the attacker.Accordingly an attack path prediction method based on causal knowledge net was presented.The proposed method detected the current attack actions by mapping the alarm sets to the causal knowledge net.By analyzing the attack actions,the capability grade of the attacker was inferred,according to which adjust the probability knowledge distribution dynamically.With the improved Dijkstra algorithm,the most possible attack path was computed.The experiments results indicate that the proposed method is suitable for a real network confrontation environment.Besides,the method can enhance the accuracy of attack path prediction.…”
Get full text
Article -
3057
FTIR: A novel method for identifying fish gut contents
Published 2024-06-01“…However, the formulated feed, which is a mixture of various plant and animal-derived materials, and its resulting feces were not as distinguishable.Conclusion: According to the results, it seems that the FTIR will be practical and reliable method to identify foods used by fish in aquaculture or nature using fish feces. …”
Get full text
Article -
3058
Aircraft Bearing Fault Diagnosis Method Based on LSTM-IDRSN
Published 2025-01-01“…Additionally, the model maintains high precision and stability even under noise interference, outperforming other methods.…”
Get full text
Article -
3059
Current agritourism literature: What methods did researchers prefer?
Published 2024-01-01“…More than half of original scientific studies opted for quantitative data collection and analysis, followed by qualitative methods (28%), mixed model (9%) and mixed methods (7%). …”
Get full text
Article -
3060
Rule-defect oriented browser XSS filter test method
Published 2018-11-01“…In order to alleviate XSS (cross-site scripting) attacks,modern browsers use XSS filters for defense.It is difficult to effectively test and evaluate the security of browser XSS filters.The rule-defect is the defect and security problem in the implementation process of browser XSS filter.The formal definition,design test sample and scene generation algorithm were presented for browser XSS filter rule-defects.In order to quantitatively test and evaluate the filtering level of different browser XSS filters,combined with filtering success rate,false positive rate,input loss calculation filtering ability.Based on the proposed method,the prototype system is designed to automate the testing of several mainstream browser XSS filters,and the XSS filtering capabilities of different browsers are obtained.Further,after actual testing,the system also has the ability to discover undisclosed vulnerabilities.…”
Get full text
Article