Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
1761
Sawi Decomposition Method for Volterra Integral Equation with Application
Published 2020-01-01“…In this paper, authors present a new method “Sawi decomposition method” for determining the primitive of Volterra integral equation (V.I.E.) with application. …”
Get full text
Article -
1762
Graph clustering method based on structure entropy constraints
Published 2021-12-01“…Aiming at the problem of how to decode the true structure of the network from the network embedded in the large-scale noise structure at the open information sharing platform centered on big data, and furthermore accurate mining results can be obtained in the mining related information process, the method of clustering based on structure entropy was proposed to realize divide the correlation degree of nodes in the graph.A solution algorithm for calculating two-dimensional structural information and a module division algorithm based on the principle of entropy reduction were proposed to divide the nodes in the graph structure to obtain corresponding modules.The K-dimensional structural information algorithm was used to further divide the divided modules to realize the clustering of nodes in the graph structure.An example analysis shows that the proposed graph clustering method can not only reflect the true structure of the graph structure, but also effectively mine the degree of association between nodes in the graph structure.At the same time, the other three clustering schemes are compared, and the experiment shows that this scheme has higher efficiency in execution time and guarantees the reliability of the clustering results.…”
Get full text
Article -
1763
The clinical method and the evidence-based medicine: some considerations
Published 2010-12-01“…It helps us clarifying the best way to use and apply "evidence" but it does not replace the clinical method. This article discusses the proper relationship that must be established between the clinical method and the evidence-based medicine in order to provide the appropriate medical care to our patients.…”
Get full text
Article -
1764
METHODICAL TRAINING OF FUTURE TEACHERS: IMMERSION IN PROFESSIONAL REALITY
Published 2018-01-01Subjects: Get full text
Article -
1765
Research on the mobile CDN architecture and the resource scheduling method
Published 2014-11-01“…Aimed at network architecture of mobile core network,the deployment method of MCDN service nodes was discussed on the basis of virtualized core net resources and proposes a MCDN network architecture based on the core net resource pool.Then,according to collaborative problem of MCDN resources,a MCDN resource scheduling algorithm based on regional resource co-allocation was proposed,establish a mathematical model of goal programming based on multi-factor resource co-allocation was extablished.Finally,a case study is conducted to demonstrate the feasibility and effectiveness of the proposed approach.…”
Get full text
Article -
1766
Repair for Congenital Macrostomia: Vermilion Square Flap Method
Published 2014-01-01“…We recommend this method for patients with mild to moderate macrostomia.…”
Get full text
Article -
1767
Research on BHAST Test Method for Plastic Encapsulated Microcircuit
Published 2025-01-01“…Compared to metal packaging and ceramic packaging, plastic encapsulated microcircuits (PEMs) have the advantages of light weight and low cost. …”
Get full text
Article -
1768
CSI-based underground personnel behavior identification method
Published 2020-12-01“…To solve the problem of personnel behavior identification under the condition of dust environment and shielding and to promote the coal mine safety production,a personnel identification method based on the Wi-Fi channel state information (CSI) was proposed.The system used Hampel filter and median filter to process the raw CSI data,and utilized the phase information through a linear correction method.The recognition process was divided into the offline stage and online stage.In the offline stage,different activities data was collected to establish the recognition model.While in the online stage,current actions were recognized according to the recognition model.8 different human activities were set in the experiments and the result indicated that the recognition accuracy of this system could reach 95%.…”
Get full text
Article -
1769
A novel, rapid, quantitative method for face discrimination.
Published 2024-01-01“…Face discrimination ability has been widely studied in psychology, however a self-administered, adaptive method has not yet been developed. In this series of studies, we utilize Foraging Interactive D-prime (FInD) in conjunction with the Basel Face Model to quantify thresholds of face discrimination ability both in-lab and remotely. …”
Get full text
Article -
1770
Modeling of Time of Arrival Method for Lightning Locating Systems
Published 2015-01-01“…Various methods are used to locate cloud-to-ground lightning flashes. …”
Get full text
Article -
1771
On Bernstein Polynomials Method to the System of Abel Integral Equations
Published 2014-01-01“…In order to confirm the reliability and accuracy of the proposed method, some weakly Abel integral equations systems with comparisons are solved in detail as numerical examples.…”
Get full text
Article -
1772
RESEARCH STATUS OF SMART ROLLING BEARING MONITORING METHODS
Published 2021-01-01Get full text
Article -
1773
TAX JURISDICTION OF COMMUNES IN POLAND AND METHODS OF ITS IMPLEMENTATION
Published 2022-12-01“…The aim of the study was to determine the possibility of using methods of implementing the tax gov-ernance of municipalities in the field of local taxes and to assess the importance of using government for the financial planning of the municipality in the conditions of the financial crisis. …”
Get full text
Article -
1774
A Frequency Selection Method Based on the Pole Characteristics
Published 2013-01-01“…The simulation result of a large number of ship targets shows remarkable rise in average recognition rate by using this method, compared with the average recognition rate of randomly selected frequency.…”
Get full text
Article -
1775
De-anonymiation method for networks based on DeepLink
Published 2020-08-01“…Existing de-anonymization technologies are mainly based on the network structure.To learn and express network structure is the key step of de-anonymization.The purpose of the user identity linkage is to detect the same user from different social networking platforms.DeepLink is a cross-social network user alignment technology.It learns the structural of the social networks and align anchor nodes through deep neural networks.DeepLink was used to identify de-anonymization social networks,and the results outperforms the traditional methods.…”
Get full text
Article -
1776
Supplier Encroachment Channel Selection on an Online Retail Platform
Published 2025-01-01Subjects: Get full text
Article -
1777
Studies of Connected Networks via Fractional Metric Dimension
Published 2022-01-01“…In this paper, we study the latest form of metric dimension called fractional metric dimension of some connected networks such as circular diagonal ladder, double sun flower, and double path networks.…”
Get full text
Article -
1778
Guidance for Processing Fresh-cut Produce in Retail Operations
Published 2005-04-01“…FSHN0505/FS113: Guidance for Processing Fresh-cut Produce in Retail Operations (ufl.edu) …”
Get full text
Article -
1779
Contrast Expansion Method for Elastic Incompressible Fibrous Composites
Published 2017-01-01“…Contrast parameter expansion of the elastic fields for 2D composites is developed by Schwarz’s method and by the method of functional equations for the case of circular inclusions. …”
Get full text
Article -
1780
A Conjugate Gradient Method for Unconstrained Optimization Problems
Published 2009-01-01“…A hybrid method combining the FR conjugate gradient method and the WYL conjugate gradient method is proposed for unconstrained optimization problems. …”
Get full text
Article