Showing 161 - 180 results of 2,265 for search 'average degree methods', query time: 0.13s Refine Results
  1. 161

    Modified method of vacuum therapy in the treatment of infected poststernotomy wounds by A. L. Charyshkin, A. A. Guryanov

    Published 2020-10-01
    “…According to the applied method of vacuum therapy, all patients with infectious complications of post-sternotomy wounds were divided into two groups (n = 25, average age 56.6 years). …”
    Get full text
    Article
  2. 162

    Evaluating the method increasing of toric intraocular lenses rotational stability by G. A. Fedjashev

    Published 2015-10-01
    “…In patients with IOL implanted by the proposed method, the average angle of rotation of the IOL in all operated eyes was significantly lower and amounted to 0,8±1,2 degrees (p <0,05). …”
    Get full text
    Article
  3. 163

    Summer and Autumn Long-term Dynamic of Air Temperature in Central Ukraine by Ольга Гелевера, Микола Мостіпан, Сергій Топольний

    Published 2024-12-01
    “…In Kropyvnytskyi, average annual temperatures over 149 years increased from +7.40C to +8.90C, i.e. by 1.5 degrees. …”
    Get full text
    Article
  4. 164

    A new method of surgical upper eyelid ptosis treatment by I. A. Filatova, Yu. P. Kondratyeva, S. A. Shemetov, M. S. Trefilova

    Published 2023-12-01
    “…Purpose: to develop a new method of surgical treatment of moderate upper eyelid ptosis.Material and methods. 88 patients (106 eyes) aged 5–68 years (averagely 24.9 yrs), operated for moderate or severe upper eyelid ptosis, were divided into 3 groups depending on the degree of upper eyelid prolapse and levator function. …”
    Get full text
    Article
  5. 165
  6. 166

    A fuzzy track-to-track association algorithm with dynamic time warping for trajectory-level vehicle detection by Siqi Wan, Huaqiao Mu, Ke Han, Taesu Cheong, Chi Xie

    Published 2025-03-01
    “…The average association accuracy of all scenarios and error levels of the proposed method reached 97.33%, far higher than other benchmark methods. …”
    Get full text
    Article
  7. 167

    Methodology for calculating the fractional content of dust after cleaning in cyclone-type dust collectors and its post-cleaning by V. Yu. Solomin, L. O. Shtripling, Vit. Yu. Solomin

    Published 2025-06-01
    “…The problem with using cyclone dust collectors is the insufficient degree of cleaning of small dusts. Therefore, it is necessary to introduce sequential post-cleaning to meet the requirements of the MAC. …”
    Get full text
    Article
  8. 168

    Cam Design and Pin Defect Detection of Cam Pin Insertion Machine in IGBT Packaging by Wenchao Tian, Pengchao Zhang, Mingfang Tian, Si Chen, Haoyue Ji, Bingxu Ma

    Published 2025-07-01
    “…The profiles of the four cams were designed and verified through theoretical calculations and kinematic simulations using a seventh-degree polynomial curve fitting method. Then, image algorithms were developed to detect pin tilt defects, pin tip defects, and to provide visual guidance for pin insertion. …”
    Get full text
    Article
  9. 169

    Significant differences in terrestrial water storage estimated by four common methods by Anqi Niu, Long Sun, Ranhao Sun, Liding Chen

    Published 2025-04-01
    “…The biases or errors in the average water storage caused by different methods across various years range from 90.3 mm to 136.3 mm. …”
    Get full text
    Article
  10. 170

    Experimental Study of Ice Slurry Production Characteristics by Vacuum Stirring Method by Liu Xi, Lei Xiaojian, Zheng Minfeng, Huang Cheng, Li Xuelai

    Published 2015-01-01
    “…The process of ice slurry preparation is observed with the ice slurry preparation equipment based on vacuum stirring method, and the effects of ethylene glycol additive, solution volume and stirring speed on the supercooling degree of ice slurry preparation are investigated experimentally. …”
    Get full text
    Article
  11. 171

    Bridge facility health detection method based on DATA random subspace by Xiaoyan Shen

    Published 2025-06-01
    “…In the damage mode with weakened mid-span stiffness, the positioning error of the improved method is controlled within 1.42 m, and the damage degree error is 6.48 %. …”
    Get full text
    Article
  12. 172

    Establishment and application of DNA barcode identification method for species of shark fins by JIANG Xiaoxia, SHA Caihua, LUO Baozheng, SHAO Jianhong, XU Bowen, HUANG Haichao, ZHAO Fuzhen, ZHOU Aobaixue, CHEN Xuan

    Published 2024-12-01
    “…The intra-specific genetic distance of the measured species was ≤2.08% (average of 0.63%), and the inter-specific genetic distance ranged from 2.42% to 27.27% (average of 15.37%). …”
    Get full text
    Article
  13. 173

    Evaluation and Analysis of Factors Affecting Operation and Inspection Cost of Distribution Network Equipment Assets by Chaoyueling LUO, Zhiwei LI, Zhenyu XU, Xuejun TANG, Li LI, Zhao FANG

