Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
1501
Gear Fault Recognition based on Local Detail Spectrum
Published 2018-01-01Subjects: Get full text
Article -
1502
Kosova’s Goddess on the Throne: Critical Fabulation as an Anthropological Method
Published 2023-12-01“…My case study invokes the material object as agent of its own narration through tracking historical processes that destabilize notions of linear time, connecting the past to the present in interesting, sometimes disconcerting, ways. I use the method of critical fabulation, specifically the medium of poetry, to reveal key points of rupture surrounding the goddess’s role as a modern symbol, but also to demonstrate how poetic exercises can serve as alternatives to museum labels. …”
Get full text
Article -
1503
Generative steganography method based on auto-generation of contours
Published 2021-09-01“…To address the problems of limited hiding capacity and inaccurate information extraction in the existing generative steganography methods, a novel generative steganography method was proposed based on auto-generation of contours, which consisted of two main stages, such as the contour generation driven by secret information and the contour-to-image transformation.Firstly, the contour generation model was built based on long short term memory (LSTM) for secret information-driven auto-generation of object contours.Then, a contour-to-image reversible transformation model was constructed based on pix2pix network to obtain the stego-image, and the model also supported the reversible transformations from the stego-image to contours for secret information extraction.Experimental results demonstrate that the proposed method not only achieves high hiding capacity and accurate information extraction simultaneously, but also effectively resists the attacks by steganalysis tools.It performs much better than the state-of-the-art generative steganographic methods.…”
Get full text
Article -
1504
A direct slicing method for optimized lattice structures
Published 2024-01-01“…Previous research show that conventional CAD B-Rep methods are highly inefficient to design large lattice structures composed of several thousands of geometric primitives describing struts [2,3]. …”
Get full text
Article -
1505
Method for determining of cytotoxicity based on the release of fluorescent proteins
Published 2025-01-01“…This method also makes it possible to independently determine the viability of different lines when used in cocultures. …”
Get full text
Article -
1506
Submarine Disposal Method of Mine Tailings (Slurry Sludge)
Published 2020-01-01Subjects: Get full text
Article -
1507
Metric Divergence Measures and Information Value in Credit Scoring
Published 2013-01-01Get full text
Article -
1508
A New Kinetic Spectrophotometric Method for the Quantitation of Amorolfine
Published 2017-01-01“…Journal of Analytical Methods in Chemistry…”
Get full text
Article -
1509
Calculation Method of Gravity Center and Moment of Radial Gate
Published 2021-01-01“…The gravity moment of radial gate is an important factor affecting the opening and closing force.In this paper,the analytical formulas of gravity,gravity center and gravity moment of radial gate are derived theoretically,and the influence of two parameters of its gravity center (radius r<sub>G</sub> and inclination θ<sub>G</sub>) on its opening and closing force are analyzed.On these basis,a simple method for calculating its gravity center is presented.Taking the spillway radial gate and spillway tunnel radial gate of Pankou hydropower station as examples,the rationality and superiority are verified.The results show that compared with the results of empirical formula and 3d model,combination method and rotation method have the advantages of high accuracy and versatility;rotation method is more convenient than the combination method and is an optimal calculation method for gravity center of radial gate.In the two parameters of center of gravity,radius r<sub>G</sub> has a greater influence on the opening and closing force of radial gate,and inclination θ<sub>G</sub> has a less influence on it.The simple calculation formula is suitable for radial gate without local weighting block,which can overcome the disadvantage of complex calculation of rotation method.In order to achieve high precision and efficiency,the applicability and advantages of empirical formula,rotation method and simple method should be comprehensively utilized in the design.…”
Get full text
Article -
1510
Robust identification method of website fingerprinting against disturbance
Published 2024-12-01“…The existing website fingerprint identification method with the best robustness named RF can maintain good performance against various defense methods, but it is difficult to resist the targeted defense method RF Countermeasure. …”
Get full text
Article -
1511
Methods of Physical Evidence Verification in the Criminal Proceedings of Ukraine
Published 2019-05-01Subjects: Get full text
Article -
1512
Image Creation Methods in Children's Poetry of the 1990s in Iran
Published 2024-05-01Get full text
Article -
1513
Changeover method for biosafety cabinets using ozone gas.
Published 2025-01-01Get full text
Article -
1514
Machine Learning Methods for Weather Forecasting: A Survey
Published 2025-01-01“…Research on specific tasks such as global weather forecasting, downscaling, extreme weather prediction, and how to combine machine learning methods with physical principles are very active in the current field. …”
Get full text
Article -
1515
Chosen message attacks method against ECC implementations
Published 2014-05-01“…The method applies to the prime filed ECC cryptographic algorithms.…”
Get full text
Article -
1516
A Method of Conversation Analysis in Narrative and Historical Texts
Published 2021-09-01“…Conversational analysis is a field in discourse and researchers in this field have proposed methods for conversation analysis that are not comprehensive for all types of texts. …”
Get full text
Article -
1517
Some New Aspects of Metric Fixed Point Theory
Published 2021-01-01“…In this manuscript, we prove fixed point results in Rm-metric spaces endowed with an amorphous binary relation. …”
Get full text
Article -
1518
Expiratory Flow Limitation Definition, Mechanisms, Methods, and Significance
Published 2013-01-01Get full text
Article -
1519
Understanding Methods for Estimating HIV-Associated Maternal Mortality
Published 2012-01-01“…This paper presents and compares the methods and discusses how they affect estimates at global and regional levels. …”
Get full text
Article -
1520
Network Anomaly Prediction Method Based on Big Data
Published 2014-06-01“…With the development of the network technology and expansion of the network size,the probability of network anomaly is greatly increased,which makes network management face greater challenges.An important task of network management is network anomaly detection in time based on the data got by network management system (NMS); the performance of network management will be great improved if the network anomaly could be detected before it really happen.A method of network anomaly prediction based on big data was presented,the traditional process act as “first alarm,then solve”was replaced by anomaly prediction process.The result is significant for improving network availability and reliability.…”
Get full text
Article