Suggested Topics within your search.
Suggested Topics within your search.
-
481
Quality analysis method of Web browsing based on big data
Published 2020-11-01Get full text
Article -
482
Ultrasonic echo method in detection of breast calcifications. Transient analysis
Published 2015-07-01“…As the result of the performed analysis and experiments the author concluded that microcalcifications are not detectable by the ultrasonic echo method. The radii of calcifications which can be found at the frequency of 5 MHz are equal to 0.6 mm or 1.6 mm depending on the maximum sampling error assumed for a single measurement of the tissue interference background.…”
Get full text
Article -
483
Music Therapy as a supporting method in the treatment of bipolar disorder
Published 2025-04-01“…However, despite their effectiveness and many benefits, these methods may not always be sufficient—especially in treatment-resistant cases. …”
Get full text
Article -
484
Capacitance and Conductance Compensation Methods for Efficient Computing‐In‐Memory Designs
Published 2024-12-01“…Here, the capacitance and conductance compensation methods are reviewed that have been used for CIM designs based on static random‐access memory (SRAM) in combination with capacitors and nonvolatile resistive memory, respectively, and uncover the underlying principles and their application to CIM. …”
Get full text
Article -
485
Application of the calculation method for calculating an economically justified land tax
Published 2022-07-01“…It is concluded that in case of disagreement of an organization or an individual with the amount of tax base, its revision is carried out within the framework of tax relations using the principle of economic feasibility and equality of taxation and calculation method developed by economic science to protect taxpayer’s rights.…”
Get full text
Article -
486
POSSIBILITIES OF USING CRYOSURGICAL METHOD IN TREATMENT OF DEPTH BRAIN TUMORS
Published 2016-02-01“…Cryosurgical method is used in treatment of patients with glial tumors which localized in depth and functionally meaningful brain areas. …”
Get full text
Article -
487
First Electrochemical Method of Nitrothal-Isopropyl Determination in Water Samples
Published 2016-01-01“…The repeatability of the method was determined at a nitrothal-isopropyl concentration level equal to 6.0 × 10−7 mol L−1 and expressed as RSD = 5.5% (n=6). …”
Get full text
Article -
488
Selection of the optimal type of fish pass using the Rembrandt method
Published 2019-03-01“…Results and conclusions Results of calculations using Rembrandt’s multi-criteria decision support method indicated that according to the investor’s priorities the best fish pass was slot pass, for aquatic organisms - bypass channel, and calculations which assumed equal values for second level factors also point to slot pass.…”
Get full text
Article -
489
The cover of randomness: validating implicit methods for the study of sensitive topics
Published 2025-01-01“…We review the methods we developed to study female genital cutting in Sudan and sex-selective abortion in Armenia. …”
Get full text
Article -
490
A Comparison of the efficacies of differential item functioning detection methods
Published 2023-03-01“…Based on Item Response Theory and Classic Test Theory, there are some methods, with different advantages and limitations to identify items that show DIF. …”
Get full text
Article -
491
Theoretical Study of a Design Method for Underexcavation in Building Rectification
Published 2023-01-01“…For buildings with shallow foundations embedded in natural soil sediments, the underexcavation method is often used to correct building inclination. …”
Get full text
Article -
492
Methods of Payment for Primary Health Care in Russia and Foreign Countries
Published 2021-02-01“…Researchers in many countries are looking for effective ways to organize payment for primary health care and conclude that the method of per capita financing of clinics with fund-holding has both positive and negative aspects, which necessitates their obligatory consideration when deciding on the use of this payment method. …”
Get full text
Article -
493
Development of a personalized diet using the structural optimization method
Published 2023-04-01Get full text
Article -
494
LAW ENFORCEMENT AS A METHOD OF PROVISION FOR NATIONAL TAX SECURITY
Published 2017-03-01Get full text
Article -
495
Innovative approach and method of conjugate-contour construction for Roots rotor
Published 2025-05-01“…Therefore, an innovative approach and method are proposed which is suitable not only for common known but also for current unknown conjugate-contour curves.MethodsThe concepts of engagement-distance as length and engagement-angle as direction of conjugate-vector from the pitch-point to the engagement-point was proposed, the intrinsic logic relation of engagement-distance and engagement-angle was summarized, and then the innovative approaches and methods of conjugate-contour construction were proposed.ResultsThe results show that different conjugate-vector functions uniquely determine different conjugate-contour shapes; different conjugate-contour shapes directly determine different output performance; the innovation of output performance is equivalent to the innovation of conjugate-contour; the engagement-angle is equal to the arc cosine function of the first derivative of engagement-distance to the rotation-angle of pitch-circle; the innovation of the conjugate-contour is equivalent to the innovation of the engagement-distance function. …”
Get full text
Article -
496
The Effects of Processing Methods on the Quality of Arabica Kintamani Green Beans
Published 2022-10-01“…The quality of coffee beans depends on the post-harvest and processing method. Dry processing and wet processing are the most popular methods used and each process produces different quality coffee beans. …”
Get full text
Article -
497
Effect of adhesive application method on repair bond strength of composite
Published 2021-08-01“…ObjectivesThis study aimed to evaluate the effect of the application method of universal adhesives on the shear bond strength (SBS) of repaired composites, applied with different thicknesses.Materials and MethodsThe 84 specimens (Filtek Z350 XT) were prepared, stored in distilled water for a week and thermocycled (5,000 cycles, 5°C to 55°C). …”
Get full text
Article -
498
Comparison of bluetongue virus detection and quantitation methods in south India
Published 2014-10-01“…Polymerase chain reaction (PCR)-based real-time detection assays may be an ideal method to detect the BTV genome in animal blood at an early stage of infection. …”
Get full text
Article -
499
Encrypted traffic classification method based on convolutional neural network
Published 2022-12-01“…Aiming at the problems of low accuracy, weak generality, and easy privacy violation of traditional encrypted network traffic classification methods, an encrypted traffic classification method based on convolutional neural network was proposed, which avoided relying on original traffic data and prevented overfitting of specific byte structure of the application.According to the data packet size and arrival time information of network traffic, a method to convert the original traffic into a two-dimensional picture was designed.Each cell in the histogram represented the number of packets with corresponding size that arrive at the corresponding time interval, avoiding reliance on packet payloads and privacy violations.The LeNet-5 convolutional neural network model was optimized to improve the classification accuracy.The inception module was embedded for multi-dimensional feature extraction and feature fusion.And the 1*1 convolution was used to control the feature dimension of the output.Besides, the average pooling layer and the convolutional layer were used to replace the fully connected layer to increase the calculation speed and avoid overfitting.The sliding window method was used in the object detection task, and each network unidirectional flow was divided into equal-sized blocks, ensuring that the blocks in the training set and the blocks in the test set in a single session do not overlap and expanding the dataset samples.The classification experiment results on the ISCX dataset show that for the application traffic classification task, the average accuracy rate reaches more than 95%.The comparative experimental results show that the traditional classification method has a significant decrease in accuracy or even fails when the types of training set and test set are different.However, the accuracy rate of the proposed method still reaches 89.2%, which proves that the method is universally suitable for encrypted traffic and non-encrypted traffic.All experiments are based on imbalanced datasets, and the experimental results may be further improved if balanced processing is performed.…”
Get full text
Article -
500
METHODS AND RESULTS OF STUDYING THE STRUCTURE AND TINCTORIAL PROPERTIES OF CATGUT THREAD
Published 2023-04-01“…The other half of the catgut globules were studied using the method of epoxy plastination with the production of grinds with staining by a 1% solution of methylene blue on a 1% borax and without any staining. …”
Get full text
Article