Suggested Topics within your search.
Suggested Topics within your search.
- Methodology 3
- Research 3
- Mass media 2
- Objectivity 2
- Psychological aspects 2
- Psychology 2
- ART / Digital 1
- Agriculture 1
- Computer animation 1
- Consumer Participation 1
- Decision making 1
- Digital cinematography 1
- EDUCATION / Leadership 1
- EDUCATION / Teaching Methods & Materials / Arts & Humanities 1
- EDUCATION / Teaching Methods & Materials / Science & Technology 1
- EDUCATION / Teaching Methods & Materials / Social Science 1
- English 1
- English language 1
- Environmental Health 1
- Environmental Pollution 1
- Environmental health 1
- Epidemiologic Methods 1
- Epidemiology 1
- Geography 1
- Information literacy 1
- Informationskompetenz 1
- Medicine 1
- Public health 1
- School management and organization 1
- Soil Science & Conservation 1
-
4201
Method of three-domain integration for IT support system
Published 2015-12-01“…For the realization of digital transformation,three-domain integration of IT support system is imperative.The present situation and problems of the three-domain of IT support system were analyzed.The goal of overall development of IT system was proposed.The method of integration from the target architecture,basic resource layer,data layer,application layer was discussed.It can effectively support the digital transformation,and create an agile,internet based and open new generation operation support system.…”
Get full text
Article -
4202
Method of three-domain integration for IT support system
Published 2015-12-01“…For the realization of digital transformation,three-domain integration of IT support system is imperative.The present situation and problems of the three-domain of IT support system were analyzed.The goal of overall development of IT system was proposed.The method of integration from the target architecture,basic resource layer,data layer,application layer was discussed.It can effectively support the digital transformation,and create an agile,internet based and open new generation operation support system.…”
Get full text
Article -
4203
MODELING STOCHASTIC ADVERSE EFFECTS OF CBN 2023 REDESIGNED NAIRA NOTES POLICY ON RURAL FARMERS IN NIGERIA
Published 2024-05-01“…The adverse effects of these uncertainties are modeled as Advanced Stochastic Time-Delay Differential Equation (ASTDDE). …”
Get full text
Article -
4204
Shoulder-surfing resistant PIN-entry method
Published 2019-02-01“…Aiming at the problem that the traditional PIN entry method is vulnerable to shoulder-surfing attack,a secure PIN entry method against shoulder-surfing attack was proposed.The method changes the traditional input interface on the mobile device and uses the vibration channel of the device as the auxiliary channel to transmit the hidden information to the user.The user simply selects items to input PIN.The analysis shows that the proposed method can effectively resist shoulder-surfing attack.…”
Get full text
Article -
4205
REDUNDANCY IN TDOA METHOD OF AIRCRAFT POSITION ESTIMATION
Published 2016-12-01“…The factors with maximal effect on the accuracy of the functioning of the ground many-positional system are determined; a comparative analysis of the methods is carried on.…”
Get full text
Article -
4206
-
4207
Self-Diagnostic Method for Resistive Displacement Sensors
Published 2024-04-01“…Experimental results confirm the effectiveness of the presented method.…”
Get full text
Article -
4208
-
4209
RAP detection method based on AP fingerprint
Published 2018-05-01“…The access point (AP) is an integral part of the infrastructure mode in wireless network.While the attacks caused by rogue AP (RAP) divulge a lot of users' privates in a large extent,such as the user's location information,surfing behavior on the Internet and social relations.A RAP detection algorithm based on AP fingerprint was proposed.The validity of AP was judged by the unforgeability and stability of the parameters of beacon frames.And the feasibility and effectiveness of the proposed method were further verified by scheme comparisons and experimental analysis.…”
Get full text
Article -
4210
Does the Method of Castration Affect Calf Performance?
Published 2014-02-01“…UF/IFAS researchers recently tested different methods of castration in calves to determine the effects of each method on calf health and performance. …”
Get full text
Article -
4211
Does the Method of Castration Affect Calf Performance?
Published 2014-02-01“…UF/IFAS researchers recently tested different methods of castration in calves to determine the effects of each method on calf health and performance. …”
Get full text
Article -
4212
GENETIC PROGRAMMING METHOD FOR CONTROL SYSTEMS IDENTIFICATION
Published 2010-09-01“…A problem of structural-parametric control systems identification is considered. The method of genetic programming with the network operator is used. …”
Get full text
Article -
4213
On Fractional Newton-Type Method for Nonlinear Problems
Published 2022-01-01“…Finally, some illustrative examples are considered to confirm the accuracy and effectiveness of both methods.…”
Get full text
Article -
4214
Does the Method of Castration Affect Calf Performance?
Published 2014-02-01“…UF/IFAS researchers recently tested different methods of castration in calves to determine the effects of each method on calf health and performance. …”
Get full text
Article -
4215
METHOD OF TREATMENT FOR ANAL CANCER AFFECTING THE SKIN
Published 2019-06-01“…The rates of pelvic relapses and distant metastases were similar in both groups.Conclusion. The positive effect of the proposed method for ARC treatment is determined by the combination of therapeutic factors including the action of a radiosensitizing agent introduced into tumor tissues.…”
Get full text
Article -
4216
NEW METHOD OF PRODUCTION OF ALUNINUM SILICON ALLOYS
Published 2015-11-01“…Practical ways to implement the new method were proposed on the example of industrial alloys prepared on charge synthetic alloy. …”
Get full text
Article -
4217
Method of unknown protocol classification based on autoencoder
Published 2020-06-01“…Aiming at the problem that a large number of unknown protocols exist in the Internet,which makes it very difficult to manage and maintain the network security,a classification and identification method of unknown protocols was proposed.Combined with the autoencoder technology and the improved K-means clustering technology,the unknown protocol was classified and identified for the network traffic.The autoencoder was used to reduce dimensionality and select features of network traffic,clustering technology was used to classify the dimensionality reduction data unsupervised,and finally unsupervised recognition and classification of network traffic were realized.Experimental results show that the classification effect is better than the traditional K-means,DBSCAN,GMM algorithm,and has higher efficiency.…”
Get full text
Article -
4218
Study on the Identification Method of Gear Spalling Fault
Published 2019-08-01“…Agreement between the results of the dynamic model and the experimental results validates the effectiveness of the generated adaptive wavelet method which is used to analyze the spalling defect. …”
Get full text
Article -
4219
The blow-up method applied to monodromic singularities
Published 2024-01-01“…The blow-up method proves its effectiveness to characterize the integrability of the resonant saddles giving the necessary conditions to have formal integrability and the sufficiency doing the resolution of the associated recurrence differential equation using induction. …”
Get full text
Article -
4220
Method of unknown protocol classification based on autoencoder
Published 2020-06-01“…Aiming at the problem that a large number of unknown protocols exist in the Internet,which makes it very difficult to manage and maintain the network security,a classification and identification method of unknown protocols was proposed.Combined with the autoencoder technology and the improved K-means clustering technology,the unknown protocol was classified and identified for the network traffic.The autoencoder was used to reduce dimensionality and select features of network traffic,clustering technology was used to classify the dimensionality reduction data unsupervised,and finally unsupervised recognition and classification of network traffic were realized.Experimental results show that the classification effect is better than the traditional K-means,DBSCAN,GMM algorithm,and has higher efficiency.…”
Get full text
Article