Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
3281
APPROACHING THE PATELLOFEMORAL PAIN SYNDROME THROUGH PHYSIOTHERAPEUTIC METHODS VERSUS KINETOTHERAPY
Published 2023-06-01“…Considering the importance of the knee joint in everyday life, both for carrying out daily activities and for carrying out professional activities, we can conclude that its recovery is extremely important.The production mechanisms of the femoro-patellar syndrome are multiple, and this requires the implementation of a recovery program as effective as possible, based on the most accurate and detailed assessment.Regarding the modification of the activity, we are left with a series of contraindications such as; avoiding deep bending of the knee against resistance. …”
Get full text
Article -
3282
Features of practical application of electric power system’s stability estimation methods
Published 2020-12-01Subjects: “…integral and frequency methods…”
Get full text
Article -
3283
Distributed Cooperative Search Control Method of Multiple UAVs for Moving Target
Published 2015-01-01“…To reduce the impact of uncertainties caused by unknown motion parameters on searching plan of moving targets and improve the efficiency of UAV’s searching, a novel distributed Multi-UAVs cooperative search control method for moving target is proposed in this paper. …”
Get full text
Article -
3284
Study on DEM Correction Method of Digital Twin Basic Data Baseboard
Published 2023-01-01“…DEM is one of the most important digital twin basic data and has played a huge role in water conservancy planning,design,and engineering construction.However,the existence of various DEM errors greatly reduces the credibility of analysis and application results.In particular,the missing value after terrain conversion to DEM greatly limits subsequent DEM-based analysis.Based on the principle of raster calculation,this paper calls the corresponding tool of ArcGIS by Python to correct the missing value at the overlapped area of a certain terrain converted to DEM by using the mean of eight valued pixels around the pixel.The results show that the calculation method is highly applicable,reliable,and fast.The data of the corrected and compared values of 306 NoData pixels in the study area are close to the 1∶1 line;the maximum difference between the corrected and compared values is only 3.55 m,and the medium error value is 0.75,which is far below the standard error limit.Calling Numpy through Python greatly improves the calculation speed (10 s),and ArcGIS currently has no tool for directly correcting this method.In contrast,the DEM correction method proposed in this paper can be processed in batch,without processing failures due to memory limit,which greatly improves the work efficiency and has a strong application value for processing digital twin basic data.…”
Get full text
Article -
3285
Fabrication of Hybrid Organic Photovoltaic Devices Using Electrostatic Spray Method
Published 2014-01-01“…Hybrid organic photovoltaic devices (OPVDs) are fabricated using the electrostatic spray (e-spray) method and their optical and electrical properties are investigated. …”
Get full text
Article -
3286
Effects of Milling Methods and Cultivars on Physicochemical Properties of Whole-Wheat Flour
Published 2019-01-01“…The aim of the present study was to investigate the influence of milling methods (jet mill (JM) and hammer mill (HM)) and wheat cultivars (Keumkang (K), Jokyung (J), and Anzunbaengi (A)) on physicochemical and dough properties of whole-wheat flour (WWF). …”
Get full text
Article -
3287
Update on Devices and Methods for the Administration of Intravenous Antibiotics in a Community Setting
Published 2000-01-01Get full text
Article -
3288
Impacts of Filtration on Contrast-Detail Detectability of an X-ray Imaging System
Published 2006-01-01“…<p>The purpose of this study is to investigate the impacts of added filtration on the contrast-detail detectability of a digital X-ray imaging system for small animal studies. …”
Get full text
Article -
3289
Man against machine: Debates in the expert community on the lethal autonomous systems
Published 2022-01-01Subjects: “…lethal autonomous weapons…”
Get full text
Article -
3290
Research on multi-address time-based blockchain covert communication method
Published 2023-02-01“…Aiming at the problem of low amount of information carried by the existing block timestamp interval hiding method, a multi-address time-based blockchain covert communication method was proposed.Firstly, the ciphertext was split and transmitted by different addresses.The content of the ciphertext fragment was represented by the block timestamp interval of the address.Then the interval of the blocks was read and counted by the receiver where these addresses were located.Finally, the ciphertext was restored by combination.In addition, in view of the lack of concealment measures in the time-based blockchain covert communication system, a method of adjusting the time interval of transaction initiation was proposed to reduce the probability of address specificity caused by covert communication behavior.The experimental results verify that the transmission rate of the proposed method is about n times higher than that of the time-based blockchain covert communication method when n addresses are involved.…”
