Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
1421
Quinolin-4-ones: Methods of Synthesis and Application in Medicine
Published 2025-01-01“…The first synthesis of quinolinones took place at the end of the 19th century, and the most recent methods were published just a few years ago. They allow for obtaining an unlimited number of analogs differing in biological properties. …”
Get full text
Article -
1422
Study on Gas Control Methods Optimization for Mining Safety
Published 2021-01-01“…An investigation was undertaken to analyze effects of those four measures on gas emission, methane concentration, and gas drainage quantity in No. 2 1024 mining panel of No. 10 seam. …”
Get full text
Article -
1423
METHODS OF EFFECTIVE MANAGEMENT OF CREDIT INSTITUTION AT THE PRESENT STAGE
Published 2018-04-01“…By results of the conducted research the conclusion on influence of change of a key interest rate on income of commercial banks at management of liquidity in the conditions of percentage risk. Methods of modeling of interest income of bank are presented.…”
Get full text
Article -
1424
Selection of Construction Methods: A Knowledge-Based Approach
Published 2013-01-01“…A prototype of a Construction Methods Knowledge System (CMKS) was developed and then validated with construction industry professionals. …”
Get full text
Article -
1425
RANKING FACTORS FOR SUPPLIER SELECTION WITH APPLICATION OF THE FTOPSIS METHOD
Published 2017-05-01“…The answers received were processed and the factors were ranked using the fuzzy TOPSIS method. The results showed that various factors are used in this cooperation with suppliers. …”
Get full text
Article -
1426
A speech recognition method with enhanced transformer decoder
Published 2025-02-01Get full text
Article -
1427
Composite Operator Method Analysis of the Underdoped Cuprates Puzzle
Published 2014-01-01“…The microscopical analysis of the unconventional and puzzling physics of the underdoped cuprates, as carried out lately by means of the composite operator method (COM) applied to the 2D Hubbard model, is reviewed and systematized. …”
Get full text
Article -
1428
Pre-sorting method of complex system radar signals
Published 2018-09-01“…The overall pulse parameters of complex system radar signals are varied and overlap seriously.The accuracy rate of the method using overall pulse parameter sorting is seriously decreased,but the intra pulse characteristic parameters are relatively stable.A method for pre-sorting radar signals in complex systems was proposed by extracting the phase coefficient of the intra-pulse characteristic parameters of the signal,combining the more stable inter-pulse parameters,and using the improved support vector clustering algorithm.Simulation results show that in the pre-sorting of complex system radar signals,the problem of increasing-batch can be solved effectively and the accuracy of sortingcan be improved.…”
Get full text
Article -
1429
GARMENT PRODUCT COST CALCULATIONS BY METHOD FULL COSTING
Published 2021-09-01“…These results are proven, that using the full costing method the company gets greater profits than before, because the calculated costs for calculating the cost of goods are more detailed and carried out effectively according to the needs for production.…”
Get full text
Article -
1430
Novel NFA engine construction method of regular expressions
Published 2014-10-01“…A novel method for constructing smaller non-deterministic finite automata (NFA) engine from given regular expressions named PFA was proposed.There are three main algorithms in PFA,the pretreatment algorithm,the coding parser tree algorithm and the NFA construction algorithm based on the coded binary tree.The smaller NFA named NFA<sub>p</sub> with only one start state and one final state can be obtained by using PFA construction method.NFA<sub>p</sub>have linear size in terms of the size of given regular expressions.It is the smallest NFA comparing with current methods like Thompson NFA,follow automata,position automata and partial derivatives automata.The size of NFA<sub>p</sub>is one third of Thompson’s and it is smaller than the size of follow automata whose size has nearly closed to optimal.…”
Get full text
Article -
1431
Global Synthesis Method for the Optimization of Multifeed EBG Antennas
Published 2008-01-01“…The method is validated through a numerical design of an EBG antenna excited with four patch antennas. …”
Get full text
Article -
1432
Convergence analysis of the iterative methods for quasi complementarity problems
Published 1988-01-01“…In this paper, we consider the iterative methods for the quasi complementarity problems of the formu−m(u)≥0, T(u)≥0, (u−m(u),T(u))=0,where m is a point-to-point mapping and T is a continuous mapping from Rn into itself. …”
Get full text
Article -
1433
Effect of Method Type on the Response of Continuum Vibro-Impact
Published 2019-01-01“…The force integration method (FIM) and the methods based on the mode transfer principle are the frequently used choices for solving the vibro-impact problem of continuum. …”
Get full text
Article -
1434
SDN control and forwarding method based on identity attribute
Published 2019-11-01“…Due to the lack of effective data source authentication mechanism and the limited matching fields in software defined networking (SDN),an SDN security control and forwarding method based on identity attribute was proposed.Attribute identification and attribute signature were generated by device attributes and encapsulated in the group header.When the data flow left the network,the data was verified by the forwarding device to ensure the validity of the data flow.At the same time,attribute identification was defined as a match field of flow by the framework,and the network forwarding behavior was defined based on attributeidentification.A fine-grained access control was implemented by the proposed mechanism and attribute-based signature.The proposed mechanism and attribute-based signature implemented a fine-grained access control.Experimental results demonstrate that the method can effectively implement fine-grained forwarding and flow authentication,and the forwarding granularity is higher than that of similar schemes.…”
Get full text
Article -
1435
-
1436
THE USE OF THE AGROPHOTOVOLTAIC SYSTEMS – A METHOD FOR THE SUPPORTING SUSTAINABILITY
Published 2024-12-01Get full text
Article -
1437
-
1438
-
1439
Escape method of malicious traffic based on backdoor attack
Published 2024-04-01“…Launching backdoor attacks against deep learning (DL)-based network traffic classifiers, and a method of malicious traffic escape was proposed based on the backdoor attack. …”
Get full text
Article -
1440
Georg Simmel – Norbert Elias – Alfred Sohn-Rethel
Published 2020-07-01Subjects: “…Sohn-Rethel…”
Get full text
Article