Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
1381
Animal models of hemorrhage, parameters, and development of hemostatic methods
Published 2025-02-01Get full text
Article -
1382
Research of Comprehensive Parameter Measure Method of RV Reducer
Published 2018-01-01Subjects: Get full text
Article -
1383
Strong Convergence of Viscosity Iteration Methods for Nonexpansive Mappings
Published 2009-01-01Get full text
Article -
1384
A dynamic method for rolling transport network planning
Published 2017-09-01Subjects: Get full text
Article -
1385
Electrochemical Method for the Assay of Organic Peroxides Directly in Acetonitrile
Published 2025-01-01“…Herein, we propose an alternative electrochemical method to the classical iodometric titration method most widely used for determining the PV. …”
Get full text
Article -
1386
Formal modeling and analyzing method for database security policy
Published 2015-09-01“…Because of the high-level abstraction,insufficient description of database states and constraints,it was difficult to find the tiny flaws in design and implementation.Based on PVS,a method for formal description and analysis of data-base security policy was proposed,which was more close to the actual database,more widely used in reality,and more complete in describing the safe properties,more extendible of the model,and ensure the efficiency of modeling and veri-fication.Finally,this method is applied in the security policy modeling and analyzing of BeyonDB,which is a commer-cial database,find some security risks in the system design,and thereby verify its effectiveness.…”
Get full text
Article -
1387
Block Preconditioned SSOR Methods for -Matrices Linear Systems
Published 2013-01-01“…We present a block preconditioner and consider block preconditioned SSOR iterative methods for solving linear system . When is an -matrix, the convergence and some comparison results of the spectral radius for our methods are given. …”
Get full text
Article -
1388
CHANGES TO RETAIL BUSINESS MODELS - OVERVIEW OF THE DETERMINING FACTORS
Published 2016-05-01Subjects: Get full text
Article -
1389
Review of Particle Breakage Measurement Methods for Calcareous Sand
Published 2022-01-01“…The characteristic particle size measurement method for particle breakage is simple and has limitations. …”
Get full text
Article -
1390
Dimension Estimation Using Weighted Correlation Dimension Method
Published 2015-01-01“…Among all the dimension estimation methods, correlation dimension (CD) method is one of the most popular ones, which always assumes that the effect of every point on the intrinsic dimension estimation is identical. …”
Get full text
Article -
1391
Multiply Warped Products with a Semisymmetric Metric Connection
Published 2014-01-01“…We study the Einstein multiply warped products with a semisymmetric metric connection and the multiply warped products with a semisymmetric metric connection with constant scalar curvature, and we apply our results to generalized Robertson-Walker space-times with a semisymmetric metric connection and generalized Kasner space-times with a semisymmetric metric connection and find some new examples of Einstein manifolds with a semisymmetric metric connection and manifolds with constant scalar curvature with a semisymmetric metric connection.…”
Get full text
Article -
1392
-
1393
Measures and optimization methods of communications network energy efficiency
Published 2019-11-01“…Although network played an important role in energy efficiency improvement for many industries,network energy consumption had threatened the sustainable development of network operators,due to the fast increasing of the networks’ energy consumption recent years as the swift development of internet users,internet services and applications.The energy consumption risk faced by network operators,the research development of the measures and optimization methods of network energy efficiency was introduced.The energy efficiency optimization in the future network was finally concluded.…”
Get full text
Article -
1394
Methane detection approach based on THz wave absorber
Published 2025-02-01Subjects: Get full text
Article -
1395
Method of connection establishment between CPE and the cloud platform
Published 2016-12-01“…The main idea of vCPE is to split the CPE into two parts and to make the L3 functions up to the network. Through this method, CPE can be simplified and the difficulty for subscribers to operate and maintain CPE can be reduced. …”
Get full text
Article -
1396
Deception defense method against intelligent penetration attack
Published 2022-10-01“…The intelligent penetration attack based on reinforcement learning aims to model the penetration process as a Markov decision process, and train the attacker to optimize the penetration path in a trial-and-error manner, so as to achieve strong attack performance.In order to prevent intelligent penetration attacks from being maliciously exploited, a deception defense method for intelligent penetration attack based on reinforcement learning was proposed.Firstly, obtaining the necessary information for the attacker to construct the penetration model, which included state, action and reward.Secondly, conducting deception defense against the attacker through inverting the state dimension, disrupting the action generation, and flipping the reward value sign, respectively, which corresponded to the early, middle and final stages of the penetration attack.At last, the three-stage defense comparison experiments were carried out in the same network environment.The results show that the proposed method can effectively reduce the success rate of intelligent penetration attacks based on reinforcement learning.Besides, the deception method that disrupts the action generation of the attacker can reduce the penetration attack success rate to 0 when the interference ratio is 20%.…”
Get full text
Article -
1397
Decomposition Methods for Solving Finite-Horizon Large MDPs
Published 2022-01-01Get full text
Article -
1398
ANALYSIS AND TEST METHODS OF SUSPENSION STRUCTURE OF AIRBORNER MISSILE
Published 2019-01-01“…First, the inertia release method is used. This method can accurately simulate the boundary conditions of the hang up flight but the ground static test can’t be carried out accordingly. …”
Get full text
Article -
1399
-
1400
Fasting for male fertility—a mixed methods study
Published 2025-01-01Subjects: Get full text
Article