Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Research 20
- Methodology 16
- Statistical methods 10
- therapy 7
- Physical Examination 6
- Social sciences 6
- Study and teaching 6
- diagnosis 6
- Anatomy 5
- Child 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Sociology 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Chest 4
- Conversation analysis 4
- Diagnosis 4
- Diseases 4
- Dissection 4
- Geography 4
- History 4
- Infant 4
- Mass media 4
- Physical diagnosis 4
- Anesthesia 3
- Clinical Medicine 3
- Communication 3
-
3181
A method of SQL access logs pretreatment for power business system
Published 2015-12-01“…With the development of smart grid interactive,the database interaction between the information inside and outside is increasing.A method of SQL access log compression for power business system to respond to the demand of database security audit for the power system was designed in detail.This method can realize the compression of SQL access log and have the function of simple classification for SQL logs.The test results show that the method can achieve a large margin compression of SQL access logs and meet the requirements of log preprocessing for the database behavior audit of power business system.…”
Get full text
Article -
3182
Three-Step Block Method for Solving Nonlinear Boundary Value Problems
Published 2014-01-01“…The proposed block method will be adapted with multiple shooting techniques via the three-step iterative method. …”
Get full text
Article -
3183
Traffic scheduling method based on centralized control in named data networking
Published 2018-07-01“…In order to address the global optimization problem for traffic scheduling in named data networking,related works were analyzed,a method based on centralized control was proposed.The proposed method took network performance and communication overhead into account.In the proposed scheme,appropriate nodes would be selected as E-NDN nodes,then the controller calculated the corresponding multi-path forwarding policies and sent them to E-NDN nodes according to the in-network cache,the aggregation of Interest packets,and the traffic demands of popular contents to achieve global optimization.The evaluation results indicate that the proposed method can significantly reduce the maximum link utilization and improve network performance.Simultaneously,the proposed method will not cause a large optimization cost,and communication overhead between the controller and nodes will increase slightly.…”
Get full text
Article -
3184
RETRACTED: Innovative methods for substantiation of the final oil recovery recovery factor
Published 2024-01-01Get full text
Article -
3185
Perineal pseudocontinent colostomy: an alternative method to promote patients’ satisfaction and safety?
Published 2022-09-01Get full text
Article -
3186
STUDY ON THE EVALUATION METHOD OF THE PRESSURE VESSEL BURST PRESSURE CALCULATION FORMULA
Published 2017-01-01Subjects: Get full text
Article -
3187
Trust expansion and listwise learning-to-rank based service recommendation method
Published 2018-01-01“…In view of the problem of trust relationship in traditional trust-based service recommendation algorithm,and the inaccuracy of service recommendation list obtained by sorting the predicted QoS,a trust expansion and listwise learning-to-rank based service recommendation method (TELSR) was proposed.The probabilistic user similarity computation method was proposed after analyzing the importance of service sorting information,in order to further improve the accuracy of similarity computation.The trust expansion model was presented to solve the sparseness of trust relationship,and then the trusted neighbor set construction algorithm was proposed by combining with the user similarity.Based on the trusted neighbor set,the listwise learning-to-rank algorithm was proposed to train an optimal ranking model.Simulation experiments show that TELSR not only has high recommendation accuracy,but also can resist attacks from malicious users.…”
Get full text
Article -
3188
A Two-Level Optimization Method for Hypersonic Periodic Cruise Trajectory
Published 2021-01-01“…In this paper, a two-level optimization method for the trajectory of periodic cruise is proposed. …”
Get full text
Article -
3189
Historiography of the Study of Bulgarian-Tatar Epigraphic Monuments and Modern Research Methods
Published 2024-03-01“…The purpose of the study is to trace the historiography of the study of the Bulgarian-Tatar epigraphic monuments in the vast Zakazanye region of the Republic of Tatarstan, as well as to show the possibilities of modern research methods in this matter. Research materials: Bulgarian-Tatar epigraphic monuments (tombstones) of the 13th–17th centuries. …”
Get full text
Article -
3190
Research of Dynamics Modeling Method for Rolling Bearing with Surface Damage Fault
Published 2016-01-01“…The vibration models are solved with fourth- order Runge- Kutta method,and then the vibration data of inner ring are obtained and analyzed in frequency spectrum. …”
Get full text
Article -
3191
Methods of saponin purification from Quillaja sp. for vaccine adjuvant production
Published 2025-01-01“…In this work, we describe the different preparations of saponins used for adjuvants and the purification methods used to obtain each saponin.…”
