Suggested Topics within your search.
Suggested Topics within your search.
- Methodology 3
- Research 3
- Mass media 2
- Objectivity 2
- Psychological aspects 2
- Psychology 2
- ART / Digital 1
- Agriculture 1
- Computer animation 1
- Consumer Participation 1
- Decision making 1
- Digital cinematography 1
- EDUCATION / Leadership 1
- EDUCATION / Teaching Methods & Materials / Arts & Humanities 1
- EDUCATION / Teaching Methods & Materials / Science & Technology 1
- EDUCATION / Teaching Methods & Materials / Social Science 1
- English 1
- English language 1
- Environmental Health 1
- Environmental Pollution 1
- Environmental health 1
- Epidemiologic Methods 1
- Epidemiology 1
- Geography 1
- Information literacy 1
- Informationskompetenz 1
- Medicine 1
- Public health 1
- School management and organization 1
- Soil Science & Conservation 1
-
3921
Seismic fault identification method based on CBAM-TransUNet
Published 2025-02-01“…The experimental results show that the seismic fault identification method based on CBAM-TransUNet can effectively identify the faults while removing the redundant fault information, and performs well in terms of fault identification accuracy and fault identification continuity, and the identified faults are richer in details, which improves the accuracy of fault identification, and can be effectively applied to identify the faults in the real seismic data.…”
Get full text
Article -
3922
Tropical Cyclone Size Prediction and Development of An Error Correction Method
Published 2025-01-01Get full text
Article -
3923
Simulation Initialization Method for AC/DC Hybrid Power Grid
Published 2022-08-01“…The simulation results of IEEE33 bus and 330 bus AC / DC hybrid power grid with photovoltaic power stations are used to verify the effectiveness of the proposed method.…”
Get full text
Article -
3924
In situ/operando method for energy stability measurement of synchrotron radiation
Published 2024-11-01“…A novel in situ/operando method is introduced to measure the photon beam stability of synchrotron radiation based on orthogonal diffraction imaging of a Laue crystal/analyzer, which can decouple the energy/wavelength and Bragg angle of the photon beam using the dispersion effect in the diffraction process. …”
Get full text
Article -
3925
Timing Method for the Isoland Signalized Intersection Considering the Traffic Uncertainty
Published 2020-03-01“…The performances of these timing plans are computed in Paramics software, validating the effectiveness of the proposed method.…”
Get full text
Article -
3926
Semidiscrete central difference method in time for determining surface temperatures
Published 2005-01-01“…A numerical example shows that the computational effect of this method is satisfactory.…”
Get full text
Article -
3927
RESEARCH ON MODELING METHOD OF EQUIVALENT TURNING FORCE MODEL (MT)
Published 2023-01-01Get full text
Article -
3928
A NEW FAILURE PROBABILITY COMPUTING METHOD FOR MECHANICAL COMPONENTS
Published 2020-01-01“…The results show that the new method can calculate the failure probability of mechanical components effectively.…”
Get full text
Article -
3929
Detection method of LDoS attacks based on combination of ANN & KPCA
Published 2018-05-01“…Low-rate denial-of-service (LDoS) attack is a new type of attack mode for TCP protocol.Characteristics of low average rate and strong concealment make it difficult for detection by traditional DoS detecting methods.According to characteristics of LDoS attacks,a new LDoS queue future was proposed from the router queue,the kernel principal component analysis (KPCA) method was combined with neural network,and a new method was present to detect LDoS attacks.The method reduced the dimensionality of queue feature via KPCA algorithm and made the reduced dimension data as the inputs of neural network.For the good sell-learning ability,BP neural network could generate a great LDoS attack classifier and this classifier was used to detect the attack.Experiment results show that the proposed approach has the characteristics of effectiveness and low algorithm complexity,which helps the design of high performance router.…”
Get full text
Article -
3930
Diverse Copulas through Durante's Method. Exploring Parametric Functions
Published 2024-01-01“…Our exploration encompasses a collection of power-like, exponential-like, trigonometric-like, logarithmic-like, hyperbolic-like and error-like functions, each dependent on one, two, or three parameters, effectively satisfying the necessary assumptions of Durante's method. …”
Get full text
Article -
3931
STRUCTURE RELIABILITY CALCULATION METHOD BASED ON IMPROVED NEURAL NETWORK
Published 2021-01-01“…Finally, the reliability calculation results were calculated with the Monte Carlo method. The results show that the proposed method improves the fitting accuracy and gives consideration to the calculation efficiency, which verifies the superiority and feasibility of the proposed method.…”
Get full text
Article -
3932
Finite Volume Method and Its Applications in Computational Fluid Dynamics
