Search alternatives:
method » methods (Expand Search)
Showing 4,201 - 4,220 results of 209,172 for search 'effective method', query time: 0.65s Refine Results
  1. 4201

    Review of Methods and Models for Forecasting Electricity Consumption by Kamil Misiurek, Tadeusz Olkuski, Janusz Zyśk

    Published 2025-07-01
    “…Particular attention was paid to the effectiveness of these methods in the context of variable input data, such as weather conditions, seasonal fluctuations, and changes in energy consumption patterns. …”
    Get full text
    Article
  2. 4202

    Music Therapy Methods Based on SVM and MLP by Hongmin Zou

    Published 2022-01-01
    “…Henceforth, this study focuses on the analysis of the music’s effect on fetal heart rate (FHR) curve. To this end, we treated people with music therapy and carried out the experiment. …”
    Get full text
    Article
  3. 4203

    Merging Qualitative Design Methods With Design Science by Muhammad Afif Fathullah, Anusuyah Subbarao, Abdulaziz Ahmad, Saravanan Muthaiyah

    Published 2025-04-01
    “…Qualitative design has mostly been used as an approach to finding and analysing the cause and effect of a phenomena. However, with the increasing importance of digital technology in the current digital age, research that encompasses qualitative design and developmental methods such as DSR is becoming more important. …”
    Get full text
    Article
  4. 4204

    Optical Cryptanalysis Method Using Wavefront Shaping by Meihua Liao, Dajiang Lu, Wenqi He, Xiang Peng

    Published 2017-01-01
    “…In this paper, a practical optical cryptanalysis method using wavefront shaping is proposed. Considering that the confusion and diffusion of information in the optical cryptosystem are actually caused by scattering effect of random phase mask(s), the proposed method employs a point source function and the feedback-based optimization algorithm, which can obtain an equivalent key of the optical cryptosystem. …”
    Get full text
    Article
  5. 4205

    Efficient Data Collection Method in Sensor Networks by Keyan Cao, Haoli Liu, Yefan Liu, Gongjie Meng, Si Ji, Gui Li

    Published 2020-01-01
    “…The algorithm is improved on the basis of the random node selection algorithm. This method can effectively avoid the failure of random path node selection and improve the node selection of random path in wireless sensor networks. …”
    Get full text
    Article
  6. 4206
  7. 4207

    Vulvovaginal atrophy: current methods of diagnosis and treatment by L. F. Zainetdinova, L. F. Telesheva, B. I. Medvedev, V. V. Khakhulina

    Published 2024-04-01
    “…Aim. To review modern methods of diagnosis and treatment of vulvovaginal atrophy (VVA), which is one of the manifestations of genitourinary syndrome of menopause in periand postmenopausal women.Materials and methods. …”
    Get full text
    Article
  8. 4208

    Adoption of the Creative Process According to the Immersive Method by Sonja Vuk, Tonka Tacol, Janez Vogrinc

    Published 2015-09-01
    “…The immersive method is a new concept of visual education that is better suited to the needs of students in contemporary post-industrial society. …”
    Get full text
    Article
  9. 4209

    Satellite Fingerprinting Methods for GNSS Spoofing Detection by Francisco Gallardo, Antonio Pérez-Yuste, Andriy Konovaltsev

    Published 2024-12-01
    “…While the existing spoofing detection methods have shown some effectiveness, these can be vulnerable to certain attacks, such as secure code estimation and replay (SCER) attacks, among others.This paper analyzes the potential of satellite fingerprinting methods for GNSS spoofing detection and benchmarks their performance using real (in realistic scenarios by using GPS and Galileo signals generated and recorded in the advanced GNSS simulation facility of DLR) GNSS signals and scenarios. …”
    Get full text
    Article
  10. 4210

    Methods and techniques of research motivation and satisfaction of employees by Pešić-Jenačković Dragana

    Published 2021-01-01
    “…Motivation and employee satisfaction are very important precondition for the effectiveness of work and the achievement of set goals for individuals and organizations. …”
    Get full text
    Article
  11. 4211

    COMPARATIVE ANALYSIS OF METHODS OF SURGICAL TREATMENT OF VARICOCELE by Oleg I. Apolokhin, Evgeniy A. Efremov, Sergey Yu. Shekhovtsov, Yuriy V. Kastrikin

    Published 2017-12-01
    “…At present, therefore it is significant to evaluate efficiency and the choice of the optimal method to surgically treat varicocele. According to the results of meta-analysis, it was concluded that the implementation of microsurgical subinguinal varicocelectomy has a number of advantages compared with such methods as Palomo surgery, laparoscopic varicocelectomy, Ivanissevich surgery and selective embolization of sperm veins.Conclusion. …”
    Get full text
    Article
  12. 4212

