Suggested Topics within your search.
Suggested Topics within your search.
- Methodology 3
- Research 3
- Mass media 2
- Objectivity 2
- Psychological aspects 2
- Psychology 2
- ART / Digital 1
- Agriculture 1
- Computer animation 1
- Consumer Participation 1
- Decision making 1
- Digital cinematography 1
- EDUCATION / Leadership 1
- EDUCATION / Teaching Methods & Materials / Arts & Humanities 1
- EDUCATION / Teaching Methods & Materials / Science & Technology 1
- EDUCATION / Teaching Methods & Materials / Social Science 1
- English 1
- English language 1
- Environmental Health 1
- Environmental Pollution 1
- Environmental health 1
- Epidemiologic Methods 1
- Epidemiology 1
- Geography 1
- Information literacy 1
- Informationskompetenz 1
- Medicine 1
- Public health 1
- School management and organization 1
- Soil Science & Conservation 1
-
4201
Review of Methods and Models for Forecasting Electricity Consumption
Published 2025-07-01“…Particular attention was paid to the effectiveness of these methods in the context of variable input data, such as weather conditions, seasonal fluctuations, and changes in energy consumption patterns. …”
Get full text
Article -
4202
Music Therapy Methods Based on SVM and MLP
Published 2022-01-01“…Henceforth, this study focuses on the analysis of the music’s effect on fetal heart rate (FHR) curve. To this end, we treated people with music therapy and carried out the experiment. …”
Get full text
Article -
4203
Merging Qualitative Design Methods With Design Science
Published 2025-04-01“…Qualitative design has mostly been used as an approach to finding and analysing the cause and effect of a phenomena. However, with the increasing importance of digital technology in the current digital age, research that encompasses qualitative design and developmental methods such as DSR is becoming more important. …”
Get full text
Article -
4204
Optical Cryptanalysis Method Using Wavefront Shaping
Published 2017-01-01“…In this paper, a practical optical cryptanalysis method using wavefront shaping is proposed. Considering that the confusion and diffusion of information in the optical cryptosystem are actually caused by scattering effect of random phase mask(s), the proposed method employs a point source function and the feedback-based optimization algorithm, which can obtain an equivalent key of the optical cryptosystem. …”
Get full text
Article -
4205
Efficient Data Collection Method in Sensor Networks
Published 2020-01-01“…The algorithm is improved on the basis of the random node selection algorithm. This method can effectively avoid the failure of random path node selection and improve the node selection of random path in wireless sensor networks. …”
Get full text
Article -
4206
-
4207
Vulvovaginal atrophy: current methods of diagnosis and treatment
Published 2024-04-01“…Aim. To review modern methods of diagnosis and treatment of vulvovaginal atrophy (VVA), which is one of the manifestations of genitourinary syndrome of menopause in periand postmenopausal women.Materials and methods. …”
Get full text
Article -
4208
Adoption of the Creative Process According to the Immersive Method
Published 2015-09-01“…The immersive method is a new concept of visual education that is better suited to the needs of students in contemporary post-industrial society. …”
Get full text
Article -
4209
Satellite Fingerprinting Methods for GNSS Spoofing Detection
Published 2024-12-01“…While the existing spoofing detection methods have shown some effectiveness, these can be vulnerable to certain attacks, such as secure code estimation and replay (SCER) attacks, among others.This paper analyzes the potential of satellite fingerprinting methods for GNSS spoofing detection and benchmarks their performance using real (in realistic scenarios by using GPS and Galileo signals generated and recorded in the advanced GNSS simulation facility of DLR) GNSS signals and scenarios. …”
Get full text
Article -
4210
Methods and techniques of research motivation and satisfaction of employees
Published 2021-01-01“…Motivation and employee satisfaction are very important precondition for the effectiveness of work and the achievement of set goals for individuals and organizations. …”
Get full text
Article -
4211
COMPARATIVE ANALYSIS OF METHODS OF SURGICAL TREATMENT OF VARICOCELE
