Suggested Topics within your search.
Suggested Topics within your search.
- Methodology 3
- Research 3
- Mass media 2
- Objectivity 2
- Psychological aspects 2
- Psychology 2
- ART / Digital 1
- Agriculture 1
- Computer animation 1
- Consumer Participation 1
- Decision making 1
- Digital cinematography 1
- EDUCATION / Leadership 1
- EDUCATION / Teaching Methods & Materials / Arts & Humanities 1
- EDUCATION / Teaching Methods & Materials / Science & Technology 1
- EDUCATION / Teaching Methods & Materials / Social Science 1
- English 1
- English language 1
- Environmental Health 1
- Environmental Pollution 1
- Environmental health 1
- Epidemiologic Methods 1
- Epidemiology 1
- Geography 1
- Information literacy 1
- Informationskompetenz 1
- Medicine 1
- Public health 1
- School management and organization 1
- Soil Science & Conservation 1
-
3801
An inexpensive method to measure latent toxoplasmosis and its behavioral consequences
Published 2025-04-01“…We propose a psychological diagnostic method for latent toxoplasmosis using response times, hence enabling large-scale tests of psychological, psychiatrical, and behavioral effects. …”
Get full text
Article -
3802
Laboratory Study on Rockburst Control by Step Method in Deep Tunnel
Published 2025-04-01“…In terms of rockburst control technology, it is generally believed that optimizing the section design and adopting the step method can effectively suppress the occurrence of rockburst, but there is no literature to explain the reasons for adopting this method from the experimental point of view. …”
Get full text
Article -
3803
Research of the Law and Control Method of Automatic Shift for Engineering Vehicle
Published 2019-07-01“…It shows that the improved BP neural network control method can effectively control vehicle automatic shift. …”
Get full text
Article -
3804
LEARNING GALLERY METHOD'S IMPACT ON ELEMENTARY STUDENTS' SCIENCE COMPREHENSION
Published 2024-06-01“…This prompted the researcher to conduct a study entitled Effects of the Gallery Learning Method on the Level of Students' Understanding of Science Learning at SD Z. …”
Get full text
Article -
3805
Fabrication and characterization of shape memory composite with layer by layer method
Published 2025-04-01“…Due to the its appropriate glass transition temperature(Tg), a kind of carbon reinforced carbon-reinforced composite with exhibiting a shape memory effect is successfully fabricated using a layer-by-layer method. …”
Get full text
Article -
3806
The Removal Method of the Blasting Vibration Signal Trend Item and Noise
Published 2021-01-01“…Firstly, based on the FDM theory, the original blasting vibration signal is decomposed to obtain several modal components; then, the dominant component of the signal is filtered according to the dominant frequency of the modal component and its correlation with the original signal; finally, the dominant component is reconstructed to remove the trend item and noise at the same time; spectrum analysis is carried out to verify the effectiveness of the method. The results show that FDM can effectively disperse low-frequency trend items, high-frequency noise, and useful signal information while decomposing signals containing trend terms and noise; compared with the existing common methods, it can more effectively retain the original information, which provides a reference for the trend item and noise removal of similar blasting vibration signals.…”
Get full text
Article -
3807
Appropriate Separator Sizing: A Modified Stewart and Arnold Method
Published 2012-01-01Get full text
Article -
3808
Interaction based on method for spam detection in online social networks
Published 2015-07-01“…In online social networks,advertisements,rumors and malicious links are propagated by spammers arbitrarily.They not only disturb users’usualaccess,but also bring about network security threats and social panics.In an attempt to deal with the spam problems,an information diffusion model was proposed to capture the features of spam propagation.Propagation behaviors are quantitatively analyzed to detect spam messages with a decision tree-based method.The effectiveness of proposed detection model is evaluated with real data from the micro-bloggingnetwork of Sina.The experimental results show that proposed model can effectively detect spams in Sina micro-bloggingnetwork.…”
Get full text
Article -
3809
The Cassandra Method: Dystopian Visions as a Basis for Responsible Design
Published 2024-06-01“…To minimize these, the Cassandra method aims to foresee such negative effects by systematically investigating dystopian visions. …”
Get full text
Article -
3810
Method to generate cyber deception traffic based on adversarial sample
Published 2020-09-01“…In order to prevent attacker traffic classification attacks,a method for generating deception traffic based on adversarial samples from the perspective of the defender was proposed.By adding perturbation to the normal network traffic,an adversarial sample of deception traffic was formed,so that an attacker could make a misclassification when implementing a traffic analysis attack based on a deep learning model,achieving deception effect by causing the attacker to consume time and energy.Several different methods for crafting perturbation were used to generate adversarial samples of deception traffic,and the LeNet-5 deep convolutional neural network was selected as a traffic classification model for attackers to deceive.The effectiveness of the proposed method is verified by experiments,which provides a new method for network traffic obfuscation and deception.…”
