Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
821
Method for Calculating Transients in a Gas Pipeline
Published 2021-10-01Subjects: Get full text
Article -
822
Privacy-preserving trajectory similarity computation method
Published 2022-11-01“…To tackle privacy concerns on user information leakage in trajectory outsourcing services, a privacy-preserving trajectory similarity computation (pTSC) method was proposed.A trajectory outsourcing service provider was enabled to store encrypted trajectories from owners, wait for encrypted interested trajectories from requesters, and compute trajectory similarity between an interested trajectory and stored trajectories in ciphertext domain without learning anything about users’ trajectories.To compute a trajectory similarity over encrypted trajectories efficiently, a secure trajectory similarity computation protocol with longest common subsequence was proposed, which used somewhat homomorphic encryption and secure comparison protocol to compute the length of longest common subsequence over two encrypted trajectories.Furthermore, a ciphertext compression algorithm was designed to improve efficiency.Theoretical analysis and experimental evaluations show that pTSC method is secure and efficient.…”
Get full text
Article -
823
METHODICAL APPROACHES TO THE FORMATION OF ADAPTIVE MANAGEMENT STRUCTURES
Published 2019-10-01Get full text
Article -
824
Method of unknown protocol classification based on autoencoder
Published 2020-06-01“…Aiming at the problem that a large number of unknown protocols exist in the Internet,which makes it very difficult to manage and maintain the network security,a classification and identification method of unknown protocols was proposed.Combined with the autoencoder technology and the improved K-means clustering technology,the unknown protocol was classified and identified for the network traffic.The autoencoder was used to reduce dimensionality and select features of network traffic,clustering technology was used to classify the dimensionality reduction data unsupervised,and finally unsupervised recognition and classification of network traffic were realized.Experimental results show that the classification effect is better than the traditional K-means,DBSCAN,GMM algorithm,and has higher efficiency.…”
Get full text
Article -
825
Advances in Quantitative Analytical Methods for Solid Drugs
Published 2024-12-01“…In this paper, the quantitative analysis methods of polymorphs and pharmaceutical cocrystals are reviewed, the advantages and disadvantages of various methods are analyzed mainly from three types of techniques, namely, X-ray diffraction, spectroscopy, and thermal analysis, and the specific applications of various methods are commented on through examples. …”
Get full text
Article -
826
Sampling method for IDS in high bandwidth network
Published 2009-01-01“…A novel sampling method,IDSampling,was developed to solve the performance unbalance problem that IDS could not scale well in G+bit/s link,which was adaptive with the consumption of the memory bottleneck.With the help of the heuristic messages,such as the entropy of the single-packet flow and the flow length,IDSampling applied the simple sampling strategy based on the entropy of the single-packet flow when the large-scale anomaly occurred,or another complicated one instructed by the feedback of the rear detection results by default.In both cases IDSampling tried to guaran-tee the equal security with detection cost as low as it could.The results of experiment show that ①IDSampling keeps IDS effective by cutting off its load significantly when it is overloaded,at the same time it can guarantee the detection accuracy of the large-scale attack;②Comparing with the other two overwhelming sampling methods,the random packet sampling and the random flow sampling,the number of attack packets sampled by IDSampling is higher than that of the former two,the number outweighs the former two one order of magnitude especially in the large-scale anomaly case.…”
Get full text
Article -
827
Research and Application of the Solving Method for Robotic Workspace
Published 2015-01-01“…For the solution of the robotic workspace,on the basis of existing research methods,a new solution method which combines the advantage of Monte- Carlo method with Matlab simulation modeling capability is proposed. …”
Get full text
Article -
828
DEVELOPMENT OF THE INVOLVEMENT OF PERSONNEL BY METHODS OF HORIZONTAL MANAGEMENT
Published 2017-09-01“…Developing the concept of a horizontal control system, the author offers the model of formation of the involvement, which is based on two groups of methods: structuring business on processes and formation of organizational culture, as result of participation style of leadership. …”
Get full text
Article -
829
Nanoformulation of Spirooxindole and Methods for Treating Hepatocellular Carcinoma
Published 2025-01-01“…<b>Objectives:</b> This in vivo study introduces a newly developed spirooxindole derivative that is deemed safe and effective as a potential targeted therapy for various cancers. <b>Methods:</b> Extensive in vivo investigations, including histopathology, immunohistochemistry, and molecular biology, validated its potential for further preclinical and clinical exploration, necessitating comprehensive examinations of its bioavailability, pharmacodynamics, and pharmacokinetics. …”
Get full text
Article -
830
The Efficacy of Predictive Methods in Financial Statement Fraud
Published 2019-01-01“…A number of detective and predictive methods have been used to prevent, detect, and correct FSF, but their practicability has always been a big challenge for researchers and auditors, as they do not address real-world problems. …”
Get full text
Article -
831
On the Use of Quantitative Methods in Accounting Research in Poland
Published 2022-11-01Subjects: Get full text
Article -
832
Status of the Reactive Extraction as a Method of Separation
Published 2015-01-01“…This paper principally focuses on reactive extraction that is found to be a capable option to the proper recovery methods.…”
Get full text
Article -
833
-
834
Image cluster algorithm of hybrid encoding method
Published 2017-02-01“…In the clustering analysis based on swarm intelligence optimization algorithm,the most of encoding method only used single form,and this method might be limit range of search space,the algorithm was easy to fall into local op-timum.In order to solve this problem,image clustering algorithm of hybrid encoding (HEICA) was proposed.Firstly,a hybrid encoding model based on image clustering was established,this method could expand the scope of the search space.Meanwhile,it was combined with two optimization algorithms which improved rain forest algorithm (IRFA) and quantum particle swarm optimization (QPSO),this method could improve the global search capability.In the simulation experiment,it was carried out to illustrate the performance of the proposed method based on four datasets.Compared with results form four measured cluster algorithm.The experimental results show that the algorithm has strong global search capability,high stability and clustering effect.…”
Get full text
Article -
835
Novel method of constructing the zero-sum distinguishers
Published 2012-11-01“…A novel method of constructing the zero-sum distinguishers for AES-like permutations was proposed by considering the diffusion properties of these permutations,which have the similar construction.The method combined the higher-order integral attack and the higher-order differential attack.Utilizing the selected intermediate-state-structure whose active mode was determined,a higher-order integral path was constructed.Then,a higher-order differential trace was built from the two ends of the integral path.Applying the method,the full-round zero-sum attack on two permutations adopted by the PHOTON family was improved.Besides,a 31.5-round zero-sum distinguisher of the core function of JH hash function was constructed,which entered into the final round of the SHA-3 competition.…”
Get full text
Article -
836
APPLE BREEDING PROGRAMS AND METHODS: THEIR DEVELOPMENT AND IMPROVEMENT
Published 2015-01-01Subjects: Get full text
Article -
837
-
838
Percutaneous Method of Management of Simple Bone Cyst
Published 2013-01-01“…Minimally invasive percutaneous method using elastic intramedullary nail gives benefit of curettage cyst decompression and stabilization of fracture. …”
Get full text
Article -
839
DC‐offset elimination method for grid synchronisation
Published 2017-03-01Subjects: “…DC‐offset elimination method…”
Get full text
Article -
840
PRACTICAL TRAINING METHODS IN economic HIGHER schools
Published 2016-01-01“…The article describes the essence of one of the practical teaching methods - the personal-active approach. Providing detailed description of the personal-active approach authors bring forward the need for increasing attention to the practical side of educational process in economic universities and other higher schools- getting skills required in future professional areas.…”
Get full text
Article