Suggested Topics within your search.
Suggested Topics within your search.
- Methodology 3
- Research 3
- Mass media 2
- Objectivity 2
- Psychological aspects 2
- Psychology 2
- ART / Digital 1
- Agriculture 1
- Computer animation 1
- Consumer Participation 1
- Decision making 1
- Digital cinematography 1
- EDUCATION / Leadership 1
- EDUCATION / Teaching Methods & Materials / Arts & Humanities 1
- EDUCATION / Teaching Methods & Materials / Science & Technology 1
- EDUCATION / Teaching Methods & Materials / Social Science 1
- English 1
- English language 1
- Environmental Health 1
- Environmental Pollution 1
- Environmental health 1
- Epidemiologic Methods 1
- Epidemiology 1
- Geography 1
- Information literacy 1
- Informationskompetenz 1
- Medicine 1
- Public health 1
- School management and organization 1
- Soil Science & Conservation 1
-
3901
METHODOLOGICAL AND METHODICAL BASIS OF THE NETWORK APPROACH TO THE STUDY OF SOCIAL IDENTIFICATION
Published 2017-10-01“…The heuristic network method to study identification revealed the benefits of its axiological direction. …”
Get full text
Article -
3902
Data hiding method based on color table expansion technique
Published 2009-01-01“…Based on color table expansion technique for indexed images,a data hiding method was proposed,and the se-curity and the hiding capacity were analyzed.The analysis results show that this method has very strong security and very high hiding capacity.Secret data can be hidden in an indexed cover image to generate a stego-image with the same visual effect as the cover image and resumed without distortion from the stego-image if the correct key is used.In addition,the statistical feature of the secret data is completely covered up by using random data,so the stego-image is statistically in-dependent of the secret data.…”
Get full text
Article -
3903
Projective drawing as a method of studying a family relationship
Published 2011-06-01“…“The drawing of the family in flower images” belongs to the type of expressive methods based on psychological mechanism of projection, it has a metaphoric sense, actualizes imagination and the author’s image of emotional and sensual interfamily relations. …”
Get full text
Article -
3904
On the implementation of a global optimization method for mixed-variable problems
Published 2021-02-01“…The algorithm is based on the radial basis function method of Gutmann and the metric stochastic response surface method of Regis and Shoemaker. …”
Get full text
Article -
3905
The Application of Practical Clothing Design Method in the Teaching of Clothing Specialty
Published 2022-01-01“…To improve the teaching practice effect of clothing major, this study applies the practical clothing design method to the teaching of clothing major to analyze the digital clothing design and establishes a convex quadratic conic programming model for a class of force optimization problems. …”
Get full text
Article -
3906
ASSESSMENT OF THE BANK'S ELECTRONIC MONEY USING THE METHOD OF HIERARCHIES ANALYSIS
Published 2015-02-01“…In the article the methodological approach of using the analytic hierarchy method for evaluation of the effectiveness of bank operating with electronic money is proved. …”
Get full text
Article -
3907
User role analysis method based on directed topological potential
Published 2014-12-01“…The majority of real-world networks are directed,weighted and dynamic.Aiming at the problem of node role analysis in directed weighted network,a novel node role analysis method based on directed topological potential is pro-posed,which can divide nodes into four roles based on their behavior pattern and local influence.Then,a node role-based dynamic networks evolution analysis method is introduced,which can model the dynamics of behavioral roles represent-ing the main connectivity patterns over time and detect the significant event.The experiment results indicate that pro-posed approaches can effectively estimate the node role and detect the dynamics of network evolution.…”
Get full text
Article -
3908
Automatic method for searching integral distinguishers of ARX block ciphers
Published 2018-05-01“…Firstly,based on three subsets division property propagation technique,the propagation function of the K-set and L-set of ARX block ciphers was constructed respectively.All vectors in L-set affected the propagation of K-set when propagate through xored round key operation.With SAT/SMT solver,round reduced integral propagation functions of ARX block ciphers could be established.Finally,by exhausting all possible input integral characteristics with proper data complexity,round reduced integral distinguishers of ARX block ciphers could be found.The proposed method can be used for searching integral distinguishers of ARX block ciphers including SIMON-like family block ciphers,HIGHT,SPECK family block ciphers and LEA effectively.…”
Get full text
Article -
3909
Trajectory Planning of Time Optimal Manipulator based on Complex Method
Published 2019-03-01“…The FS20N robot is used as the object for research and analysis, and imported into MATLAB for verification, the simulation structure shows that the complex method effectively optimizes the time.…”
Get full text
Article -
3910
Arthrosonography as a method of assessment of xefocam efficacy in rheumatoid gonitis
Published 2004-06-01Get full text
Article -
3911
Particle determination of red soils using micro-pipette method
Published 2001-11-01“…It was concluded from the results on a wide range texture of soils that particle composition of red soils could be analyzed effectively with a micro-pipette method (using 4.00 g soil and sampling 5 mL suspension) that have low coefficient of variation with accuracy and precision comparable to pipette method and much higher repeatable than hydrometer method. …”
