Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
1841
Approach to the Optimizing Method of Selecting Forecasters and Prognostic Equation
Published 2000-01-01Get full text
Article -
1842
A New Method to Prove and Find Analytic Inequalities
Published 2010-01-01“…We present a new method to study analytic inequalities. As for its applications, we prove the well-known Hölder inequality and establish several new analytic inequalities.…”
Get full text
Article -
1843
Precisely positioning method for roadheaders and robotic roadheader system
Published 2020-02-01“…To overcome the problems faced in underground positioning,the robotic roadheader mine Internet of things (IoT) was designed which connected multi sensors,surveying devices and industrial computers,and a novel positioning method was developed,based on which a robotic roadheader system was built.The robotic roadheader system was employed for real-world tunnel cutting.The experimental results verifies the high accuracy of the positioning method,which achieves an RMSE error less than 5 cm,and the robust running of the robotic roadheader indicates that the robotic roadheader system can precisely perceive the surrounding environment and make precise interaction with the working environment,which yield a safety,high efficiency,and precisely underground tunnel building and coal mining and an unmanned working surface.…”
Get full text
Article -
1844
Modified Preconditioned GAOR Methods for Systems of Linear Equations
Published 2013-01-01“…The comparison results show that the convergence rate of the preconditioned generalized AOR (PGAOR) methods is better than that of the original GAOR methods. …”
Get full text
Article -
1845
Geotourism study of Ghezelowzan basin based on Fassoulas method
Published 2020-12-01Subjects: Get full text
Article -
1846
Noise-attention-based forgery face detection method
Published 2023-08-01“…With the advancement of artificial intelligence and deep neural networks, the ease of image generation and editing has increased significantly.Consequently, the occurrence of malicious tampering and forgery using image generation tools is on the rise, posing a significant threat to multimedia security and social stability.Therefore, it is crucial to research detection methods for forged faces.Face tampering and forgery can occur through various means and tools, leaving different levels of forgery traces during the tampering process.These traces can be partly reflected in the image noise.From the perspective of image noise, the noise components reflecting tampering traces of forged faces were extracted through a noise removal module.Furthermore, noise attention was generated to guide the backbone network in the detection of forged faces.The training of the noise removal module was supervised using SRM filters.In order to strengthen the guidance of the noise removal module, the noise obtained by the noise removal module was added back to the real face image, forming a pair of supervised training samples in a self-supervised manner.The experimental results illustrate that the noise features obtained by the noise removal module have a good degree of discrimination.Experiments were also conducted on several public datasets, and the proposed method achieves an accuracy of 98.32% on the Celeb-DF dataset, 92.61% on the DFDC dataset, and more than 94% on the FaceForensics++ dataset, thus proving the effectiveness of the proposed method.…”
Get full text
Article -
1847
A sterilization method for human decellularized vaginal matrices
Published 2024-12-01Subjects: Get full text
Article -
1848
Business process exception handling using workflow methods
Published 2003-12-01Get full text
Article -
1849
CLM:differential privacy protection method for trajectory publishing
Published 2017-06-01“…In order to solve the problem existing in differential privacy preserving publishing methods that the independent noise was easy to be filtered out,a differential privacy publishing method for trajectory data (CLM),was proposed.A correlated Laplace mechanism was presented by CLM,which let Gauss noises pass through a specific filter to produce noise whose auto-correlation function was similar with original trajectory series.Then the correlated noise was added to the original track and the perturbed track was released.The experimental results show that the proposed method can achieve higher privacy protection and guarantee better data utility compared with existing differential privacy preserving publishing methods for trajectory data.…”
Get full text
Article -
1850
Host security assessment method based on attack graph
Published 2022-02-01“…In order to solve the problems of inaccurate calculation of host security value and ignoring host correlation in attack graph, a host security assessment method based on attack graph was proposed.First, the host attack graph was generated to quantify the atomic attack probability and the attack probability of the host was calculated from four perspectives, such as vulnerability itself, time, environment and operational system availability.Then, the host assets importance was calculated according to expert transcendental evaluation and correlation weighting method, and the topology importance of host was calculated according to the association relationship between hosts in attack graph.Finally, the host security value was calculated according to the impact value of host vulnerability, host importance and host attack probability.The experimental results show that the importance and security value of the proposed method accord with the real network situation and can reflect the security condition of the host more completely and accurately.The standard deviation of host safety value obtained by the proposed method is 0.078, which is larger than that obtained by other methods, indicating that the safety value obtained by the proposed method is more discrete and easier to distinguish the safety level from the subsequent risk disposal priority.…”
Get full text
Article -
1851
Demonstration of sizing nursing staff methods in intensive care
Published 2025-01-01“… Objective: to demonstrate the sizing of intensive care nursing staff estimated by two calculations, using the Nursing Activities Score as one of its central components. Method: descriptive, retrospective study that compiled the Nursing Activities Score scores of patients in five Intensive Care Units of a hospital in southern Brazil. …”
Get full text
Article -
1852
The Incident Field Optimization Method for the Electromagnetic Inverse Problems
Published 2022-01-01“…In this letter, an incident field optimization (IO) method integrated with contrast source inversion (CSI) method and multiplicative regularized CSI (MR-CSI) method is proposed to deal with the electromagnetic inverse problems. …”
Get full text
Article -
1853
-
1854
Application of the Critical Path Method in Project Planning and Management.
Published 2024Subjects: Get full text
Thesis -
1855
Models, systems, networks in economics, engineering, nature and society
Published 2024-11-01Subjects:Article -
1856
Designing A New Fuzzy Expert System for Project Portfolio Risk Management
Published 2021-02-01Subjects: Get full text
Article -
1857
Comparative Analysis of Temperature Distributions in a Convective-Radiative Porous Fin using Homotopy Perturbation and Differential Transformation and Methods
Published 2022-11-01Subjects: “…Comparative method study; Thermal analysis; Porous Fin; Convective-Radiative fin; Magnetic field; Homotopy perturbation method; Differential transformation method.…”
Get full text
Article -
1858
Water Quality Analysis and Evaluation of Five Rivers in Poyang Lake Based on Three Water Quality Index Methods
Published 2024-07-01Subjects: Get full text
Article -
1859
Research on detection and treatment of loose zones in weak fracture zone tunnel
Published 2025-01-01Subjects: Get full text
Article -
1860
Structuroscopy of Coils after High-Temperature Mechanical Treatment on the Basis of Measurements of Rayleigh Waves Velocity
Published 2022-07-01Subjects: Get full text
Article