Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
961
Improvement of Methods for Analysis of Product Resource-Ability
Published 2012-04-01“…The paper considers development of methods in respect of probability theory of extreme values and its application for estimation of resource characteristics. …”
Get full text
Article -
962
An interior proximal gradient method for nonconvex optimization
Published 2024-07-01Subjects: Get full text
Article -
963
Intrusion detection method for IoT in heterogeneous environment
Published 2024-04-01“…Ultimately, experimental results derived from the network intrusion dataset BoT-IoT substantiate that, relative to existing methods, the proposed method notably curtails the time expenditure of resource-constrained clients, and improves processing speed by 20.82%, while enhancing the accuracy of intrusion detection by 0.86% in Non-IID conditions.…”
Get full text
Article -
964
Research on methods of workers’ context description in mines
Published 2019-12-01“…The worker’s unsafe behavior is the key cause of mine accidents.The human activity is closely related with the context.Ontology is widely used in computer science in the field of information exchange and knowledge sharing,which contains complex structures and various semantics.Firstly,the research on the description of the miners’ situational information in the mining field was summarized.It introduced the general situation in the field of the Internet of things.The importance and necessity of the description of the state information of mine personnel was presented.It introduced the research background,including semantic web,context description and knowledge representation.After that,the method of information description of mine personnel was described.The ontology model was proposed based on oneM2M international technical specifications.In order to construct this ontology,it was drawed on some of the core concepts of oneM2M Base Ontology.The concept classes,attributes and relationships that are specific to the information description of mine personnel were put forward.The context description of mine personnel proposed was aimed at achieving the purposes of specification information description,data semantic labeling,knowledge sharing and reuse.Finally,the conclusions were drawn and the prospect of using the ontology method for context perception and the miners’ unsafe behavior recognition was presented.…”
Get full text
Article -
965
-
966
Pedagogical Innovative Methods and Classroom Management in Nigeria
Published 2022-10-01Subjects: Get full text
Article -
967
New Method of Solving the Economic Complex Systems
Published 2020-01-01“…In this study, the authors first develop a direct method used to solve the linear nonhomogeneous time-invariant difference equation with the same number for inputs and outputs. …”
Get full text
Article -
968
Network traffic classification method basing on CNN
Published 2018-01-01“…Since the feature selection process will directly affect the accuracy of the traffic classification based on the traditional machine learning method,a traffic classification algorithm based on convolution neural network was tailored.First,the min-max normalization method was utilized to process the traffic data and map them into gray images,which would be used as the input data of convolution neural network to realize the independent feature learning.Then,an improved structure of the classical convolution neural network was proposed,and the parameters of the feature map and the full connection layer were designed to select the optimal classification model to realize the traffic classification.The tailored method can improve the classification accuracy without the complex operation of the network traffic.A series of simulation test results with the public data sets and real data sets show that compared with the traditional classification methods,the tailored convolution neural network traffic classification method can improve the accuracy and reduce the time of classification.…”
Get full text
Article -
969
Geometry of Hamiltonian Dynamics with Conformal Eisenhart Metric
Published 2011-01-01“…We characterize the geometry of the Hamiltonian dynamics with a conformal metric. After investigating the Eisenhart metric, we study the corresponding conformal metric and obtain the geometric structure of the classical Hamiltonian dynamics. …”
Get full text
Article -
970
Superconvergence of finite element method for parabolic problem
Published 2000-01-01Get full text
Article -
971
RAP detection method based on AP fingerprint
Published 2018-05-01“…The access point (AP) is an integral part of the infrastructure mode in wireless network.While the attacks caused by rogue AP (RAP) divulge a lot of users' privates in a large extent,such as the user's location information,surfing behavior on the Internet and social relations.A RAP detection algorithm based on AP fingerprint was proposed.The validity of AP was judged by the unforgeability and stability of the parameters of beacon frames.And the feasibility and effectiveness of the proposed method were further verified by scheme comparisons and experimental analysis.…”
Get full text
Article -
972
Review of Methods for Detection Helicobacter pylori in Kazakhstan
Published 2025-01-01Subjects: Get full text
Article -
973
CURRENT TRENDS ON MATERIALS AND METHODS FOR TEETH WHITENING
Published 2024-12-01“…The purpose of teeth whitening is the removal of intrinsic or extrinsic discoloration via mechanical or chemical techniques that restore the teeth to their natural shade or lighten it, depending on the chosen method. Both the abrasive particles used in mechanical procedures and the oxidant agents applied in chemical bleaching are effective if they are used according to the stain aetiology, however, the risks associated with these products (e.g. potential tooth wear, sensitivity, damage of the enamel or dentin organic matrix) are not negligible. …”
Get full text
Article -
974
Plant Sources, Extraction Methods, and Uses of Squalene
Published 2018-01-01“…The aim of this review is to provide an overview of SQ to establish research focus with special reference to plant sources, extraction methods, and uses.…”
Get full text
Article -
975
Using "peer review" method for language assessment
Published 2019-09-01Subjects: “…"peer review" method…”
Get full text
Article -
976
Methods to Test the Compressive Strength of Earth Blocks
Published 2021-01-01“…However, there is still much debate on the best method to accurately measure the compressive strength of earth blocks. …”
Get full text
Article -
977
The “Hand-as-Foot” teaching method in chronic dacryocystitis
Published 2025-02-01Get full text
Article -
978
Tauberian conditions for a general limitable method
Published 2006-01-01“…Let (un) be a sequence of real numbers, L an additive limitable method with some property, and and different spaces of sequences related to each other. …”
Get full text
Article -
979
Fundamentals and Methods for T- and B-Cell Epitope Prediction
Published 2017-01-01“…Subsequently, we provide a systematic and inclusive review of the most relevant B- and T-cell epitope prediction methods and tools, paying particular attention to their foundations.…”
Get full text
Article -
980
Construction method of double unicast network coding
Published 2020-09-01“…In order to use network coding technology for data transmission in double unicast network,a construction method of double unicast network coding was proposed.The pre-coding strategy was implemented at each source node,the random linear network coding combined to the multi-objective optimization evolutionary algorithm was adopted to design the local coding vector of each channel.At the each sink node,the base vector of zero space of matrix was used to eliminate some information interference,and then the two-level pre-coding strategy was used to control the transmission rate at source.Thus,each sink node could be decoded successfully.With the proposed method,the approximate reachable information rate region of double unicast network coding could be determined and the transmission scheme for each vector in the reachable information rate region could be designed.Theoretical derivation and simulation calculation show the effectiveness of the proposed method.…”
Get full text
Article