Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
1541
Harmonising Theory: Integrating Singing With Grounded Theory Methods
Published 2025-01-01“…International Journal of Qualitative Methods…”
Get full text
Article -
1542
Efficient method of constructing parameters in R-ate paring
Published 2010-01-01“…In order to accelerate the computing of Tate paring, a new technique of selection method of parameters (A,B) based on R-ate technique had been proposed. …”
Get full text
Article -
1543
Spatial error concealment method based on tensor voting
Published 2011-01-01“…As the existing spatial error concealment algorithms is lack of the recovery accuracy in complex texture areas,a spatial error concealment method based on tensor voting was proposed,which extracted structural information by using tensor voting.On this basis,an improved spatial error concealment algorithm which combined with the traditional algo-rithms was further proposed.Firstly the lost marc blocks were classified into three categories,and then the appropriate concealment method was chose to recover the lost macro blocks according to the type of lost macro blocks.Experimental results show that the proposed method improves the recovery accuracy effectively and avoids the edge disorder phe-nomenon,especially in the region with more complex texture,the subjective and objective quality of concealed image is improved greatly.…”
Get full text
Article -
1544
Application of the Moment Of Inertia method to the Critical-Plane Approach
Published 2016-10-01“…The Moment-Of-Inertia (MOI) method has been proposed by the authors to solve some of the shortcomings of convex-enclosure methods, when they are used to calculate path-equivalent ranges and mean components of complex non-proportional (NP) multiaxial load histories. …”
Get full text
Article -
1545
Botnet detecting method based on group-signature filter
Published 2010-01-01“…A botnet detecting method was presented based on group-signature filter,suitable for the traditional signatures matching algorithm.Using multiple member signatures to filter the packets of hosts from Intranet,the proposed method is able to handle the shortened and scattered signatures at a space expense of O(tmn).The simulated experiment proves the correctness and validity of the detecting method.…”
Get full text
Article -
1546
Privacy protection method on time-series data publication
Published 2015-11-01“…A differential privacy model was proposed based on the sampling filtering and the mechanism of evaluation.Firstly,fixed sampling method was used to sample the original data and the non-sampling data be published directly.Secondly,for the sampling date,utilize the differential privacy mechanism to add the noise.Then,use Kalman to correct the sampling date.Finally,use the mutual information to evaluate data under different sampling intervals.Through the experiment,it is proved that the mechanism can achieve a good balance between the practicality and protective.…”
Get full text
Article -
1547
RSA-based image recognizable adversarial attack method
Published 2021-10-01“…Adversarial attack is an important part of deep learning security research.Relying on the RSA signature schemes and RSA encryption schemes in cryptography, an adversarial attack method that adversarial examples can be recognized by a specific classifier is proposed.Through the idea of one pixel attack, the normal image can have the ability to make other classifier misclassify while embedding additional information.It can be used in classifier authorization management, online image anti-counterfeiting, etc.The experiment show that the adversarial examples can be recognized under the specific classifier, and the disturbance noise is difficult to detect by the human eye.…”
Get full text
Article -
1548
Coupling Analysis of Research Methods for Hydrological Model Uncertainty
Published 2022-01-01“…To reduce the average bandwidth of the forecast interval while increasing the interval coverage,this paper conducted a coupling analysis of dual EnKF and GLUE,two methods to research the hydrological model uncertainty and obtained the dual E-G method.Taking the Xin'anjiang model as an example,the paper used three evaluation indicators (i.e.…”
Get full text
Article -
1549
Cryptococcus neoformans in the sputum: a noninvasive diagnostic method
Published 2025-01-01Get full text
Article -
1550
Research on Low Noise Method of Passenger Car Gearbox
Published 2020-10-01“…The dynamic force of the bearing simulation is used as the excitation of the shell vibration response analysis to analyze the shell vibration characteristics, the shell vibration acceleration is used as the boundary condition, and based on the shell acoustic boundary element model, the modal acoustics transfer method is used to calculate the radiated noise from the sound field outside the casing. …”
Get full text
Article -
1551
Fuzzy Methods in Marketing Research: Brief Literature Review
Published 2024-12-01Subjects: “…fuzzy methods…”
Get full text
Article -
1552
Similarity and quality metrics for MR image-to-image translation
Published 2025-01-01Subjects: “…Metrics…”
Get full text
Article -
1553
Existence of Fixed Point Results in 𝐺-Metric Spaces
Published 2009-01-01“…The purpose of this paper is to prove the existence of fixed points of contractive mapping defined on 𝐺-metric space where the completeness is replaced with weaker conditions. …”
Get full text
Article -
1554
Survey of attack graph based network security metric
Published 2018-09-01Subjects: “…network security metric…”
Get full text
Article -
1555
Biochemical methods for producing and characterising recombinant spider silks
Published 2025-01-01“…Techniques such as mass photometry and size exclusion chromatography (SEC) for analysing protein purity and assembly behaviour are thereupon detailed. Finally, we address the role that predictive computational methods play in the future of designing novel and high-performing materials inspired by spidroins.…”
Get full text
Article -
1556
-
1557
Research of methods for evaluating the effectiveness of public relations activities
Published 2020-12-01“…The article is devoted to the study of the main methods of evaluating the effectiveness of activities in the field of public relations. …”
Get full text
Article -
1558
-
1559
Evaluation method for autonomous communication and networking capability of UAV
Published 2020-08-01“…In order to accurately evaluate the autonomous communication and networking capability of these unmanned system which was instructive to the intelligent collaboration of UAV (unmanned aerial vehicle) system,the research of the UAV system which was adapted to the complex environment with countermeasure possibilities was focused on.The autonomous communication and networking capability of UAV system and their relationship from multiple perspectives was analyzed and modeled,including self-adaptation,self-decision,man-UAV interaction,cyber-physical integration and evolution,and an example was provided to illustrate the detailed evaluation process.The example results show that the proposed method comprehensively consider all the key aspects of the performance evaluation,which can be used to quantitatively evaluate the autonomous communication and networking capability of different UAVs or other unmanned systems.…”
Get full text
Article -
1560
RETRACTED: The method of calculating sprinklers for wide-reach sprinklers
Published 2024-01-01Get full text
Article