Suggested Topics within your search.
Suggested Topics within your search.
- Methodology 3
- Research 3
- Mass media 2
- Objectivity 2
- Psychological aspects 2
- Psychology 2
- ART / Digital 1
- Agriculture 1
- Computer animation 1
- Consumer Participation 1
- Decision making 1
- Digital cinematography 1
- EDUCATION / Leadership 1
- EDUCATION / Teaching Methods & Materials / Arts & Humanities 1
- EDUCATION / Teaching Methods & Materials / Science & Technology 1
- EDUCATION / Teaching Methods & Materials / Social Science 1
- English 1
- English language 1
- Environmental Health 1
- Environmental Pollution 1
- Environmental health 1
- Epidemiologic Methods 1
- Epidemiology 1
- Geography 1
- Information literacy 1
- Informationskompetenz 1
- Medicine 1
- Public health 1
- School management and organization 1
- Soil Science & Conservation 1
-
5041
Efficient knowledge updating method for inconsistent decision tables
Published 2024-12-01Get full text
Article -
5042
Image synthesis method based on multiple text description
Published 2024-05-01Get full text
Article -
5043
Trajectory privacy protection method based on location obfuscation
Published 2018-07-01“…In the process of continuous queries,a method of trajectory privacy protection based on location obfuscation was proposed to solve the problem that K-anonymity was difficult to guarantee user privacy in third party architectrue.Firstly,the (G-1) query obfuscation locations through the location prediction was obtained and the dummy location selection mechanism,and then sent them together with the user’s real query location to different anonymizers to form cloaking regions and sent them to the LBS server for queries,and the query results were returned to the user by different anonymizers.In this method,the user’s real query location was confused by the location obfuscation,and the attacker couldn’t deduce the user’s trajectory from a single anonymizer or the LBS server.The method can enhance the privacy of the user’s trajectory and can effectively solve the performance bottleneck in the single anonymizer structure.Security analysis shows the security of the proposed approach,and experiments show this method can reduce the number of interactions between the user and the LBS server and the overhead of the single anonymizer.…”
Get full text
Article -
5044
METHOD OF EVALUATION OF THE EFFICIENCY OF TELECOMMUNICATION NETWORK MANAGEMENT SYSTEM
Published 2018-08-01“…Indicators of the effectiveness of routing methods are considered as three groups of indicators, which are divided into global, local and operational financial. …”
Get full text
Article -
5045
Method for determining amylose content of fresh rice sample
Published 2002-01-01“…Based on the effects of pH and sample concentration on determination of amylose content of rice sample, a new method for the determination was developed. …”
Get full text
Article -
5046
CIPP Evaluation Method for the Scout Extracurricular Program Management
Published 2024-10-01“…This research aims to determine the management of the scouting extracurricular program and evaluate the management. The research method is descriptive qualitative research with data collection methods through interviews, observation, and documentation. …”
Get full text
Article -
5047
A Corner Detection Method for Noisy Checkerboard Images
Published 2025-05-01“…This makes the proposed method particularly advantageous for camera calibration in special scenarios where noise or contamination in checkerboard images is unavoidable.…”
Get full text
Article -
5048
Research on LACP Multi-Active Detection and Processing Method
Published 2013-05-01“…Based on this,a fast multi-active detection method was described,which could detect multi-active quickly,and an efficient multi-active processing method was also proposed,which could effectively guarantee the normal operation of network business.…”
Get full text
Article -
5049
CAPTCHA Recognition Method Based on CNN with Focal Loss
Published 2021-01-01“…By testing the CNKI CAPTCHA, Zhengfang CAPTCHA, and randomly generated CAPTCHA, the experimental results show that the proposed method has a better recognition effect and robustness for three different datasets, and it has certain advantages compared with traditional deep learning methods. …”
Get full text
Article -
5050
A New Method to Improve the Magnetic Gear Torque
Published 2018-01-01“…The two dimensional( 2 D) finite element( FE) method is used to simulate the modified magnetic gear model,and the electromagnetic field and electromagnetic torque of the magnetic gear are calculated. …”
Get full text
Article -
5051
Visual Place Recognition Method Based on Attention Mechanism
Published 2022-04-01“…Testing experiments on two typical place recognition datasets show that the method combined with the attention mechanism can effectively distinguish between the regions related to place recognition and the unrelated regions in the image, and it can improve the accuracy and robustness of recognition in scenes with changes in appearance and viewpoints.…”
Get full text
Article -
5052
Multiparameter Control Strategy and Method for Cutting Arm of Roadheader
Published 2021-01-01“…The simulation analysis in SIMULINK showed that the response time was reduced, proving the robustness of the method. In addition, experimental studies verified the good control effect of the method under different cutting states. …”
Get full text
Article -
5053
A New Method for Joint Sparse DOA Estimation
Published 2024-11-01“…This approach effectively enhances the accuracy of DOA estimation and spatial angle resolution in passive radar systems. …”
Get full text
Article -
5054
A Gradual Adversarial Training Method for Semantic Segmentation
Published 2024-11-01“…In this paper, we propose a gradual adversarial training (GAT) method for remote sensing image segmentation. Our method incorporates a domain-adaptive mechanism that dynamically modulates input data, effectively reducing adversarial perturbations. …”
Get full text
Article -
5055
Fast Scanning Method Based on Multi-point Focusing
Published 2020-02-01“…Experiments show that this method can reduce the number of focus searching effectively and improve the scanning efficiency.…”
Get full text
Article -
5056
MICROENCAPSULATION OF CORIANDER OIL USING COMPLEX COACERVATION METHOD
Published 2014-03-01Get full text
Article -
5057
Generalized PCA Method and Its Application in Uncertainty Reasoning
Published 2025-01-01“…This paper proposes a generalized PCA method and gives strict mathematical proof. The traditional PCA algorithm is a special case of the generalized PCA algorithm proposed in this paper. …”
Get full text
Article -
5058
Resolver Decoding Method Using Hilbert Transform and ATO
Published 2021-01-01“…Finally, the improved ATO is used to obtain the rotor angle by iteratively calculating the demodulating signal. The effectiveness of the proposed method is verified by experiments under various rotor speed conditions and compared with other methods in noise immunity. …”
Get full text
Article -
5059
Project approach as an alternative to the bureaucratic method of social management
Published 2023-03-01“…The relevance of the research is conditioned by the need to develop the institution of social management in the transition of the society to the information stage of its development, which requires new management approaches in the face of exacerbation of globalization risks. Traditional methods of managing a society, primarily bureaucratic ones, do not provide the proper efficiency and effectiveness of the management process in such conditions. …”
Get full text
Article -
5060
Target Threat Assessment Method for UUVs Based on EBM
Published 2025-02-01“…This result verifies the effectiveness of the EBM model in complex battlefield situation analysis and provides a solid theoretical foundation and technical support for UUV’s autonomous decision-making.…”
Get full text
Article