Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
781
Gripping Success Metric for Robotic Fruit Harvesting
Published 2024-12-01“…Recently, computer vision methods have been widely applied to agricultural tasks, such as robotic harvesting. …”
Get full text
Article -
782
Guidance for Processing Beef Jerky in Retail Operations
Published 2005-04-01“… This recommended guidance is for specialty meat products processed at retail, for display and distribution at retail. This document is FSHN05-02, one of a series of the Food Science and Human Nutrition Department, Florida Cooperative Extension Service, IFAS, University of Florida, Gainesville, FL 32611. …”
Get full text
Article -
783
Techniques and Methods for Toxic Agent Analysis and Removal
Published 2025-01-01Get full text
Article -
784
Anomaly Monitoring Method for Key Components of Satellite
Published 2014-01-01“…This paper presented a fault diagnosis method for key components of satellite, called Anomaly Monitoring Method (AMM), which is made up of state estimation based on Multivariate State Estimation Techniques (MSET) and anomaly detection based on Sequential Probability Ratio Test (SPRT). …”
Get full text
Article -
785
Perturbation Methods for the Eigencharacteristics of Symmetric and Asymmetric Systems
Published 2018-01-01“…They will be referred to as the straightforward perturbation method, the incremental perturbation method, and the triple product method. …”
Get full text
Article -
786
APPLICATION OF THE METHOD OF LEAN PRODUCTION IN THE SERVICES SECTOR
Published 2019-09-01“…The explanation of the essence of the method of lean production has been given and its goals. …”
Get full text
Article -
787
Fourier method in the space of φB - distributions
Published 2023-11-01Subjects: Get full text
Article -
788
Knowledge Graph Completion With Pattern-Based Methods
Published 2025-01-01“…Experiments have demonstrated that the proposed method is superior to the state-of-the-art methods and that pattern extraction is effective for knowledge graph completion tasks.…”
Get full text
Article -
789
An Improved Speed Sensing Method for Drive Control
Published 2025-01-01“…In modern drive control methods, the actual mechanical speed is needed for both loops. …”
Get full text
Article -
790
On Asymptotic Pointwise Contractions in Modular Metric Spaces
Published 2013-01-01“…In this paper we study and prove some new fixed points theorems for pointwise and asymptotic pointwise contraction mappings in modular metric spaces.…”
Get full text
Article -
791
Dynamic spectrum access method for femtocells in LTE
Published 2015-01-01“…Dynamic spectrum access method for femtocells in LTE using cognitive radio method to meet the communication requestions was investigated.An uplink sensing method was proposed.By this method,femtocells could not only identify occupied spectrums but also identify service categories of those spectrums.A dynamic spectrum assess method of power control and frequency hopping for femtocells that ensured a low pre-definable performance impact to macro users was proposed.The femtocell could adopt power control to access the spectrum that carried data service while adopt frequency hopping to access the spectrum that carried voice service.Simulation results show that the downlink throughput of the femtocell can be significantly increased by using proposed spectrum access method.…”
Get full text
Article -
792
Intrusion detection method based on machine learning
Published 2006-01-01“…A new intrusion detection method was presented based on machine learning for intrusion detection systems using shell commands as audit data.In the method,multiple dictionaries of shell command sequences of different lengths were constructed to represent the normal behavior profile of a network user.During the detection stage,the similarities between the command sequences generated by the monitored user and the sequence dictionaries were calculated.These similarities were then smoothed with sliding windows,and the smoothed similarities were used to determine whether the monitored user’s behaviors were normal or anomalous.The results of the experience show the method can achieve higher detection accuracy and shorter detection time than the instance-based method presented by Lane T.…”
Get full text
Article -
793
MODELS AND METHODS FOR FORMING REGIONAL CORPORATE STRUCTURES
Published 2019-11-01“…The basic models, mechanisms and methods of integration of regional corporate structures have been presented. …”
Get full text
Article -
794
INNOVATIVE METHODS OF TEACHING HISTORY AT MODERN UNIVERSITIES
Published 2017-12-01Subjects: Get full text
Article -
795
Blasting Energy Analysis of the Different Cutting Methods
Published 2018-01-01“…Based on the smooth blasting method, the blasting parameters of the Beishan exploration tunnel have been designed. …”
Get full text
Article -
796
On Sumudu Transform Method in Discrete Fractional Calculus
Published 2012-01-01Get full text
Article -
797
-
798
The Metric Dimension of Some Generalized Petersen Graphs
Published 2018-01-01“…In this paper, we first extend the results of the metric dimension of P(n,3) and P(n,4) and study bounds on the metric dimension of the families of the generalized Petersen graphs P(2k,k) and P(3k,k). …”
Get full text
Article -
799
An iterative method based on the average quadrature formula
Published 2025-03-01Subjects: Get full text
Article -
800
Current Bioengineering Methods for Whole Kidney Regeneration
Published 2015-01-01Get full text
Article