Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
621
Experimental methods for the characterization of fatigue in microstructures
Published 2012-12-01Get full text
Article -
622
Implementing Inquiry-Based Teaching Methods
Published 2009-01-01“…AEC395/WC076: Implementing Inquiry-Based Teaching Methods (ufl.edu) …”
Get full text
Article -
623
School teenager knowledge on contraceptive methods
Published 2015-01-01“…The study aimed evaluation of the knowledge on contraceptive methods and their utilization among adolescents of the secondary grade of public schools in Cuiaba-MT. …”
Get full text
Article -
624
Concept, subject and method of legal psychology
Published 2023-07-01Subjects: Get full text
Article -
625
-
626
Secure controlling method for scalable botnets
Published 2023-02-01“…., internet of things (IoT) devices.Future botnets will become more cross-platform and stealthy, which introduces severe security risks to cyberspace.Therefore, in-depth research on botnets can offer study targets to corresponding defensive studies, which is very meaningful for designing an architecture to secure the next-generation cyberspace.Hence, an HTTP-based scalable botnet framework was proposed to address the problems of compatibility, stealthiness and security.Specifically, the framework adopted a centralized controlling model.Moreover, it used the HTTP protocol as the designed botnet’s communication protocol and block encryption mechanisms based on symmetric cryptography to protect the botnet’s communication contents.Furthermore, a secure control mechanism for multi-platform botnets was designed.In particular, the proposed mechanism utilized source-level code integration and cross-compilation techniques to solve the compatibility challenge.It also introduced encrypted communication with dynamic secret keys to overcome the drawbacks of network traffic regularity and ease of analysis in traditional botnets.Moreover, it designed server migration and reconnection mechanisms to address the weakness of single-point-failure in centralized botnet models.Simulation results in three experimental scenarios with different levels of botnet controllability show that there is a linear relationship between the size of a botnet and the service overhead of the related C&C servers.In addition, under the condition of the same botnet scale, a higher level of controllability introduces a higher throughput and a greater system overhead.The above results demonstrate the effectiveness and the practical feasibility of the proposed method.…”
Get full text
Article -
627
Lie Group Method of the Diffusion Equations
Published 2014-01-01“…The ordinary differential equations are solved by Lie group method and the explicit Runge-Kutta method. Numerical results showed that Lie group method is more stable than the corresponding explicit Runge-Kutta method.…”
Get full text
Article -
628
-
629
Multifractal Framework Based on Blanket Method
Published 2014-01-01“…The first two measures (proposed Methods 1 and 3) support model of image with embedded dimension three, while the other supports model of image embedded in space of dimension three (proposed Method 2). …”
Get full text
Article -
630
Peano compactifications and property S metric spaces
Published 1980-01-01Subjects: “…property S metrics…”
Get full text
Article -
631
Hybrid Method for Point Cloud Classification
Published 2025-01-01“…In this study, we introduce a novel hybrid ResPOL method that integrates a bidirectional architecture with a newly developed Patch-Offset Lambda (POL) mechanism for feature extraction from point cloud data. …”
Get full text
Article -
632
Hyperbolic Metric Spaces and Stochastic Embeddings
Published 2025-01-01“…Stochastic embeddings of finite metric spaces into graph-theoretic trees have proven to be a vital tool for constructing approximation algorithms in theoretical computer science. …”
Get full text
Article -
633
Mergeable adaptive tile coding method
Published 2015-02-01“…In order to solve many unnecessary division,mergence supported adaptive tile coding algorithm was presented which would eliminate the unnecessary division.Simulation is conducted on mountain car problem with discrete actions and continuous state space Results show that the proposed method can eliminate the influence of false division in the traditional tile coding method and achieve a more accurate adaptive partition of continuous state space.A higher convergence rate is achieved at the same time.…”
Get full text
Article -
634
Conjugate propagator method for direction finding
Published 2008-01-01Subjects: Get full text
Article -
635
-
636
-
637
Calculation and Analysis of Spur Gear Mesh Stiffness with Considering Wear
Published 2021-01-01Subjects: Get full text
Article -
638
Pietro G. Beltrami, À quoi sert une édition critique ? Lire les textes de la littérature romane médiévale, Paris, Classiques Garnier, 2021
Published 2022-10-01Subjects: Get full text
Article -
639
Excel as an optimization tool applied to multicomponent distillation column sizing
Published 2024-05-01Subjects: Get full text
Article -
640
A Critique on the Book “The Mixed Method Research”
Published 2020-07-01Subjects: “…research method…”
Get full text
Article