Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
521
Asymptotic Methods for Solitary Solutions and Compactons
Published 2012-01-01“…Particular attention is paid throughout the paper to giving an intuitive grasp for the variational approach, the Hamiltonian approach, the variational iteration method, the homotopy perturbation method, the parameter-expansion method, the Yang-Laplace transform, the Yang-Fourier transform, and ancient Chinese mathematics. …”
Get full text
Article -
522
Phases, metrics, and techniques of product discovery
Published 2025-01-01Subjects: Get full text
Article -
523
-
524
A method of summability of Lagrange interpolation
Published 1994-01-01“…Therefore we improve with the linear summation method Ln* a result presented in [12] and we also point out a solution for a problem of P.L.Butzer in the proceedings of the Budapest conference in 1980.…”
Get full text
Article -
525
Scientific School “Interactive Methods of Management”
Published 2016-03-01Subjects: “…interactive methods…”
Get full text
Article -
526
Remarks on Ultrametrics and Metric-Preserving Functions
Published 2014-01-01“…Functions whose composition with every metric is a metric are said to be metric-preserving. …”
Get full text
Article -
527
Methods of Changing or Correcting the Date of Birth
Published 2024-06-01“…Legal conditions are possible through three references and five methods. One method is to act through the commission to determine the age of the subject of the single article of the law on preserving the validity of registered documents, etc. …”
Get full text
Article -
528
Kernelised reference‐wise metric learning
Published 2017-03-01Subjects: “…Kernelised reference wise metric learning…”
Get full text
Article -
529
An Adjustment Method for the Customized Trains of the Railway
Published 2020-01-01“…In order to establish a comprehensive method for the CT operation plan, the paper proposes an intention survey method to obtain the passenger travel wishes data. …”
Get full text
Article -
530
KPDR : An Effective Method of Privacy Protection
Published 2021-01-01“…To solve the problem of user privacy disclosure caused by attacks on anonymous areas in spatial generalization privacy protection methods, a K and P Dirichlet Retrieval (KPDR) method based on k-anonymity mechanism is proposed. …”
Get full text
Article -
531
-
532
METHODICAL PROBLEM IN THE RESEARCHES OF EDUCATIONAL HISTORY
Published 2009-05-01“…The main aim of this study is to attract attention to the methodical problem in research of educational history. …”
Get full text
Article -
533
Methods of Bank Valuation in the Age of Globalization
Published 2015-06-01“…For strategic management residual income-oriented methods most useful when expected cash flows are negative throughout the forecast period. …”
Get full text
Article -
534
Sieve Method for Polynomial Linear Equivalence
Published 2013-01-01“…By combining the three sieves, we propose a sieve method for the PLE problem. As an application of our sieve method, we show that it is infeasible to construct public key encryption schemes from the PLE problem.…”
Get full text
Article -
535
PROJECTS METHOD IN ORGANIZING OF GRAPHICAL TRAINING
Published 2016-12-01Subjects: Get full text
Article -
536
Design of multi-key encryption method
Published 2020-11-01“…In order to improve the security in the process of information transmission,the current encryption methods were studied,and the research status was reported which increased the security of encryption by processing the key.According to the principle of segmenting and grouping data in the process of sending and encrypting,a method of multi-key encryption was designed:the segmenting key group and grouping key group were generated by the source key and random number,and the corresponding key was selected for each segmented and grouped data by its sequence number according to the matching algorithm.This method realized the encryption of multi-key in the process of information transmission.Finally,on the one hand,MATLAB was used to test and verify the encryption efficiency of this method.On the other hand,the security of this method was analyzed from the theoretical and mathematical perspective,comparing with the traditional method.It is concluded that this method can increase the security of the traditional method without too much cost much cost.…”
Get full text
Article -
537
Modification of the Quasilinearization Method for the Inverse Problem
Published 2007-01-01“…We propose a new modification of Bellman's quasilinearization method such that at any iteration step, it works with an approximate solution of the original nonlinear system and with new approximation of parameters α(k+1) which are close enough to the previous ones. …”
Get full text
Article -
538
-
539
The “Hand-as-Foot” teaching method in stomatology
Published 2025-02-01Subjects: Get full text
Article -
540
Methods to Quantify In-Field Nutrient Leaching
Published 2023-01-01“… This publication summarizes the basic concepts of three most-used NO3-N leaching quantification methods in field conditions. Written by Bibek Acharya, Vivek Sharma, Charles Barrett, Sudeep Singh Sidhu, Lincoln Zotarelli, and Michael D. …”
Get full text
Article