Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
981
(Retail) platform legitimation through municipal partnerships?
Published 2025-06-01Subjects: Get full text
Article -
982
IoT intrusion detection method for unbalanced samples
Published 2023-02-01“…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
Get full text
Article -
983
Service substitution method based on composition context
Published 2014-09-01“…With the variety of requirements from service requesters and the increasing complexity of network environ-ments,service composition has become more and more complicated.In order to decrease redundant information of the substituted service and improve the accuracy of service substitution,the composition context was regarded as the match-ing criteria and tried to substitute failed service with the following two steps.First,a composition context information collecting algorithm (CCICA) was proposed based on the color petri net model of the service workflow,and regarded the composition context as the collecting source of service information.Second,a levenshtein distance-based service substi-tution method (LDBSSM) was given,which was integrated with dependencies between service interfaces.Simulation re-sults show that the proposed LDBSSM method is practical because it can not only reduce redundancy of substituted ser-vice information but also effectively improve the accuracy of service substitution.…”
Get full text
Article -
984
The Model of Disengagement of Talent with Meta-synthesis Method
Published 2024-11-01“…Methods This study is a qualitative research project utilizing the meta-synthesis method. …”
Get full text
Article -
985
A New Method of Kronecker Product Decomposition
Published 2023-01-01“…Theoretical results ensure that the new method is convergent and stable. The simulation results show that the new method is far faster than the known method. …”
Get full text
Article -
986
Provocative Methods of Non-Corrupt Consciousness Formation
Published 2015-02-01“…The paper is devoted to the necessity of using the provocative methods in pedagogy regarding them as the most effective ones in education focused on fighting the corruption. …”
Get full text
Article -
987
An integrated method for taxonomic identif ication of microorganisms
Published 2020-07-01“…For accurate species-level identification of microorganisms, researchers today increasingly use a combination of standard microbiological cultivation and visual observation methods with molecular biological and genetic techniques that help distinguish between species and strains of microorganisms at the level of DNA or RNA molecules. …”
Get full text
Article -
988
Survey of waste disposal methods in Awka metropolis
Published 2015-07-01“…Waste disposal methods commonly practiced in Awka metropolis, Anambra state were investigated from August to October, 2013. …”
Get full text
Article -
989
-
990
-
991
The “Hand-as-Foot” teaching method in the anatomy of nasopharynx
Published 2025-02-01Get full text
Article -
992
Method and Algorithm for Processing Large Volume Images
Published 2023-12-01“…The article proposes a new method and an algorithm based on it for processing large-volume images. …”
Get full text
Article -
993
Analytical Methods to Characterize and Purify Polymeric Nanoparticles
Published 2018-01-01“…., proteins from the blood), and analytical characterization and purification methods. Currently available literature of this last group only describes methodologies applied for a specific type of nanomaterial or even methods used for bulk materials, which are not completely applicable to nanomaterials. …”
Get full text
Article -
994
-
995
Application of Bifurcation Method to the Generalized Zakharov Equations
Published 2012-01-01“…We use the bifurcation method of dynamical systems to study the traveling wave solutions for the generalized Zakharov equations. …”
Get full text
Article -
996
Our anaesthesia experiences and methods in burn patients
Published 2024-04-01“…After obtaining the approval of the Ethics Committee (E2-23-5042), the demographic data of the patients, percentage and degree of burn, aetiology of burn injury, number of surgical procedures performed and the types of anaesthesia administered, were evaluated through a retrospective review of the patient files. …”
Get full text
Article -
997
-
998
Exclusion Methods for Managing Greenhouse Vegetable Pests
Published 2008-04-01“…ENY-846/IN730: Exclusion Methods for Managing Greenhouse Vegetable Pests (ufl.edu) …”
Get full text
Article -
999
Strong Convergence of a Projected Gradient Method
Published 2012-01-01“…The projected-gradient method is a powerful tool for solving constrained convex optimization problems and has extensively been studied. …”
Get full text
Article -
1000
The stability of collocation methods for VIDEs of second order
Published 2005-01-01“…Simplest results presented here are the stability criteria of collocation methods for the second-order Volterra integro differential equation (VIDE) by polynomial spline functions. …”
Get full text
Article