Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
1581
Orthogonal Design Method for Optimizing Roughly Designed Antenna
Published 2014-01-01“…Orthogonal design method (ODM) is widely used in real world application while it is not used for antenna design yet. …”
Get full text
Article -
1582
Chebyshev Collocation Method for Parabolic Partial Integrodifferential Equations
Published 2016-01-01“…Some examples are presented to illustrate the validity and efficiency of the presented method.…”
Get full text
Article -
1583
An Evaluation of Deep Learning Methods for Small Object Detection
Published 2020-01-01Get full text
Article -
1584
-
1585
Perturbed Galerkin Method for Solving Integro-Differential Equations
Published 2022-01-01“…Examples to justify the effectiveness and accuracy of the method are presented and their numerical results are compared with Galerkin’s method, Taylor’s series method, and Tau’s method which provide validation for the proposed approach. …”
Get full text
Article -
1586
Research of the S Curve Optimization Method of the Robot Acceleration and Deceleration
Published 2015-01-01“…Based on the analysis of S curve control method,aiming at the robot acceleration and deceleration time is too long and severe vibration in the process of start,stop,resulting in the motion precision problem of robot,a 5 order S curve with time optimal and the smallest impact is proposed. …”
Get full text
Article -
1587
Validation of summer temperature interpolation methods in northeastern Iran
Published 2021-06-01“…Therefore, different interpolation methods can help a lot in estimating climate data in different places. …”
Get full text
Article -
1588
Leak in trusted root certificates management and the method for solving
Published 2005-01-01Get full text
Article -
1589
State-of-the-Art Graphene Synthesis Methods and Environmental Concerns
Published 2023-01-01“…Researchers are continuously working on advancing graphene synthesis methods to alleviate these limitations. Therefore, this review looks at the overview of established graphene synthesis methods and characterization techniques, and then highlights an in-depth review of graphene production through flash joule heating. …”
Get full text
Article -
1590
On the Hamilton-Jacobi-Bellman Equation by the Homotopy Perturbation Method
Published 2014-01-01“…Our concern in this paper is to use the homotopy decomposition method to solve the Hamilton-Jacobi-Bellman equation (HJB). …”
Get full text
Article -
1591
Screening for a Reweighted Penalized Conditional Gradient Method
Published 2022-06-01Subjects: Get full text
Article -
1592
Modern treatment methods in atopic dermatitis - literature overview
Published 2025-01-01“…The aim of this study is to present the current state of knowledge on new treatments for atopic dermatitis. Review methods: The review was based on publicly available PubMed and Google Scholar databases from 2020 to 2024 using the following phrases: atopic dermatitis, treatment of atopic dermatitis, diagnosis of atopic dermatitis, epidemiology, biological treatment of atopic dermatitis, JAK inhibitors, stem cells, dermatitis. …”
Get full text
Article -
1593
THE RESEARCH OF USING «THE COST RECOVERY» METHOD IN THE COST MANAGEMENT
Published 2017-01-01Subjects: Get full text
Article -
1594
An Interference Links Selection Method Based on Genetic Algorithm
Published 2015-09-01Get full text
Article -
1595
Multivalued φ-Contractions on Extended b-Metric Spaces
Published 2020-01-01“…In this paper, we have established some fixed-point results for the class of multivalued φ-contractions in the setting of extended b-metric space. An example is furnished to show the validity of our results. …”
Get full text
Article -
1596
Methodology for integrated analysis of vector- and spectroscopic bioimpedance methods
Published 2024-12-01“…The aim of this study is to propose a methodology that allows us to integrate two methods of electrical bioimpedance analysis: bioelectrical impedance vector analysis, and bioelectrical impedance spectroscopy to evaluate the health of individuals.…”
Get full text
Article -
1597
Survey on community detection method based on random walk
Published 2023-06-01“…Random walk techniques achieve high accuracy and efficiency in community detection.To summarize and analyze community detection methods based on random walk, the random walk technique was classified into personalized PageRank, heat kernel diffusion and other random walk methods, and community detection was classified into tasks of local community detection and global community structure identification.A detailed overview of different techniques based on random walk and their application to the tasks of community detection was provided, problems in existing methods were analyzed, and future research directions were pointed out.Finally, evaluation metrics of community detection accuracy for different community detection tasks were summarized in terms of similarity and structure respectively to facilitate research in community detection.…”
Get full text
Article -
1598
Complexity control method of random forest based HEVC
Published 2019-02-01“…High efficiency video coding (HEVC) has high computational complexity,and fast algorithm cannot perform video coding under restricted coding time.Therefore,a complexity control method of HEVC based on random forest was proposed.Firstly,three random forest classifiers with different prediction accuracy were trained to provide various coding configurations for coding tree unit (CTU).Then,an average depth-complexity model was built to allocate CTU complexity.Finally,the CTU coding configuration,determined by the smoothness,average depth,bit,and CTU-level accumulated coding error,was used to complete complexity control.The experimental results show that the proposed method has better complexity control precision,and outperforms the state-of-the-art method in terms of video quality.…”
Get full text
Article -
1599
Graphical Optimization Method for Symmetrical Bidirectional Corridor Progression
Published 2021-01-01“…The graphical progression method can obtain grand coordinated schemes with minimal computational complexity. …”
Get full text
Article -
1600
TPCM-based trusted PXE boot method for servers
Published 2020-12-01“…The PXE startup mechanism downloads operating system files through the network and starts the operating system,which is widely used in server network startup.It is widely used in server network startup.The PXE boot process is secured and trusted through trusted computing technology to prevent the PXE boot file from being tampered with maliciously,ensuring the safe and reliable operation of the server.The cyber security classified protection standard requires that the system boot program and system program of the server device be trusted and verified based on the trusted root.A TPCM-based server trusted PXE boot method based on the requirements of classified protection standard was proposed to ensure the security and trust of the server's BIOS firmware,PXE bootfiles,and Linux system files.When the server performs PXE boot,TPCM measured BIOS firmware,BIOS boot environment measured PXE boot files,and PXE boot environment measured Linux system files.Taking TPCM as the root of trust,one level of measurement,one level of trust,and a chain of trust were established to achieve a trusted server operating environment.The proposed method was tested on a domestically-controlled,self-controllable Shenwei server.The experimental results show that the proposed method is feasible.…”
Get full text
Article