    Published 2023-07-01
    “…Key variables are selected based on the Bayesian model averaging (BMA) method, and the improved anti entropy grey correlation analysis method is used to quantitatively analyze the correlation degree of influencing factors, and identify the weakness that affects the operation and inspection costs. …”
    Get full text
    Article
  14. 174

    The effect of the scamper strategy in developing reflective thinking and self-awareness in the subject of teaching methods for female students in the College of Basic Education    ... by Sara Ahmad M. Amin

    Published 2023-07-01
    “…Apply at the level (0.05) 3- There is a statistically significant difference in the average scores of post-applications in reflective thinking between the students of the experimental group and the students in the control group, with the winning experimental group. 4- There is a statistically significant difference in the average degrees of self-awareness after the application for the students of the experimental group and the students of the control group, in favor of the experimental group. …”
    Get full text
    Article
  15. 175

    Identification of LSA Data Retrieval Method and Temporal Graph for Document Retrieval by Shahla Rezvani, Nader Naghshineh, Ahmad Khalilijafarabad

    Published 2025-01-01
    “…The degree of correlation obtained in this method is very high (0.98), indicating the reliability of the results. …”
    Get full text
    Article
  16. 176

    Research on IoT security situation awareness method based on evidence theory by Jian LI, Tinglu DONG, Jie LI

    Published 2022-04-01
    “…The security problem of IoT became more and more serious with its rapid development.Considering that the current IoT security situation awareness system lacks generality and excessively relies on expert knowledge, a IoT security situation awareness method based on improved D-S evidence theory was proposed in this paper.Fuzzy Gaussian membership function was used to calculate the vulnerability information membership matrix, which was normalized as evidence distribution matrix.The improved Topsis method was used to measure the evidence credibility.In order to fully restrain the credibility of conflicting evidence and improve the credibility of mutually supporting evidence, local credibility between two evidence was aggregated and the expected positive and negative solution vectors were improved according to the situation assessment scenario.And the weighted average method was used for vulnerability information fusion, to obtain the result of situational assessment.The result of situational awareness was fused with the time discount and high-risk vulnerability information discount evidence theory.At the same time, the IoT vulnerability information at different moments was considered comprehensively, the evidence was adaptively and dynamically weighted with the ratio information of high-risk vulnerability.The experimental results show that in the fusion of different numbers of evidence bodies and four common conflicting evidence, the improved Topsis method has higher fusion probability on credible proposition.In the aspect of situation assessment, the risk degree of current system is accurately assessed.And in the aspect of situational awareness, this discount evidence theory can predict the probability of high risk and critical risk, which is more effective than the traditional D-S evidence theory.According to this theory, a IoT security situational awareness method process was proposed, which would be used to guide engineering practice.In the future, the relationship between vulnerabilities can be considered and richer information between vulnerabilities can be extracted for vulnerability exploiting, so that the result of situation assessment is more accurate and reasonable.On the other hand, for situational awareness, game theory can be adopted in the process of dynamic game between the attacker and defender.…”
    Get full text
    Article
  17. 177

    Index System and Evaluation Method of Geological Environment Suitability for Human Health by Xingchun JIAO, Zhaohe ZHANG, Wei FANG, Ruimin LI, Jiuchen LIU, Wenbin JIA

    Published 2023-06-01
    “…However, the investigation found little difference in the health status of the residents in the two areas, with the average life expectancy of the residents in both areas higher than the national average. …”
    Get full text
    Article
  18. 178

    Correlation of spectroscopic and structural properties of indocyanine green j-aggregates by D. S. Farrakhova, I. D. Romanishkin, D. V. Yakovlev, Yu. S. Maklygina, V. A. Oleinikov, P. V. Fedotov, M. V. Kravchik, L. Bezdetnaya, V. B. Loschenov

    Published 2022-11-01
    “…In the work, the aggregation degree and the average size of nanoparticles depending on the concentration of a colloidal solution of indocyanine green (ICG NPs) in the form of J-aggregates were investigated by various methods based on light scattering. …”
    Get full text
    Article
  19. 179

    Enhanced picture fuzzy and centrality based EDAS-BW approach and its application in healthcare by Aicevarya Devi S, Felix Augustin

    Published 2025-06-01
    “…To overcome this hurdle, the concept of picture fuzzy set-triple parameters (PFS-TP) with the condition ζ⁎(x)+φ⁎(x)+ϖ⁎(x)=1 is introduced in this study by eliminating the refusal degree. To demonstrate the practicality of PFS-TP, a picture fuzzy decision-making model is designed by using evaluation based on distance from average solution (EDAS), Dempster-Shafer theory (DST) and the best-worst method (BWM). …”
    Get full text
    Article
  20. 180

    A comprehensive approach to portfolio optimization based on modern mathematical modeling methods by Shkanov Bulat

    Published 2025-04-01
    “…In this study, an integrated approach to portfolio optimization is presented, combining modern time series forecasting methods and flexible settings for portfolio optimization. …”
    Get full text
    Article