Published 2025-05-01“…Various numerical techniques have been developed to address multiple problems in computational fluid dynamics (CFD). The finite volume method (FVM) is a numerical technique used for solving partial differential equations that represent conservation laws by dividing the domain into control volumes and ensuring flux balance at their boundaries. …”
Get full text
Article -
3933
Method for radical surgical treatment of lower limbs varicose disease
Published 2015-02-01“…It was established that the method has a smaller injuries and operative time, allows to save unaltered subcutaneous veins, have better cosmetic effect that testifies the advisability of the proposed method of treatment.…”
Get full text
Article -
3934
A New Method for Solving Supervised Data Classification Problems
Published 2014-01-01“…To improve classification performance and efficiency in generating classification model, a new feature selection algorithm based on techniques of convex programming is suggested. Proposed methods are tested on real-world datasets. Results of numerical experiments have been presented which demonstrate the effectiveness of the proposed algorithms.…”
Get full text
Article -
3935
Discovering Miss Puff: a new method of communication in China
Published 2013-01-01Get full text
Article -
3936
Fault analysis on elliptic curve cryptosystems with sliding window method
Published 2012-01-01“…Based on the principle of sign change fault attacks,an improved fault analysis method was presented against elliptic curve cryptosystems with sliding window method for point multiplication.When faults on double instruction it could effectively solve the “zero block failure” problem.Experiment results demonstrate that 15 times fault injections are enough to recover full 192bit key.When faults on add instruction,a new fault analysis method was proposed.Experiment results demonstrate one fault injection can reduce searching space 2<sup>7</sup>~2<sup>15</sup>.The method presented here can provide some ideas for fault attack on other cryptosystems using sliding window method.…”
Get full text
Article -
3937
An Optimization Method for Thrust Allocation of ROV Based on Genetic Algorithm
Published 2023-12-01“…Subsequently, genetic algorithm is employed to optimize thrust allocation for the ROV's horizontal and vertical propellers, with results compared to outcomes from a pseudo-inverse method of thrust allocation. Simulation analysis reveals that the thrust allocation optimized via the genetic algorithm can effectively prevent output saturation and ensures that the resultant force or torque from each propeller's output aligns almost exactly with the intended combined force or torque, maintaining an error within ±1%.…”
Get full text
Article -
3938
Method of Webshell detection based on multi-view feature fusion
Published 2020-06-01“…Webshell is a malicious script file on the Web.It is usually uploaded by the attacker to the target server to achieve the purpose of illegal access control.In order to overcome the shortcoming of the existing Webshell detection methods,such as single network traffic behavior,simple by passed signature comparison,and easily bypassed signature comparison,a method of Webshell detection based on multi-view feature fusion for PHP Webshell detecting was proposed.Firstly,multiple features including lexical features,syntactic features,and abstract features were extracted.Secondly,fisher score was used to sort and filter all features according to the degree of importance.Finally,a model that can effectively distinguish Webshell from normal scripts was established through SVM.The large-scale experiment in real-world scenario shows that the final accuracy of our model can reach 92.1%.…”
Get full text
Article -
3939
New method of text representation model based on neural network
Published 2017-04-01“…Method of text representation model was proposed to extract word-embedding from text feature.Firstly,the word-embedding of the dual word-embedding list based on dictionary index and the corresponding part of speech index was created.Then,feature vectors was obtained further from these extracted word-embeddings by using Bi-LSTM recurrent neural network.Finally,the sentence vectors were processed by mean-pooling layer and text categorization was classified by softmax layer.The training effects and extraction performance of the combination model of Bi-LSTM and double word-embedding neural network were verified.The experimental results show that this model not only performs well in dealing with the high-quality text feature vector and the expression sequence,but also significantly outperforms other three kinds of neural networks,which includes LSTM,LSTM+context window and Bi-LSTM.…”
Get full text
Article -
3940
The Evaluation Method of Rock Mass Stability Based on Natural Frequency
Published 2021-01-01“…The experiment proved the measurability of the index of the natural frequency of rock and the method’s effectiveness for the stability analysis of the rock based on natural frequency.…”
Get full text
Article