Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
1521
DepITCM: an audio-visual method for detecting depression
Published 2025-01-01“…These results demonstrate that our method outperforms most existing methods in both classification and regression tasks. …”
Get full text
Article -
1522
METHODICAL APPROACH TO COMPLEX ASSESSMENT OF QUALITY OF CUSTOMS SERVICES
Published 2019-09-01Subjects: Get full text
Article -
1523
Hybrid Chebyshev-Type Methods for Solving Nonlinear Equations
Published 2024-12-01Subjects: “…Chebyshev method…”
Get full text
Article -
1524
Facies-Constrained Kriging Interpolation Method for Parameter Modeling
Published 2024-12-01“…The FC-Kriging method modifies the Euclidean distance metric used in Kriging so that the distance between two points depends not only on their spatial coordinates but also on their associated facies categories. …”
Get full text
Article -
1525
Data backup methods for mission-critical information systems
Published 2022-03-01“…The study aimed to develop an effective strategy for backing up data for critical enterprise information systems.Methods. The method for solving the problem was to create backup copies of enterprise information systems using a flexible architecture based on the backup—as a service in external cloud structures—in combination with technical resources of the organization.Results. …”
Get full text
Article -
1526
Iterative Splitting Methods for Integrodifferential Equations: Theory and Applications
Published 2014-01-01“…We present novel iterative splitting methods to solve integrodifferential equations. Such integrodifferential equations are applied, for example, in scattering problems of plasma simulations. …”
Get full text
Article -
1527
Possibility-Based Sizing Method for Hybrid Electric Aircraft
Published 2025-01-01“…It is crucial to account for uncertainties at the sizing stage to ensure reliable outcomes, highlighting the need for a method that efficiently integrates uncertainty into the process. …”
Get full text
Article -
1528
THE EEMD-RA-KU METHOD ON DIAGNOSIS OF BEARING FAULT
Published 2016-01-01“…Aiming at the impact feature in fault signals of the rolling bearings,The improved algorithm diagnosis method EEMD-RA-KU was proposed to capture the impact feature. …”
Get full text
Article -
1529
Method of network slicing deployment based on performance-aware
Published 2019-08-01“…In order to deal with the performance degradation caused by resource contention due to the sharing of physical resources between VNF in the network slicing,a network slicing deployment method based on performance-awareness was proposed.When deploying network slice instances,first two-phase deployment that mapping virtual nodes was adopted,and then virtual links were mapped.In the virtual nodes mapping phase,the VNF performance influences factor was defined from the perspective of resource supply and demand to quantify the degree of VNF performance impact.Then the sum of the performance influence factors of all VNF on the deployable physical server was found in the network slice instance,the physical server with the smallest sum of performance influence factors was used as the mapping location,and the simulated annealing-discrete particle swarm algorithm was used to find the nodes mapping result.In the virtual links mapping phase,the shortest path algorithm was used to obtain the link mapping result.The simulation results show that the proposed method reduces the impact of other network slices on its own service performance.…”
Get full text
Article -
1530
PyFuzzer:automatic in-memory fuzz testing method
Published 2013-09-01“…Fuzz Testing is an effective method to mine all kinds of vulnerabilities.But the main drawbacks to current fuzz testing tools are:firstly,it produces high volume testing data and it’s extraordinary time consumption; secondly,if the accessing needs authentication,the greatest part of test data will be abandoned.PyFuzzer,a novel automatic in-memory fuzz testing tool combining static analysis,dynamic analysis and in-memory fuzz testing,was presented.The tool is highly automatic and effective.Compared with 4n FTP Fuzzer in testing WarFTPD and Serv-U,PyFuzzer can discover all vulnerabilities and improve test efficiency greatly.…”
Get full text
Article -
1531
Method for router online security risk assessment quantification
Published 2013-11-01“…The experiment results show the method is effective in calculating the quantitive risk of the router and helpful for administrators to assess security risks.…”
Get full text
Article -
1532
CIP Method of Characteristics for the Solution of Tide Wave Equations
Published 2018-01-01“…The CIP-MOC (Constrained Interpolation Profile/Method of Characteristics) is proposed to solve the tide wave equations with large time step size. …”
Get full text
Article -
1533
Introduction to deep learning methods for multi‐species predictions
Published 2025-01-01“…Methods in Ecology and Evolution…”
Get full text
Article -
1534
Climatic Characteristics and Determination Method for Freezing Rain in China
Published 2017-01-01Get full text
Article -
1535
Wind Turbine Aerodynamic Performance by Lifting Line Method
Published 1998-01-01“…Predictions are, shown to compare favorably with existing numerical data from more involved free wake methods, but require less computational effort. Thereby, the present method may be a very useful tool for calculating the aerodynamic loads on horizontal-axis wind turbine blades.…”
Get full text
Article -
1536
REGULATION AND ROLLING QUALITY CONTROL ON THE BASIS OF STATISTICAL METHODS
Published 2009-05-01“…It is shown that introduction of statistical method of control will allow to reduce efforts for production, delivery of the samples to the laboratory of mechanical testing, and to reduce the expenses as well.…”
Get full text
Article -
1537
Random 2D Composites and the Generalized Method of Schwarz
Published 2015-01-01“…This method is related to the traditional method based on the average probabilistic values involving the n-point correlation functions. …”
Get full text
Article -
1538
The New Method of Sensor Data Privacy Protection for IoT
Published 2021-01-01“…This article introduces the new method of sensor data privacy protection method for IoT. …”
Get full text
Article -
1539
Trajectory privacy protection method based on location obfuscation
Published 2018-07-01“…In the process of continuous queries,a method of trajectory privacy protection based on location obfuscation was proposed to solve the problem that K-anonymity was difficult to guarantee user privacy in third party architectrue.Firstly,the (G-1) query obfuscation locations through the location prediction was obtained and the dummy location selection mechanism,and then sent them together with the user’s real query location to different anonymizers to form cloaking regions and sent them to the LBS server for queries,and the query results were returned to the user by different anonymizers.In this method,the user’s real query location was confused by the location obfuscation,and the attacker couldn’t deduce the user’s trajectory from a single anonymizer or the LBS server.The method can enhance the privacy of the user’s trajectory and can effectively solve the performance bottleneck in the single anonymizer structure.Security analysis shows the security of the proposed approach,and experiments show this method can reduce the number of interactions between the user and the LBS server and the overhead of the single anonymizer.…”
Get full text
Article -
1540
A New Method of Network Index Data Forecast
Published 2013-03-01“…As the expansion of communication industry, the network data tends to be diverse, comp1ex and numerous.Therefore, the management and optimization become more and more difficu1t.And the index data forecast requires higher and higher accuracy.How to manage the network data effective1y and comprehensive1y turns to be a capita1 issue.A new method of network index data forecast was studied.…”
Get full text
Article