Get full text
Article -
3291
A Novel Balancing Method for Rotor Using Unsupervised Deep Learning
Published 2021-01-01“…A novel balancing method for rotor based on unsupervised deep learning is proposed in this paper. …”
Get full text
Article -
3292
“A Critical Study on Methods and Protagonists of Literary Criticism by Gino Tellini”
Published 2018-11-01Subjects: Get full text
Article -
3293
Network Planning Method for Capacitated Metro-Based Underground Logistics System
Published 2018-01-01“…This paper aims at developing a metro system-based ULS network planning method. First, an evaluation model of underground freight volume was proposed considering service capacity, freight flow, and regional accessibility. …”
Get full text
Article -
3294
Strong measurement method of evidence conflict based on earth mover’s distance
Published 2022-05-01“…Aiming at the problem that the conflict factor k in D-S evidence theory cannot effectively measure the degree of conflict between two bodies of evidence (BoEs), the expected features of evidence conflict strong measurement function (ECSMF) were proposed, and then a new method of evidence conflict measurement based on earth mover’s distance (EMD)was put forward.The same number of focal elements between different BoEs was not required and the evidence conflict with non-singleton propositions could be directly calculate.The proposed method did not require The theory and experiments show that the size of conflict measure proposed can correctly represent the degree of conflict between two BoEs, and has all the expected features of ECSMF, which is an effective method of evidence conflict strong measurement.…”
Get full text
Article -
3295
Malicious code within model detection method based on model similarity
Published 2023-08-01“…The privacy of user data in federated learning is mainly protected by exchanging model parameters instead of source data.However, federated learning still encounters many security challenges.Extensive research has been conducted to enhance model privacy and detect malicious model attacks.Nevertheless, the issue of risk-spreading through malicious code propagation during the frequent exchange of model data in the federated learning process has received limited attention.To address this issue, a method for detecting malicious code within models, based on model similarity, was proposed.By analyzing the iterative process of local and global models in federated learning, a model distance calculation method was introduced to quantify the similarity between models.Subsequently, the presence of a model carrying malicious code is detected based on the similarity between client models.Experimental results demonstrate the effectiveness of the proposed detection method.For a 178MB model containing 0.375MB embedded malicious code in a training set that is independent and identically distributed, the detection method achieves a true rate of 82.9% and a false positive rate of 1.8%.With 0.75MB of malicious code embedded in the model, the detection method achieves a true rate of 96.6% and a false positive rate of 0.38%.In the case of a non-independent and non-identically distributed training set, the accuracy of the detection method improves as the rate of malicious code embedding and the number of federated learning training rounds increase.Even when the malicious code is encrypted, the accuracy of the proposed detection method still achieves over 90%.In a multi-attacker scenario, the detection method maintains an accuracy of approximately 90% regardless of whether the number of attackers is known or unknown.…”
Get full text
Article -
3296
Catastrophic and violent tornadoes: a detailed review of physical-mathematical models
Published 2024-11-01“… Significant progress has been made in forecasting hazardous atmospheric events such as catastrophic and severe tornadoes (level EF3-EF5). A method for nonstochastic long-term forecasting using the pattern recognition theory and Fourier analysis has recently been developed. …”
Get full text
Article -
3297
Discussion on Automatic Service Open Method Based on Smart TV Terminal
Published 2013-04-01“…Based on the analysis of the evolution of smart TV terminal,the traditional way of service open by operators and the changes aroused from the appearing of smart TV terminal were introduced.According to the changes above,two alternative ways of automatic service open were presented and compared in detail in order to put forward the suggestions for the way of automatic service open.…”
Get full text
Article -
3298
Regularization method and a posteriori error estimates for the two membranes problem
Published 2024-12-01Subjects: Get full text
Article -
3299
Investigating feature extraction by SIFT methods for prostate cancer early detection
Published 2025-03-01“…This research study, therefore, seeks to explore the effectiveness of the SIFT method in improving feature extraction toward the accurate detection of incipient prostate cancer. …”
Get full text
Article -
3300
Transformer-based travel time estimation method for plateau and mountainous environments
Published 2025-02-01“…The objective of this study is to develop TTE methods that are applicable to wilderness areas characterized by plateau and mountainous topography. …”
Get full text
Article