Suggested Topics within your search.
Suggested Topics within your search.
- Methodology 3
- Research 3
- Mass media 2
- Objectivity 2
- Psychological aspects 2
- Psychology 2
- ART / Digital 1
- Agriculture 1
- Computer animation 1
- Consumer Participation 1
- Decision making 1
- Digital cinematography 1
- EDUCATION / Leadership 1
- EDUCATION / Teaching Methods & Materials / Arts & Humanities 1
- EDUCATION / Teaching Methods & Materials / Science & Technology 1
- EDUCATION / Teaching Methods & Materials / Social Science 1
- English 1
- English language 1
- Environmental Health 1
- Environmental Pollution 1
- Environmental health 1
- Epidemiologic Methods 1
- Epidemiology 1
- Geography 1
- Information literacy 1
- Informationskompetenz 1
- Medicine 1
- Public health 1
- School management and organization 1
- Soil Science & Conservation 1
-
5061
Defense decision-making method based on incomplete information stochastic game
Published 2018-08-01“…Most of the stochastic game models to select network defense strategies are composed of matrix game and Markov decision,which assumes that the defender has known the attacker's revenue.This assumption does not conform to the actual situation.The uncertainty of the attacker's income was converted into the indeterminacy of the attacker type,and an incomplete information stochastic game model,which was combined with the static Bias game and Markov decision,was constructed.The equilibrium solution method of the incomplete information stochastic game model was given,and the strategy selection of the defender was guided by the stable Bias Nash equilibrium.Finally,a practical example was given to demonstrate the feasibility and effectiveness of the model.…”
Get full text
Article -
5062
ABCD method for determination of low-temperature properties of ordinary and modified binders
Published 2024-05-01“…A comparative analysis of the low-temperature properties of ordinary and modified binders obtained during their determination by the direct method enables to confirm the effectiveness of the methodology developed in GOST R 58400.11-2019 for assessing the performance of binders of various component composition in difficult climatic conditions of Russia. …”
Get full text
Article -
5063
Features of the gas chromatographic method for monitoring the content of phenols in an aqueous medium
Published 2023-06-01“…The purpose of this work is to determine the content of phenols in an aqueous medium by gas chromatographic method using various sorption materials. To do this, it is necessary to consider some features of the gas chromatographic method for monitoring the content of phenols in an aqueous medium using various sorption materials. …”
Get full text
Article -
5064
METHODICAL APPROACH TO THE COMPARATIVE EVALUATION OF ARMORED SPECIAL VEHICLES HOUSING MATERIALS
Published 2015-04-01“…In the article as the baseline approach for comparison the armored vehicles body materials buildings, the method of progressive standard has proposed to use. …”
Get full text
Article -
5065
High-roubustness keystroke recognition method based on acoustic spatial gradient
Published 2020-05-01Get full text
Article -
5066
The nonlinear observer-based fault diagnosis method for the high altitude airship
Published 2025-02-01“…Furthermore, all these mentioned observers were achieved via the linear matrix inequation framework. The effectiveness of the proposed method was verified by different fault cases in an HAA simulation system.…”
Get full text
Article -
5067
Investigation of the Multiple Imputation Method in Different Missing Ratios and Sample Sizes
Published 2019-08-01“…The method is also used effectively in some usefulproperties of the Bayes method. …”
Get full text
Article -
5068
Acoustic method for measuring the thickness of deposits on the inner wall of technological equipment
Published 2025-06-01“…In the paper researches of the acoustic method for measuring the thickness of wax deposits on the inner wall of technological equipment are carried out. …”
Get full text
Article -
5069
Research of Finite Element Analysis Method of Gear with Load Shaft and the Application
Published 2018-01-01“…The results show that the thickness of the rim has no effect on the tooth root stress by calculating the spur gear with the finite element method,and the limitation of the finite element methods is put forward.…”
Get full text
Article -
5070
Semi-quantitative Safety Assessment Method for Liquid Rocket Body Structure
Published 2023-10-01“… Aiming at the safety problem of liquid rocket body structure , this paper presents a method to evaluate the safety state by using belief rule base ( BRB) and whale optimization algorithm ( WOA) model. …”
Get full text
Article -
5071
Analysis Method of Gear Profile Deformation,Transmission Error and Contact Pattern
Published 2018-01-01“…By using the LTCA analysis of involute gear,gear tooth deformation and stiffness curve with load is obtained. Then a study of the effect on meshing stiffness of drum shape modification across of gear width and lead misalignment is carried out by using of slicing method. …”
Get full text
Article -
5072
New Method of Dynamics Performance Simulation for Metro Vehicle with Linear Motor
Published 2015-01-01“…Considering the complexity of the method to obtain the electromagnetic force on the space distribution by simulating electromagnetic field with FEM, combined requirements of engineering practice, a new method was introduced based on the DTC control system which simulated the effect on the vehicle by using the measured traction performance curves of LIM. …”
Get full text
Article -
5073
Beacon Aided Positioning Method for Lunar Probes Using Temporal Interferometry
Published 2022-01-01“…Then, we proposed arctangent temporal interferometry (ATI) method for ambiguity resolution in displacement measurement. …”
Get full text
Article -
5074
A Magnetic Deburring Method for Hypodermic Needles Used in Human Bodies
Published 2025-04-01“…Our experimental results validated the effectiveness of the magnetic deburring method.…”
Get full text
Article -
5075
Method for the design of variable fractional delay filters with coefficient-dependence relation
Published 2024-04-01“…The analysis shows that the proposed method can effectively reduce the complexity and computational cost of variable fractional delay filters.…”
Get full text
Article -
5076
Mobile visual searching method based on ascending extreme learning machine
Published 2016-04-01“…Finally,the experiment proves the effectiveness of the method proposed by using ELM for the mobile vision searching. …”
Get full text
Article -
5077
Calculation and uncertainty analysis method for airfoil drag coefficient considering compressibility
Published 2025-02-01“…In order to meet the need of evaluating the effectiveness of airfoil drag reduction design, the calculation and uncertainty analysis method for airfoil drag coefficient considering compressibility is studied. …”
Get full text
Article -
5078
Study on electronic evidence acquisition and analysis method over Windows logs
Published 2012-11-01“…In order to collect logs in real time,two methods to acquire Windows logs in real time were proposed respectively according to the two types of log file formats.Based on acquiring logs,an approach for correlating log files with atomic attack functions was proposed.After the correlation,atomic attack functions can be analyzed instead of log files,which can greatly decrease the time of analysis.A time based log correlation and event reconstruction method was proposed to reconstruct the computer criminal scenarios.Experimental results show that log evidences can be acquired and the crime process can be reconstructed effectively.…”
Get full text
Article -
5079
Coverage Restoration Method for Wireless Sensor Networks of Distributed PV System
Published 2015-02-01“…Simulation results show the effectiveness of the proposed algorithm.…”
Get full text
Article -
5080
Vulnerability detection method for blockchain smart contracts based on metamorphic testing
Published 2023-10-01“…Aimed at the defects of existing test methods, a vulnerability detection method for blockchain smart contracts based on metamorphic testing was proposed, which could generate test cases for specific functions in blockchain smart contracts to detect possible vulnerabilities.According to the possible security vulnerabilities, different metamorphosis relationships were designed and then metamorphic testing was performed.Through verifying whether the metamorphic relationship between the source test case and the subsequent test case was satisfied, whether the smart contract had related security vulnerabilities was judged.The experimental results show that the proposed method can effectively detect the security vulnerabilities in the smart contracts.…”
Get full text
Article