Suggested Topics within your search.
Suggested Topics within your search.
- Methodology 3
- Research 3
- Mass media 2
- Objectivity 2
- Psychological aspects 2
- Psychology 2
- ART / Digital 1
- Agriculture 1
- Computer animation 1
- Consumer Participation 1
- Decision making 1
- Digital cinematography 1
- EDUCATION / Leadership 1
- EDUCATION / Teaching Methods & Materials / Arts & Humanities 1
- EDUCATION / Teaching Methods & Materials / Science & Technology 1
- EDUCATION / Teaching Methods & Materials / Social Science 1
- English 1
- English language 1
- Environmental Health 1
- Environmental Pollution 1
- Environmental health 1
- Epidemiologic Methods 1
- Epidemiology 1
- Geography 1
- Information literacy 1
- Informationskompetenz 1
- Medicine 1
- Public health 1
- School management and organization 1
- Soil Science & Conservation 1
-
5161
Mechanisms of Insulin Signaling as a Potential Therapeutic Method in Intestinal Diseases
Published 2024-11-01Get full text
Article -
5162
Optimization Method for Topology Identification of Port Microgrid Based on Line Disconnection
Published 2025-02-01“…The results indicate that the optimization method can significantly reduce the time required for load margin calculations in the project, and the effect of the method is similar to that of the traditional continuation power flow (CPFLOW) method. …”
Get full text
Article -
5163
Disturbance Identification and Adaptive Compensation Method in Optical Target Tracking System
Published 2024-01-01“…Furthermore, the conditions for closed-loop stability and robust stability are detailed. Finally, the method's effectiveness is demonstrated through simulation and actual experimentation on an optical target tracking system with disturbances.…”
Get full text
Article -
5164
Data‐driven Buck converter model identification method with missing outputs
Published 2024-09-01“…By applying the proposed method to a Buck converter, experimental results demonstrate its effectiveness.…”
Get full text
Article -
5165
A Comprehensive Performance Improvement Control Method by Fractional Order Control
Published 2018-01-01“…And in order to obtain the global optimum in controller parameter tuning, a visual version method is also imported. This innovative control scheme could effectively equilibrate the system's demands for high error suppression capacity and enough phase margin, and makes it possible for a class of systems’ high precision control. …”
Get full text
Article -
5166
The Dynamic Similitude Design Method of Thin Walled Structures and Experimental Validation
Published 2016-01-01“…Furthermore, the previous five orders’ accurate distorted scaling laws of thin walled annular plates are presented and numerically validated. Finally, the effectiveness of the similitude design method is validated by experimental annular plates.…”
Get full text
Article -
5167
Parameter Optimization Method for Predictor–Corrector Guidance With Impact Angle Constraint
Published 2024-01-01“…A Monte Carlo simulation has verified its effectiveness and reliability.…”
Get full text
Article -
5168
Exploring Feasible Carbon Trading Scheme via Graph-Theoretic Method
Published 2024-12-01Get full text
Article -
5169
Membership inference attack and defense method in federated learning based on GAN
Published 2023-05-01“…Aiming at the problem that the federated learning system was extremely vulnerable to membership inference attacks initiated by malicious parties in the prediction stage, and the existing defense methods were difficult to achieve a balance between privacy protection and model loss.Membership inference attacks and their defense methods were explored in the context of federated learning.Firstly, two membership inference attack methods called class-level attack and user-level attack based on generative adversarial network (GAN) were proposed, where the former was aimed at leaking the training data privacy of all participants, while the latter could specify a specific participant.In addition, a membership inference defense method in federated learning based on adversarial sample (DefMIA) was further proposed, which could effectively defend against membership inference attacks by designing adversarial sample noise addition methods for global model parameters while ensuring the accuracy of federated learning.The experimental results show that class-level and user-level membership inference attack can achieve over 90% attack accuracy in federated learning, while after using the DefMIA method, their attack accuracy is significantly reduced, approaching random guessing (50%).…”
Get full text
Article -
5170
An Investigation on the Soft Computing Method Performance of the Optimizing Energy Consumption Cost
Published 2023-03-01Get full text
Article -
5171
Application of Closed Reconstruction Method in Error Detection of RV Cycloidal Gear
Published 2021-08-01“…The practicality and effectiveness of this method are verified by comparison of examples, which provides data basis for subsequent finishing processing.…”
