Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
1361
Engineered Porous Carbon for High Volumetric Methane Storage
Published 2014-08-01“…This paper covers the optimization of methane volumetric storage capacity by controlling the sub-nanometre (<1 nm) and supra-nanometre (1–5 nm) pore volumes. …”
Get full text
Article -
1362
Angular Photometry of Biological Tissue by Ellipsoidal Reflector Method
Published 2019-06-01“…Purpose of the research is investigation of the reflectance of biologic tissues by the ellipsoidal reflector method under the variable angle of the incident radiation.The research investigates functional features of improved photometry method by ellipsoidal reflectors. …”
Get full text
Article -
1363
A Method for Improving the Accuracy of Link Prediction Algorithms
Published 2021-01-01“…This study proposes a method for improving the accuracy of link prediction. …”
Get full text
Article -
1364
Method for determination of electromagnetic parameters of submersible induction motors
Published 2019-06-01Get full text
Article -
1365
Analysis of methods for calculating tooth interior fatigue fracture
Published 2022-04-01“…Methods (Findley, V. I. Korotkina, E. I. Tesker and V. …”
Get full text
Article -
1366
New Methods for Analyzing Complex Biomedical Systems and Signals
Published 2018-01-01Get full text
Article -
1367
FEATURES OF EDUCATIONAL AND METHODICAL WORK AT PIVOTAL TECHNICAL UNIVERSITY
Published 2016-12-01Subjects: Get full text
Article -
1368
THEORETICAL AND METHODICAL ASPECTS OF THE ANALYSIS OF THE WORLD FOOD MARKET
Published 2016-03-01Get full text
Article -
1369
MACRONUTRIENT CONTENT OF DRY LEAVES COMPOST BY VERMICOMPOSTING METHOD
Published 2023-09-01“…Mismanagement in dry leaves will promote the campus area to look dirty. One method to control the dry leaves waste is the vermicomposting process. …”
Get full text
Article -
1370
Accelerated traffic replay method based on time compression
Published 2021-10-01“…With the proliferation of network traffic, replaying traffic in a virtual environment faces many problems.In order to meet the requirements of traffic integrity and accuracy in the replay process, an accelerated traffic replay method based on time-compressed was proposed to achieve accelerated replay of real network traffic in a virtual environment.The method prioritized the compression of the largest time interval in the set of time intervals, and reduced the compression of the smaller intervals, thus reducing the traffic spike per unit time caused by time compression, and reducing the packet loss rate of traffic.The effect was measured in terms of packet loss rate, time interval error and similarity.The experiments show that this method has a lower packet loss rate and lower time interval error compared with the isometric compression method, although it performs worse in similarity.…”
Get full text
Article -
1371
Link prediction method based on the similarity of high path
Published 2021-07-01“…For the problem that the existing link prediction method has many problems, including low accuracy and low efficiency, a method of high-order path similarity link prediction was proposed.Firstly, the path was used as the judging feature to predict missing links in complex networks, which could make resource allocation more effective and restricts information leakage by punishing public neighbor pairs.Secondly, by using high order paths as judging features, the available long paths between seed nodes would be punished.Finally, several real complex network datasets were used for numerical examples calculation.Experimental results show that the proposed algorithm is more accurate and efficient than other baseline methods.…”
Get full text
Article -
1372
Mimic defense authentication method for physical access control
Published 2020-06-01“…To address the security problem of the vulnerability of the authentication methods of traditional physical access control systems,a mimic defense authentication method was designed based on the principle of mimic defense technique and its dynamic heterogeneous redundant architecture (DHR),using mobile 2D code as the interface and dynamic password as the core.First,the actuator pool of the authentication server was constructed.Then,a central controller consisting of functional modules such as input distribution agent,selector and voter was used to dynamically schedule heterogeneous redundant actuators from the actuator pool.Finally,a multimode ruling on the heterogeneous redundant actuator output to determine the authentication result was made by the voter.The experimental results show that the proposed authentication method has higher security and reliability compared to the traditional physical access control system authentication method,and at the same time,it can be used in combination with other authentication methods.…”
Get full text
Article -
1373
Dynamic adaptive offloading method based on WPT-MEC
Published 2022-12-01“…For the dynamic fading time-varying channel state information, a dynamic adaptive offloading (RLDO) method based on WPT-MEC was proposed to solve the task offloading and resource optimization problems for multiple users by combining wireless power transmission (WPT) technology and mobile edge computing (MEC).The wireless power transmission technology can provide energy to wireless end-user (WEU) and effectively alleviate the problem of limited energy supply from conventional batteries.To maximize the resource utilization, a wireless powered MEC network model was designed where the energy collected by the wireless end-user from the wireless access point (AP) was stored in a rechargeable battery, and then this energy was used for task computation or task offloading.The approach performed real-time offloading decisions through a fully connected deep neural networks (DNN) deployed in the MEC server.A fully binary offloading strategy was used for the offloading decision.Simulation results show that the computation rate of the method can still be maintained above 92% in a multi-user time-varying wireless channel-oriented environment.Compared with the basic method, it has great advantages in improving the calculation rate, reducing the delay and energy consumption,and effectively reduces computational complexity.…”
Get full text
Article -
1374
THE EXISTING APPROACHES AND METHODS OF FORECASTING OF DEMAND FOR CONTAINER TRANSPORTATIONS
Published 2016-01-01“…The methodical principles of the analysis of the object of forecasting are considered. …”
Get full text
Article -
1375
Editorial: Methods in cognitive neuroscience: dance movement 2023
Published 2025-01-01Subjects: Get full text
Article -
1376
Tripled Fixed Point Results in Generalized Metric Spaces
Published 2012-01-01“…We establish a tripled fixed point result for a mixed monotone mapping satisfying nonlinear contractions in ordered generalized metric spaces. Also, some examples are given to support our result.…”
Get full text
Article -
1377
Intelligent terminal device identification method of internet of things
Published 2017-02-01“…The correct identification of the terminal of the internet of things is an important prerequisite to establish a secure connection of the internet of things.The identification of the intelligent terminal is particularly important.The device identification method of intelligent terminals in internet of things under the existing technology was investigated.From the perspective of the security of the internet of things,the security problem that the device identification method was too simple to be easily falsified of the existing scheme was analyzed.Combining the achievements of project research in the field of internet of things and the experience of the industry,the identification method of multidimensional device feature information of IoT intelligent terminals was proposed.…”
Get full text
Article -
1378
A Variational Method for Multivalued Boundary Value Problems
Published 2020-01-01“…In this purpose, we use a variational method which relies on Szulkin’s critical point theory. …”
Get full text
Article -
1379
Intermediate risk prostate tumors contain lethal subtypes
Published 2025-01-01Get full text
Article -
1380
Efficient Method to Approximately Solve Retrial Systems with Impatience
Published 2012-01-01“…This technique, known as value extrapolation, truncates the infinite state space using a polynomial extrapolation method to approach the states outside the truncated state space. …”
Get full text
Article