Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
1001
ADAPTIVE METHOD OF STABILIZATION THE AGGLUTINANT SANDS CHARACTERISTICS
Published 2005-05-01“…The method of stabilization of the sand blend technological characteristics is developed on the basis of flexible control of the mix preparation process taking into account the failures and changes of the technological equipment parameters and also the composition and characteristics of source materials.…”
Get full text
Article -
1002
Qualitative methods: the missing link in orthopaedic research
Published 2025-01-01Subjects: “…qualitative methods…”
Get full text
Article -
1003
The Application of SVMs Method on Exchange Rates Fluctuation
Published 2009-01-01Get full text
Article -
1004
Standardization of the Agar Plate Method for Bacteriophage Production
Published 2024-12-01Subjects: Get full text
Article -
1005
Intelligent Scheduling Method Supporting Stadium Sharing
Published 2021-01-01“…The booking of the shared stadium can be regarded as a mobile edge computing (MEC) scenario, and the problem can be transformed into task scheduling research under MEC through intelligent scheduling method. When using edge computing (EC) technology for service calculation, the mobile terminal needs to offload the service to the edge computing server. …”
Get full text
Article -
1006
Hybrid Evaluation Method of Bridge Bearing Capacity
Published 2024-09-01“… This study proposes a new method to assess the bearing capacity of similar bridges while avoiding the disadvantages of costly static loading tests. …”
Get full text
Article -
1007
Enhanced method based on virtual registers rotation
Published 2018-05-01“…Sematic attacks based on the data flow analysis bring big challenges to the code obfuscation.Concerning the data flow of virtual machine based (VM-based) code protection,the method transfers the mapping relation between the virtual registers and the op-code of the bytecode during executing,which means the uncertainty and complexity of the data flow during interpretive execution of the bytecode.In addition,three policies are proposed to address the problem that how to choose the length of rotation for each bytecode,which grows complexity of the protection.Finally,a prototype of VRR-VM (virtual machine protection system based on virtual registers rotation) was implemented.Experiment results show that the method is effective and applicable for anti-reversing.…”
Get full text
Article -
1008
Comparison of Mechanical Impedance Methods for Vibration Simulation
Published 1996-01-01“…The ways in which these effects can be considered were evaluated, and comparison of three impedance methods was accomplished based on a cumulative damage criterion. …”
Get full text
Article -
1009
Identification of aquifer heterogeneity through inverse methods
Published 2022-10-01Subjects: Get full text
Article -
1010
Application of identification method for control of bearing wear
Published 2022-06-01“…The work is devoted to the problem of bearings wear control of during their operation. Well-known methods for control the state of bearings to solve this problem are described. …”
Get full text
Article -
1011
-
1012
DAMAGE IDENTIFICATION METHOD BASED KRIGING MODEL
Published 2020-01-01“…To improve damage identification efficiency,a damage identification method based on Kriging model was proposed. Sample points were chosen based on Latin hypercube sampling,and Kriging model was built using acceleration frequency response functions corresponding to the damage parameters;then,Kriging model with good precision was used to replace the finite element model to participate in the optimization process. …”
Get full text
Article -
1013
SOME ITERATIVE METHODS FOR QUASI-EQUILIBRIUM PROBLEMS
Published 2012-09-01Subjects: Get full text
Article -
1014
Different Methods of Secondary Intraocular Lens Implantation
Published 2023-01-01Get full text
Article -
1015
To the question of the methodic of universities’ scientific potential appreciation
Published 2019-09-01“…The main purpose of the study is to develop, substantiate and test methods for assessing the scientific potential of universities. …”
Get full text
Article -
1016
Guidance for Processing Smoked Seafood in Retail Operations
Published 2005-04-01“…FSHN0503/FS111: Guidance for Processing Smoked Seafood in Retail Operations (ufl.edu) …”
Get full text
Article -
1017
Noise Radar Technology as an Interference Prevention Method
Published 2013-01-01Get full text
Article -
1018
On π-Images of Locally Separable Metric Spaces
Published 2008-01-01“…We characterize π-images of locally separable metric spaces by means of covers having π-property. …”
Get full text
Article -
1019
RASP based Web security detection method
Published 2020-11-01“…At present,the traditional Web security detection methods act on the input and output of the program,which can not prevent malicious code entering the program after being distorted and confused,and it is difficult to meet the new requirements of Web application security protection.Based on the in-depth analysis of the risk of traditional data flow monitoring methods,combined with the technical characteristics of rasp,a Web security detection method based on rasp was proposed.The rasp probe was embedded in the parameters of authority discrimination function,system command execution function and database operation function in Web application,and the change of data flow was detected in real-time at the code interpreter level.This method was implemented based on Java language.It was proved in the laboratory that this method is better than the traditional Web security detection method in accuracy and detection time.Finally,the deployment and application scenarios of this method were analyzed and proposed.…”
Get full text
Article -
1020
The dual integral equation method in hydromechanical systems
Published 2004-01-01“…Some hydromechanical systems are investigated by applying the dual integral equation method. In developing this method we suggest from elementary appropriate solutions of Laplace's equation, in the domain under consideration, the introduction of a potential function which provides useful combinations in cylindrical and spherical coordinates systems. …”
Get full text
Article