Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
1281
STRUCTURAL SHAPE OPTIMIZATION BY ISOGEOMETRIC BOUNDARY ELEMENT METHOD
Published 2019-01-01Subjects: Get full text
Article -
1282
A Prediction Method for the RUL of Equipment for Missing Data
Published 2021-01-01“…Experiments are carried out on the commercial modular aero-propulsion system simulation (C-MAPSS) dataset to validate the proposed method. The prediction results show that the proposed method outperforms other methods when packet loss occurs, showing significant improvements in the root mean square error (RMSE) and the score function value.…”
Get full text
Article -
1283
Iterative estimation method for random interleaver of Turbo codes
Published 2015-06-01“…Channel coding parameter analysis meant reversely analyzing and estimating the coding parameters,and was one of the key techniques for intelligent communication,information interception and so on.Since Turbo codes were widely used in communication systems,parameter estimation for their interleavers was of great importance.Focusing on the random interleaver of Turbo codes,an iterative estimation algorithm based on correlation decision between the soft outputs of the Turbo decoder was presented.The algorithm used soft-decisions of the demodulator output sequence.It overcame the shortcomings of existing methods which often aimed at certain interleaving structures only,and suffered from weak robustness since they used hard-decisions.Simulation results show that the proposed algorithm has better performance and relatively lower complexity,especially in low signal-to-noise ratio cases.…”
Get full text
Article -
1284
Digital Empowerment of the Innovation of Ideological and Political Education Methods
Published 2024-01-01“…In the digital era, ideological and political education plays a leading role in the field of ideology and politics, and it should make use of big data technology to enhance the cohesion and leadership of the mainstream ideology, to enhance the vividness of ideological and political education by adapting educational content and methods, and to gather the power of ideological and political education by taking digital technology as the basis, breaking through the limitations of time and space and the field, and realizing the collection and sharing of high-quality resources.…”
Get full text
Article -
1285
A Survey of Matrix Completion Methods for Recommendation Systems
Published 2018-12-01“…This article presents a comprehensive survey of the matrix completion methods used in recommendation systems. We focus on the mathematical models for matrix completion and the corresponding computational algorithms as well as their characteristics and potential issues. …”
Get full text
Article -
1286
Method of diversity software protection based on fusion compilation
Published 2020-12-01“…For the obvious characteristics and single mode of the existing common protection methods,with the help of the LLVM framework,a diversity software protection method based on fusion compilation was proposed.In the proposed method,the target software is encrypted randomly,and deeply integrated with the bunker code at the compilation level,and the encrypted target software is decrypted by memory execution technology.Then it is executed in the form of no process in memory,and the diversified protection effect of the target software is realized by the diversity of the bunker and the randomness of the fusion strategies.A number of commonly used software are selected as the test case,and the proposed method is tested from the aspects of resource cost,protection effect,comparative experiment and so on.Compared with the traditional methods such as obfuscation and packing,the proposed method has great advantages in anti-static analysis and anti-dynamic debugging,and can effectively resist the mainstream methods of reverse analyzing and cracking.…”
Get full text
Article -
1287
Clinical method, ‘’good clinical practices’’, and medical professionalism
Published 2010-12-01“…It is pointed out that the clinical method is the scientific or experimental method of science applied to the attention of an individual patient, but in this case the experimental stage is replaced by the confrontation with diagnostic technology. …”
Get full text
Article -
1288
Power emergency assistant decision methods based on CBR
Published 2015-12-01“…Application of case-based reasoning(CBR)to generate grid infrastructure accidents emergency disposal scheme,can provide auxiliary decision scientific method for emergency people.Through investigation and analysis of the electric accident case,conclude basic situation,disposal process,disposal effect in three aspects of the characteristic attributes presentation framework of power accidents.Search similar case in two methods by means of inductive retrieval and similarity calculation.The determination of membership function of fuzzy attributes by using expert scoring was put forward.Fuzzy attribute similarity by membership functions was calculated and the power accidents case-based reasoning emergency disposal of the auxiliary decision-making process were given.…”
Get full text
Article -
1289
Cloud resource allocation method based on time collaboration
Published 2014-11-01“…According to the application in the cloud computing environment load and load change is difficult to predict the amount of real time.A resource allocation method based on cooperative time was designed,the application of this method in the process of operation,according to the load and the task processing time,formulate the resource allocation scheme for multi virtual machine cooperation.The method uses time collaborative to effectively reuse resource,improves the utilization rate of data center resources,and further reduces the cost of operation and maintenance of data center.It has realistic significance to the increase of cloud resource provider profit.…”
Get full text
Article -
1290
Intention embedding method based social bot detection
Published 2024-11-01“…Artificial intelligence generated content technology has significantly enhanced the disguise capabilities of social bots, presenting new challenges to existing bot detection methods. By modeling the intentions of social media users through intention representation, a intention embedding method based social bot detection was proposed, thereby avoiding the difficulty of directly detecting bots with enhanced behavioral camouflage at the action level on social platforms. …”
Get full text
Article -
1291
Application of New Austrian Method in Construction of Guanyinshan Tunnel
Published 2003-01-01Get full text
Article -
1292
Performance evaluation metric for statistical learning trading strategies
Published 2024-12-01Subjects: “…multi-class classification metrics…”
Get full text
Article -
1293
Study on the Finite Element Simulation Method of the Belt Skew
Published 2017-01-01Subjects: Get full text
Article -
1294
Metric Induced Morphological Operators on Intuitionistic Fuzzy Hypergraphs
Published 2018-01-01Get full text
Article -
1295
Plateau problem and minimal surfaces: numerical methods and applications
Published 2023-11-01Subjects: Get full text
Article -
1296
Effect of the Synthesis Methods on Hydrophobic Properties of Modified Silicas
Published 2015-08-01“…Composites based on fumed silica with surface hydrophobic groups were synthesized by chemical substitution of silanol groups' proton for trimethylsilyl (TMS) groups, adsorption of poly(dimethylsiloxane) (PDMS) and combined chemical-adsorption methods. Microcalorimetry measurements and values of the wetting contact angle with water (Θ) were obtained to investigate the hydrophobic properties of prepared materials. …”
Get full text
Article -
1297
Opinion mining method on hot topic of micro−blog
Published 2014-11-01“…A method of opinion mining was argued in connection with hot topic of micro-blog.Firstly,opinion sentences are identified by syntactic dependencies templates and support vector machine (SVM).Secondly,the opinion words can be get in opinion sentences by syntactic dependencies and lexical relations,thus they can be displayed clearly.Finally,the experiment proves the effectiveness of this method.…”
Get full text
Article -
1298
-
1299
The Alternating Direction Method of Multipliers for Sufficient Dimension Reduction
Published 2024-01-01“…The minimum average variance estimation (MAVE) method has proven to be an effective approach to sufficient dimension reduction. …”
Get full text
Article -
1300
Limiting the Carbon Footprint of an Enterprise: Calculation Methods and Solutions
Published 2023-11-01Get full text
Article