Published 2017-12-01“…At present, therefore it is significant to evaluate efficiency and the choice of the optimal method to surgically treat varicocele. According to the results of meta-analysis, it was concluded that the implementation of microsurgical subinguinal varicocelectomy has a number of advantages compared with such methods as Palomo surgery, laparoscopic varicocelectomy, Ivanissevich surgery and selective embolization of sperm veins.Conclusion. …”
Get full text
Article -
4212
Methods of regional analgesia in abdominal surgery in pediatrics
Published 2024-02-01“…Anatomo-physiological and psychological characteristics of childhood necessitate more thorough approach to this problem in pediatric anesthesiology, since ensuring optimal analgesia provides prevention of somatic perioperative complications and influences further physiological neuropsychiatric development of a child.The objective was to compare regional techniques of perioperative analgesia during abdominal interventions in children and to discuss the conditionsof their application and effectiveness.Materials and Methods. A literature search was conducted using PubMed, Medline, Embase, and Google Scholar databases. …”
Get full text
Article -
4213
Separation Method for Installation Eccentricity Error of Workpiece
Published 2025-06-01“…Then, numerical simulations were used to verify the effectiveness and reliability of the proposed method, producing a calculation error of less than 0.07% and high consistency (<i>R</i><sup>2</sup> > 0.97). …”
Get full text
Article -
4214
Method for Assessing Numbness and Discomfort in Cyclists’ Hands
Published 2025-07-01“…This study demonstrates the effectiveness of the proposed method for assessing hand numbness and discomfort in cyclists.…”
Get full text
Article -
4215
Chromium nanostructured coatings formed by the PVD method
Published 2024-01-01Get full text
Article -
4216
Systematization of Methods to Counteract Counterfeiting of Premium Brands
Published 2022-03-01“…As part of the systematization carried out by the authors, the types of consumers of counterfeit products of premium brands are classified based on psychographic and behavioral segmentation, as well as groups of offline, online and combined marketing methods to counter the spread of counterfeit of premium brands.Conclusions and Relevance: the results of the study will allow premium brand stakeholders to form a broader view of the set of methods used to combat counterfeit products and improve the effectiveness of the methods used.…”
Get full text
Article -
4217
Advances in Quantitative Analytical Methods for Solid Drugs
Published 2024-12-01“…The analytical methods that can effectively determine the content of polymorphic drugs are comprehensively mastered to provide a reference for the establishment of quality standards for polymorphic drugs.…”
Get full text
Article -
4218
Deep Learning Method for Bearing Fault Diagnosis
Published 2022-08-01“…In recent years, deep learning technology has shown great potential in bearing fault diagnosis based on vibration signals.However, in the fault diagnosis method based on deep learning, the traditional single network topology feature extraction has weak discrimination and low noise robustness, and the accuracy of fault diagnosis is not high.In addition, most of the current research methods have a low fault recognition rate in a variable load environment.In response to the above problems, this paper proposes an improved neural network end-to-end fault diagnosis model.The model combines convolutional neural networks (CNN) and the attention long short-term memory (ALSTM) based on the attention mechanism, and uses ALSTM to capture long-distance correlations in time series data , Effectively suppress the high frequency noise in the input signal.At the same time, a multi-scale and attention mechanism is introduced to broaden the range of the convolution kernel to capture high and low frequency features, and highlight the key features of the fault. …”
Get full text
Article -
4219
Advances in examination methods for adolescent idiopathic scoliosis
Published 2025-03-01“…It encompasses the history, clinical examinations, and diagnostic imaging methods for AIS. These methods include digital radiological examination, EOS® imaging, nuclear medicine, ultrasound, body surface topography techniques such as the Moiré pattern technique, raster stereophotography, and DIERS formetric 4D as well as computed tomography and magnetic resonance imaging (MRI). …”
Get full text
Article -
4220
IoT intrusion detection method for unbalanced samples
Published 2023-02-01“…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
Get full text
Article