Get full text
Article -
3192
SEMI-ANALYTICAL FINITE ELEMENT METHOD IN THE APPLICATION OF THE ULTRASONIC PROPAGATION SIMULATION
Published 2015-01-01“…The semi-analytical finite element method is a method that use the finite element method to discrete the structure in the spatial domain,and then use the precise integration method in time domain to solve the problem. …”
Get full text
Article -
3193
Enhanced STag Marker System: Materials and Methods for Flexible Robot Localisation
Published 2024-12-01Get full text
Article -
3194
Java deserialization gadget chain discovery method based on hybrid analysis
Published 2022-04-01“…Java deserialization vulnerabilities have become a common threat to Java application security nowadays.Finding out the gadget chain determines whether this type of vulnerability can be exploited.Due to the large code space of Java applications and dependent libraries and the polymorphism of Java itself, manual analysis of Java deserialization gadget chains consumes a lot of time and effort and it is highly dependent on the experienced knowledge.Therefore, it is crucial to study how to efficiently and accurately automate the discovery of gadget chains.Java deserialization gadget chain discovery method based on hybrid analysis was proposed.Call graph based on the variable declaration type was constructed, and then the deserialization entry functions that may reach the dangerous functions were screened using the call graph analysis.The screened entry functions were used as the entry point of the hybrid information flow analysis.The hybrid information flow analysis was carried out for both pointer and tainted variables.The tainted objects created implicitly were marked.The tainted information and the pointer information were propagated simultaneously to construct the hybrid information flow graph.The reachability of external taint data propagation to the dangerous function was judged based on the hybrid information flow graph.The corresponding deserialization gadget chain was constructed according to the taint propagation path.The hybrid analysis took into account the efficiency of call graph analysis and the accuracy of hybrid information flow analysis.The corresponding static analysis tool, namely GadgetSearch, was implemented based on the proposed hybrid analysis method.In the experimental evaluation, GadgetSearch had lower false positive and lower false negative than the existing tool GadgetInspector on four datasets of Ysoserial, Marshalsec, Jackson historical CVE, and XStream historical CVE.Additionally, GadgetSearch also found multiple undisclosed gadget chains.The experimental results show that the proposed method can efficiently and accurately discover the Java deserialization gadget chain in multiple practical Java applications.…”
Get full text
Article -
3195
THREATS TO FINANCIAL SAFETY OF THE MARKET OF INSURANCE SERVICES AND METHODS OF ITS PROVIDING
Published 2018-07-01Subjects: Get full text
Article -
3196
Review on Applications of System Dynamics Method in Regional Water Demand Prediction
Published 2022-01-01“…,domestic water demand,industrial water demand,agricultural water demand,and ecological environment water demand.Furthermore,the limitations and deficiencies of this method are given,and its future development trend is discussed,which includes the expansion of the regional scale and the strengthening of the combination and complementarity with other methods.…”
Get full text
Article -
3197
Study on electronic evidence acquisition and analysis method over Windows logs
Published 2012-11-01“…In order to collect logs in real time,two methods to acquire Windows logs in real time were proposed respectively according to the two types of log file formats.Based on acquiring logs,an approach for correlating log files with atomic attack functions was proposed.After the correlation,atomic attack functions can be analyzed instead of log files,which can greatly decrease the time of analysis.A time based log correlation and event reconstruction method was proposed to reconstruct the computer criminal scenarios.Experimental results show that log evidences can be acquired and the crime process can be reconstructed effectively.…”
Get full text
Article -
3198
Optimization of Identification and Zoning Method for Landscape Characters of Urban Historic Districts
Published 2025-01-01“…The practical application of this method in Pun Tong Historic District has tested the operability of the method. …”
Get full text
Article -
3199
Analysis Methods for Aerodynamic Instability Detection on a Multistage Axial Compressor
Published 2021-01-01“…In order to detect the aerodynamic instability of a multistage axial compressor more accurately and earlier, the harmonic Fourier mean amplitude analysis method and heterotopic variance analysis method are developed. …”
Get full text
Article -
3200
Application of the Solving Methods and Numerical Differentiation for Curvature Parameter of Conjugate Surface
Published 2017-01-01“…The advantages and disadvantages of common methods of numerical differential method,LITVIN method and the method of induced curvature are compared and analyzed. …”
Get full text
Article