Get full text
Article -
3811
Wavelet Analysis Method to Solve the Problem of Wireless Location Tracking
Published 2013-10-01Get full text
Article -
3812
Improvement and Experimental Study of Loading Mode of Vacuum Preloading Method
Published 2021-01-01“…For the phenomenon of “soil column” occurred in the reinforcement of mud by vacuum preloading method,in order to improve the reinforcement effect of vacuum preloading this paper summarizes and analyzes the formation mechanism of “soil column” for coming to the conclusion that the main reason for the formation of “soil column” is the silting of drainage board,proposes the method of step vacuum loading,concludes that the strength of reinforced soil increases largely under the step vacuum loading method after analysis of the theory of soil mechanics,and verifies it through the indoor model test.The results show that the permeability coefficient of the plastic drainage board decreases slightly and the consolidation settlement value of the reinforced mud is larger under the step vacuum loading,indicating that the step vacuum loading method can reduce the silting of drainage boards,delay the occurrence of “soil column” phenomenon,and improve the overall reinforcement effect of mud.…”
Get full text
Article -
3813
Improving the efficiency of traffic organization by the method of the offset left turn
Published 2023-09-01Get full text
Article -
3814
Method to generate cyber deception traffic based on adversarial sample
Published 2020-09-01“…In order to prevent attacker traffic classification attacks,a method for generating deception traffic based on adversarial samples from the perspective of the defender was proposed.By adding perturbation to the normal network traffic,an adversarial sample of deception traffic was formed,so that an attacker could make a misclassification when implementing a traffic analysis attack based on a deep learning model,achieving deception effect by causing the attacker to consume time and energy.Several different methods for crafting perturbation were used to generate adversarial samples of deception traffic,and the LeNet-5 deep convolutional neural network was selected as a traffic classification model for attackers to deceive.The effectiveness of the proposed method is verified by experiments,which provides a new method for network traffic obfuscation and deception.…”
Get full text
Article -
3815
A Dual-unknown-input Self-calibration Filtering Method
Published 2019-01-01“…Traditional Kalman filtering methods cannot eliminate the effect of these two unknown inputs, leading to large filtering errors. …”
Get full text
Article -
3816
Backdoor defense method in federated learning based on contrastive training
Published 2024-03-01“…In response to the inadequacy of existing defense methods for backdoor attacks in federated learning to effectively remove embedded backdoor features from models, while simultaneously reducing the accuracy of the primary task, a federated learning backdoor defense method called ContraFL was proposed, which utilized contrastive training to disrupt the clustering process of backdoor samples in the feature space, thereby rendering the global model classifications in federated learning independent of the backdoor trigger features.Specifically, on the server side, a trigger generation algorithm was developed to construct a generator pool to restore potential backdoor triggers in the training samples of the global model.Consequently, the trigger generator pool was distributed to the participants by the server, where each participant added the generated backdoor triggers to their local samples to achieve backdoor data augmentation.Experimental results demonstrate that ContraFL effectively defends against various backdoor attacks in federated learning, outperforming existing defense methods.…”
Get full text
Article -
3817
Rock Dynamic Fracture Characteristics Based on NSCB Impact Method
Published 2018-01-01“…In 2012, the International Society for Rock Mechanics (ISRM) recommended a new Notched Semicircular Bend (NSCB) method for the determination of dynamic fracture toughness of rock materials, but it did not consider the effect of some uncontrollable factors in the course of the experiment on the test result. …”
Get full text
Article -
3818
Impact of irrigation method and biochar application on growth and yield of rice
Published 2024-12-01“…【Method】 The experiment was carried out as a field trial using two irrigation modes: flood irrigation (CF) and alternating wet and dry irrigation (AWD). …”
Get full text
Article -
3819
-
3820
Installation Error Calibration Method for Redundant MEMS-IMU MWD
Published 2025-03-01“…Finally, simulation and laboratory experiments were conducted to verify the effectiveness of the proposed method. The simulation results showed that the proposed method reduced installation errors by 40.4% compared with conventional methods. …”
Get full text
Article