Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
52221
-
52222
-
52223
Rehabilitation Technical Standard of "WU YIN TIAO SHEN (Five-Element Music Regulates Emotions)"
Published 2023-04-01“…Since the advent of "Huangdi Neijing (Inner Canon of Huangdi)", the five-element music has been an important method for treating diseases, especially emotional disorders. …”
Get full text
Article -
52224
FAULT CHARACTERISTICS ANALYSIS OF 2BFQ-6 PRECISION SEEDER FOR RAPESEED
Published 2017-01-01Get full text
Article -
52225
-
52226
-
52227
Simulation Effect Evaluation of CMIP6 Models on Climatic Elements in Huai River Basin
Published 2023-01-01“…The general climate model (CMIP6) is the main means of large-scale simulation and prediction of future climate changes,but the simulation quality of its model data and applicability in different research regions need to be evaluated.Based on the measured data of 19 meteorological stations in the upper and middle reaches of the Huai River Basin from 1960 to 2014,this paper systematically evaluates the simulated climate data of 19 CMIP6 models using five precision indicators.The indicators include equidistant cumulative distribution function method,mean,dispersion coefficient (C<sub>v</sub>),Pearson correlation coefficient (PCC),standard deviation (STD),and root-mean-square deviation (RMSE).Finally,the following conclusions are drawn:① Based on the simulation data of 19 CMIP6 models corrected for bias,the top two climate models for precipitation data simulation are preliminarily selected,including ACCESS-ESM1-5 and CMCC-ESM2.The top five climate models for simulating temperature data contain ACCESS-ESM1-5 and CMCC-ESM2;② The historical period data and measured historical climate data of the selected CMIP6 models are evaluated from two aspects of annual change trend and spatial distribution.Then,the CMIP6 model suitable for the upper and middle reaches of the Huai River Basin is verified and selected;③ Based on analyzing the influence of atmospheric circulation factors on climate,AO has a good correlation with the climate data of the upper and middle reaches of the studied basin,and the correlation between the model and atmospheric circulation data is close to the actual situation.The comprehensive evaluation shows that the most suitable models for simulating the upper and middle reaches of the Huai River Basin are ACCESS-ESM1-5 and CMCC-ESM2.The systematic evaluation of CMIP6 model data simulating the upper and middle reaches of the Huai River Basin provides theoretical and technical references for the rational selection and utilization of CMIP6 datasets for the research on climate change factors in future scenarios of the basin.…”
Get full text
Article -
52228
-
52229
-
52230
-
52231
-
52232
-
52233
Research on network risk assessment based on attack graph of expected benefits-rate
Published 2022-08-01“…As Internet applications and services become more and more extensive, the endless network attacks lead to great risks and challenges to the security of information systems.As a model-based network security risk analysis technology, attack graph is helpful to find the vulnerability between network nodes and the harm of being attacked.It has been proved to be an effective method to find and prevent network security risks.Attack graph is mainly divided into state-based attack graph and attribute-based attack graph.Due to the problem of state explosion in state-based attack graph, most researchers prefer the attribute-based attack graph for network risk assessment.In view of the existing researches on attribute-based attack graph, they excessively rely on the vulnerability of network nodes and the essential attributes of atomic attack.However, they ignore that rational attackers usually choose specific attack paths by maximizing attack benefits.Then, a network risk assessment framework and a quantification method of attack benefits-rate based on expected benefits-rate attack graph were proposed.The network risk assessment framework took the open vulnerability resource database, the new vulnerabilities found by the vulnerability mining system and the big data related to network attack and defense as the basic data source.The network risk assessment framework also took the open source big data platform as the analysis tool to mine and calculate the elements related to attack cost and attack benefit.Using the concepts of cost, benefit and benefit-rate in economics, the calculation model of expected benefit-rate of atomic attack was constructed.By constructing the attribute-based attack graph of the target network, the expected benefit-rate of atomic attack on the attack path was calculated, and the expected benefit-rate list of all possible attack paths was generated.Furthermore, taking the expected goal as the starting point, the search was carried out according to the specific optimization strategy (backtracking method, greedy algorithm, dynamic programming).And the complete attack path with the maximum benefit-rate was obtained, which provided the basis for network risk assessment.The simulation results show the effectiveness and rationality of the proposed expected benefit-rate attack graph network risk assessment method, which can provide support for discovering and preventing network security problems.…”
Get full text
Article -
52234
-
52235
-
52236
-
52237
-
52238
-
52239
-
52240
Runoff Simulation of Yulong Kashi River Basin Based on CN05.1 Dataset Driven SWAT Model
Published 2024-09-01Get full text
Article