Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
3321
Adaptive Hierarchical Collocation Method for Solving Fractional Population Diffusion Model
Published 2023-01-01“…The algorithm’s complexity analysis illustrates the concise function’s efficiency advantage over the original expression when solving time-fractional PDEs. Comparatively, the method exhibits superior numerical performance to alternative wavelet spectral methods like the Shannon–Gabor wavelet.…”
Get full text
Article -
3322
Existence Theory and Novel Iterative Method for Dynamical System of Infectious Diseases
Published 2020-01-01Get full text
Article -
3323
Invasive Treatment of Lower Limb Varicose Veins - Comparison of Treatment Methods
Published 2025-01-01“…Brief description of the state of knowledge: Numerous methods for treating lower limb varicose veins are available. …”
Get full text
Article -
3324
Some Almost Generalized (ψ,ϕ)-Contractions in G-Metric Spaces
Published 2013-01-01“…In this paper, we introduce some almost generalized (ψ,ϕ)-contractions in the setting of G-metric spaces. We prove some fixed points results for such contractions. …”
Get full text
Article -
3325
A Simple Visualization Method for Three-Dimensional (3D) Network
Published 2021-01-01“…As a result, network diagrams appeared in various forms, and methods for visualizing the network information are being developed. …”
Get full text
Article -
3326
RDB2OWL: AN IMPROVED METHOD FOR CONVERTING RELATIONAL DATABASES INTO OWL
Published 2017-06-01Get full text
Article -
3327
ORGANIZATIONAL CHANGE IN RETAIL BANKING AND CHANGING SPATIAL PATTERNS OF BRANCH BANKING
Published 2005-06-01Subjects: Get full text
Article -
3328
Note on the Habits of Osmia Georgica Cresson as Ascertained by the Glass-Tube Method
Published 1944-01-01Get full text
Article -
3329
Energy-efficient and fast method on storage and querying in wireless sensor networks
Published 2008-01-01Get full text
Article -
3330
DDoS attack detection method based on conditional entropy and GHSOM in SDN
Published 2018-08-01“…Software defined networking (SDN) simplifies the network architecture,while the controller is also faced with a security threat of “single point of failure”.Attackers can send a large number of forged data flows that do not exist in the flow tables of the switches,affecting the normal performance of the network.In order to detect the existence of this kind of attack,the DDoS attack detection method based on conditional entropy and GHSOM in SDN (MBCE&G) was presented.Firstly,according to the phased features of DDoS,the damaged switch in the network was located to find the suspect attack flows.Then,according to the diversity characteristics of the suspected attack flow,the quaternion feature vector was extracted in the form of conditional entropy,as the input features of the neural network for more accurate analysis.Finally,the experimental environment was built to complete the verification.The experimental results show that MBCE&G detection method can effectively detect DDoS attacks in SDN network.…”
Get full text
Article -
3331
Cooperative sensing method considering malicious nodes in cognitive radio networks
Published 2015-06-01Get full text
Article -
3332
Application of invariant moment method for HAPS ISAR imaging with micro parts
Published 2013-08-01“…To resolve the micromotion in the HAPS(high altitude platform station) ISAR system,the invariant moment method for ISAR imaging with micro parts was proposed.Firstly,invariant moment tool was applied to classify the echoes of different sub-aperture,and then the sub-aperture echoes reducing the quality of image was separated.Finally the remaining echoes were used to do sub-aperture splicing imaging.From the simulation results,the algorithm is proved to be simple and can improve the quality of ISAR image obviously.…”
Get full text
Article -
3333
A New Linearizing Method for Sum of Linear Ratios Problem with Coefficients
Published 2014-01-01“…A new linearizing method is presented for globally solving sum of linear ratios problem with coefficients. …”
Get full text
Article -
3334
Some Fixed-Point Results for a -Weak Contraction in -Metric Spaces
Published 2012-01-01“…We introduce the concepts of a -weak contraction mapping of types and and we establish some fixed point theorems for a -weak contraction mapping of types and in complete -metric spaces. Our results generalize several well-known comparable results in the literature.…”
Get full text
Article -
3335
Membership inference attack and defense method in federated learning based on GAN
Published 2023-05-01“…Aiming at the problem that the federated learning system was extremely vulnerable to membership inference attacks initiated by malicious parties in the prediction stage, and the existing defense methods were difficult to achieve a balance between privacy protection and model loss.Membership inference attacks and their defense methods were explored in the context of federated learning.Firstly, two membership inference attack methods called class-level attack and user-level attack based on generative adversarial network (GAN) were proposed, where the former was aimed at leaking the training data privacy of all participants, while the latter could specify a specific participant.In addition, a membership inference defense method in federated learning based on adversarial sample (DefMIA) was further proposed, which could effectively defend against membership inference attacks by designing adversarial sample noise addition methods for global model parameters while ensuring the accuracy of federated learning.The experimental results show that class-level and user-level membership inference attack can achieve over 90% attack accuracy in federated learning, while after using the DefMIA method, their attack accuracy is significantly reduced, approaching random guessing (50%).…”
Get full text
Article -
3336
Approximate Solution of Urysohn Integral Equations Using the Adomian Decomposition Method
Published 2014-01-01“…We apply Adomian decomposition method (ADM) for obtaining approximate series solution of Urysohn integral equations. …”
Get full text
Article -
3337
Assessment of Coumarin Levels in Ground Cinnamon Available in the Czech Retail Market
Published 2012-01-01“…The objective of this study was to determine the coumarin content of ground cinnamon purchased from retail markets in the Czech Republic. No sample was labelled with information on the botanical source, but, in some cases, the countries of origin were specified. …”
Get full text
Article -
3338
The Assessment of the Green Development of the Tobacco Industry Using a Multicriteria Method
Published 2025-02-01“…The industry also involves numerous stakeholders, including farmers, manufacturers, distributors, retailers, regulators, and consumers. The aim of this research is to select the most relevant environmental criteria for the green development of the tobacco industry. …”
Get full text
Article -
3339
Use of New Methods to Determine the Inputs Effective in Estimating Soil Temperature
Published 2022-09-01“…In the main components analysis method, four main components for the synoptic station of Tabriz were selected. …”
Get full text
Article -
3340
Optimization of Process Parameters for ε-Polylysine Production by Response Surface Methods
Published 2016-01-01“…In the present work, we evaluated the ε-PL adsorption performances of HZB-3B and D155 resins and optimized the adsorption and desorption conditions by single-factor test, response surface method, and orthogonal design. The complexes of resin and ε-PL were characterized by SEM and FITR. …”
Get full text
Article