Get full text
Article -
3912
An information-DNA based method of information dissemination and evolution on Internet
Published 2022-11-01“…To solve the problem of how to trace the information content dissemination and evolution process on the Internet, an information DNA-based method of information dissemination and evolution on Internet was proposed.Firstly, semantic extraction of Internet information content was performed based on domain knowledge to form a key feature set of information content.Then, using the key feature set of information content, an information DNA construction method based on locally sensitive hashing was proposed.Finally, the usability and effectiveness of the proposed method were verified by public dataset.The problem of traceability of Internet homologous information dissemination and evolution process was solved by using information DNA as the core identifier, which was of great practical significance for the study of Internet information content dissemination, evolution tracing and the governance and guidance of Internet public opinion events.…”
Get full text
Article -
3913
Acoustic activity of some metals determined by the acoustic emission method
Published 2015-07-01Get full text
Article -
3914
Positive Psychotherapy in action: the “DYNAMICS” method for formulating basic conflicts
Published 2025-01-01“…In this direction, the DYNAMICS method was developed in the study. In this method, clients go through eight stages and examine their basic conflicts multi-faceted. …”
Get full text
Article -
3915
Method of node distribution for heterogeneous WMSN based on load balancing
Published 2015-10-01“…Multiple hop transmission in wireless sensor networks(WSN)would bring the energy hole problem near the sink.It proved that the energy hole problem would appear in any position in heterogeneous wireless multimedia sensor networks and propose a method of the node distribution based on load balancing to solve the problem.The energy consumption was analyzed on the basis of considering the data compression ratio and the energy consumed for data transmission and processing.It proved that in heterogeneous WMSN the energy consumption of data processing would affect the node distribution and define a word that profit of data processing.The simulation results show that the energy utilization rate and the survival time of the network can be effectively improved by using the method proposed.…”
Get full text
Article -
3916
Automatic exploitation generation method of write-what-where vulnerability
Published 2022-01-01“…To solve the problem that the current vulnerability automatic exploitation generation methods cannot automatically generate control-flow-hijacking exploitation from write-what-where, a method of automatic exploitation generation for write-what-where was proposed.First, the write-what-where vulnerability was detected based on the memory address control strength dynamic taint analysis method.Then, the vulnerability exploitation elements were searched based on the vulnerability exploitation modes, and the exploitation of write-what-where vulnerability was generated automatically by constraint solving.The experimental results show that the proposed method can effectively detect write-what-where vulnerability, search exploitation elements, and automatically generate the control-flow-hijacking exploitation from write-what-where.…”
Get full text
Article -
3917
An information-DNA based method of information dissemination and evolution on Internet
Published 2022-11-01“…To solve the problem of how to trace the information content dissemination and evolution process on the Internet, an information DNA-based method of information dissemination and evolution on Internet was proposed.Firstly, semantic extraction of Internet information content was performed based on domain knowledge to form a key feature set of information content.Then, using the key feature set of information content, an information DNA construction method based on locally sensitive hashing was proposed.Finally, the usability and effectiveness of the proposed method were verified by public dataset.The problem of traceability of Internet homologous information dissemination and evolution process was solved by using information DNA as the core identifier, which was of great practical significance for the study of Internet information content dissemination, evolution tracing and the governance and guidance of Internet public opinion events.…”
Get full text
Article -
3918
A FPGA Modeling Method for Power Electronic Topology Simulation
Published 2020-01-01“…The simulation results demonstrate the effectiveness of the proposed method compared with the SimPowerSytem model.…”
Get full text
Article -
3919
Quality analysis method of Web browsing based on big data
Published 2020-11-01“…The traditional network operation and maintenance often focuses on the operation status of the network and equipment,which is difficult to solve the user's subjective perception.It is urgent to establish an end-to-end Internet application awareness management system.Focusing on the quality analysis of web browsing,the quality analysis framework and method of user perceived data based on big data technology was studied,a quality analysis system framework based on big data technology was designed and proposed,which was used to realize the quality analysis of Internet business.Taking an international website as an example,a diagnosis method of "two looks and five cuts" was proposed to delimit and trace the cause,which improves the efficiency of manual analysis and verifies the effectiveness of the proposed method.…”
Get full text
Article -
3920
A Novel Cooperative ARQ Method for Wireless Sensor Networks
Published 2015-10-01Get full text
Article