    Methods of regional analgesia in abdominal surgery in pediatrics by A. V. Barminskiy, A. N. Egorov, M. Yu. Kirov

    Published 2024-02-01
    “…Anatomo-physiological and psychological characteristics of childhood necessitate more thorough approach to this problem in pediatric anesthesiology, since ensuring optimal analgesia provides prevention of somatic perioperative complications and influences further physiological neuropsychiatric development of a child.The objective was to compare regional techniques of perioperative analgesia during abdominal interventions in children and to discuss the conditionsof their application and effectiveness.Materials and Methods. A literature search was conducted using PubMed, Medline, Embase, and Google Scholar databases. …”
    Get full text
    Article
  13. 4213

    Separation Method for Installation Eccentricity Error of Workpiece by Guanyao Qiao, Chunyu Zhao, Huihui Miao, Ye Chen

    Published 2025-06-01
    “…Then, numerical simulations were used to verify the effectiveness and reliability of the proposed method, producing a calculation error of less than 0.07% and high consistency (<i>R</i><sup>2</sup> > 0.97). …”
    Get full text
    Article
  14. 4214

    Method for Assessing Numbness and Discomfort in Cyclists’ Hands by Flavia Marrone, Nicole Sanna, Giacomo Zanoni, Neil J. Mansfield, Marco Tarabini

    Published 2025-07-01
    “…This study demonstrates the effectiveness of the proposed method for assessing hand numbness and discomfort in cyclists.…”
    Get full text
    Article
  15. 4215
  16. 4216

    Systematization of Methods to Counteract Counterfeiting of Premium Brands by I. P. Shirochenskaya, G. S. Timokhina, A. V. Shishkin, I. A. Koryagina, A. N. Beketov

    Published 2022-03-01
    “…As part of the systematization carried out by the authors, the types of consumers of counterfeit products of premium brands are classified based on psychographic and behavioral segmentation, as well as groups of offline, online and combined marketing methods to counter the spread of counterfeit of premium brands.Conclusions and Relevance: the results of the study will allow premium brand stakeholders to form a broader view of the set of methods used to combat counterfeit products and improve the effectiveness of the methods used.…”
    Get full text
    Article
  17. 4217

    Advances in Quantitative Analytical Methods for Solid Drugs by Yue Tao, Yuhan Gao, Baoxi Zhang, Kun Hu, Yifei Xie, Li Zhang, Shiying Yang, Yang Lu

    Published 2024-12-01
    “…The analytical methods that can effectively determine the content of polymorphic drugs are comprehensively mastered to provide a reference for the establishment of quality standards for polymorphic drugs.…”
    Get full text
    Article
  18. 4218

    Deep Learning Method for Bearing Fault Diagnosis by LIU Xiu, MA Shan-tao, XIE Yi-ning, HE Yong-jun

    Published 2022-08-01
    “…In recent years, deep learning technology has shown great potential in bearing fault diagnosis based on vibration signals.However, in the fault diagnosis method based on deep learning, the traditional single network topology feature extraction has weak discrimination and low noise robustness, and the accuracy of fault diagnosis is not high.In addition, most of the current research methods have a low fault recognition rate in a variable load environment.In response to the above problems, this paper proposes an improved neural network end-to-end fault diagnosis model.The model combines convolutional neural networks (CNN) and the attention long short-term memory (ALSTM) based on the attention mechanism, and uses ALSTM to capture long-distance correlations in time series data , Effectively suppress the high frequency noise in the input signal.At the same time, a multi-scale and attention mechanism is introduced to broaden the range of the convolution kernel to capture high and low frequency features, and highlight the key features of the fault. …”
    Get full text
    Article
  19. 4219

    Advances in examination methods for adolescent idiopathic scoliosis by Di Li, Peikang Wang, Man Zhang, Xinkai Zhang, Hailun Yao, Xing Liu

    Published 2025-03-01
    “…It encompasses the history, clinical examinations, and diagnostic imaging methods for AIS. These methods include digital radiological examination, EOS® imaging, nuclear medicine, ultrasound, body surface topography techniques such as the Moiré pattern technique, raster stereophotography, and DIERS formetric 4D as well as computed tomography and magnetic resonance imaging (MRI). …”
    Get full text
    Article
  20. 4220

    IoT intrusion detection method for unbalanced samples by ANTONG P, Wen CHEN, Lifa WU

    Published 2023-02-01
    “…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
    Get full text
    Article