Get full text
Article -
5172
Adaptive measurement rate setting method in block compressed sensing of images
Published 2014-07-01“…Traditional block compressed sensing (BCS) of images uses the same measurement rate to measure each block,but some blocking artifacts appear in the reconstructed image on accounting of varying spatial characteristics in an image.This problem can be effectively solved by adaptively setting different measurement rate for every block.However,these existing methods require original digital image at the collector,which cannot be realized by using practical compressive imaging (CI) devices.In order to overcome this shortage,an adaptive measurement rate setting method is proposed and it can be easily achieved though hardware equipments.This method uses the CS measurements acquired at the collector to estimate the sample variance of each block directly,and then adaptively sets measurement rate of each block in terms of their sample variances and realize rate control.Experimental results show that proposed method can obtain a better qual-ity of reconstructed image than non-adaptive scheme,but there is a gap between proposed method and the adaptive scheme using the true block sample variance since the sample variance estimated in the measurement domain has some deviations.…”
Get full text
Article -
5173
Evaluation Method of Hydro-wind-photovoltaic Resource Complementarity and Scheduling Complementarity
Published 2025-01-01“…Research in the Hongshui River Basin shows that, at a 95% reliability level, the resource compensation benefit in the basin is 13.56%, while the scheduling compensation benefit is 16.12%. These indicators effectively quantify the significant spatiotemporal complementarity characteristics in the annual distribution of hydro-wind-photovoltaic resources, highlighting the necessity of transforming scheduling methods. …”
Get full text
Article -
5174
On the use of the stepped isostress method in the prediction of creep behavior of polyamide 6
Published 2022-10-01“…The stepped isostress method (SSM) is an advanced technique which allows the prediction of the long-term behavior and enables the construction of creep master curves of materials with short-term experimental tests. …”
Get full text
Article -
5175
Dynamic heterogeneous network representation learning method based on Hawkes process
Published 2024-08-01“…Existing methods for heterogeneous network representation learning mainly focus on static networks, overlooking the significant impact of temporal attributes on node representations. …”
Get full text
Article -
5176
A study on fault recovery method of TTDP backbone network node
Published 2022-11-01“…The proposed fault recovery scheme was verified by simulation test, which confirms the effectiveness and feasibility of the method.…”
Get full text
Article -
5177
Anomaly traffic detection method based on data augmentation and feature mining
Published 2025-01-01“…To address the limitations of existing anomaly traffic detection methods, such as insufficient recognition accuracy for minority classes and limited deep feature extraction capabilities, a novel anomaly traffic detection method based on data augmentation and feature mining was proposed. …”
Get full text
Article -
5178
An automatic adaptive method to combine summary statistics in approximate Bayesian computation.
Published 2020-01-01Get full text
Article -
5179
A Method of Improving Oral English Teaching Based on PLS-SEM
Published 2022-01-01“…This paper evaluates the PLS-SEM model in terms of reliability and validity in order to validate the effectiveness of the method used. The PLS-SEM model developed in this paper for improving oral English teaching has high reliability, validity, and explanatory power. …”
Get full text
Article -
5180
A network intrusion detection method designed for few-shot scenarios
Published 2023-10-01“…Existing intrusion detection techniques often require numerous malicious samples for model training.However, in real-world scenarios, only a small number of intrusion traffic samples can be obtained, which belong to few-shot scenarios.To address this challenge, a network intrusion detection method designed for few-shot scenarios was proposed.The method comprised two main parts: a packet sampling module and a meta-learning module.The packet sampling module was used for filtering, segmenting, and recombining raw network data, while the meta-learning module was used for feature extraction and result classification.Experimental results based on three few-shot datasets constructed from real network traffic data sources show that the method exhibits good applicability and fast convergence and effectively reduces the occurrence of outliers.In the case of 10 training samples, the maximum achievable detection rate is 99.29%, while the accuracy rate can reach a maximum of 97.93%.These findings demonstrate a noticeable improvement of 0.12% and 0.37% respectively, in comparison to existing algorithms.…”
Get full text
Article