Suggested Topics within your search.
Suggested Topics within your search.
- Agriculture 1
- Biotechnology 1
- Chemistry Techniques, Analytical 1
- Children 1
- Economic Policy 1
- Economic aspects 1
- Economic policy 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Environmental Economics 1
- Environmental economics 1
- Industrial Organization 1
- Industrial organization 1
- Language 1
- Language disorders in children 1
- Linguistics 1
- MEDICAL / Audiology & Speech Pathology 1
- MEDICAL / Biotechnology 1
- Molecular Biology 1
- Prosodic analysis (Linguistics) 1
- Regression analysis 1
- Tissue Engineering 1
- methods 1
-
18501
Web 3.0 and the Metaverse: Transformative Impacts on Education
Published 2025-03-01“…In this phenomenological study, data obtained from participants were analyzed using descriptive analysis techniques. …”
Get full text
Article -
18502
Modeling ChatGPT Adoption Among Undergraduates: An Integrated UTAUT2 and Digital Competence Framework
Published 2025-06-01“…Data were collected from 544 undergraduate students using adapted UTAUT2 scales and digital competence measures aligned with DigComp. …”
Get full text
Article -
18503
Survey of Quantum Generative Adversarial Networks (QGAN) to Generate Images
Published 2024-12-01“…Quantum Generative Adversarial Networks (QGANs) represent a useful development in quantum machine learning, using the particular properties of quantum mechanics to solve the challenges of data analysis and modeling. …”
Get full text
Article -
18504
Teachers' Performance in Integrating Technology in The Digital Era Through Professional Competence and Self-Efficacy
Published 2024-06-01“…Descriptive statistical analysis and structural equation modeling (SEM) were used as data analysis methodologies. …”
Get full text
Article -
18505
Breast tumor segmentation in ultrasound using distance-adapted fuzzy connectedness, convolutional neural network, and active contour
Published 2024-10-01“…We find the idea of incorporating fuzzy connectedness into the input data preparation for deep-learning image analysis our main contribution to the study. …”
Get full text
Article -
18506
The Effectiveness of Supervision Programs on Improving Teaching Skills and Teacher Performance
Published 2025-03-01“…Using a quantitative approach and experimental design, the study involved 30 teachers as respondents, where 60% had less than 5 years of teaching experience, and 40% had more than 5 years of experience. Data were collected through standardized observation instruments and analyzed using t-test and regression analysis. …”
Get full text
Article -
18507
Investigating Indonesian university students’ attitudes toward ELF-informed materials in business English contexts
Published 2025-01-01“…The descriptive statistics analysis of the quantitative data demonstrated that the participants perceived that the materials incorporated Indonesian English and other non-native varieties of English, 88.4% and 55.2%, respectively. …”
Get full text
Article -
18508
-
18509
Tren Penelitian Penerjemahan Teks Bahasa Arab Berbasis Artificial Intelligence: Kajian Bibliometrik
Published 2025-07-01“…This study examines trends in Arabic text translation research based on Artificial Intelligence (AI) through a bibliometric approach using visual mapping analysis with the VOSviewer software. Data were obtained from the Scopus database using the Publish or Perish application, employing the keywords “arabic AND translation AND artificial AND intelligence” for the period from 2014 to 2024. …”
Get full text
Article -
18510
Multistakeholder Perceptions of Priorities in Primary Care as a Source of Local Innovation: Qualitative Descriptive Study
Published 2025-07-01“…Initial categories for the content analysis were drawn from the Clinical Learning Environment Review (CLER 2.0) framework. …”
Get full text
Article -
18511
Supporting Employees’ wellbeing: Exploring the Perspectives of Filipino Wellbeing Coaches and Implications for Workplace Interventions
Published 2025-06-01“…Using deductive thematic analysis, Filipino wellbeing coaches present their experiences, and the study used four predetermined key themes following the (ICF) Core Competencies Model which includes foundation, co-creating the relationship, communicating effectively, and cultivating learning and growth. …”
Get full text
Article -
18512
Professional Practices of Methodical Work in Higher Education
Published 2022-11-01“…The method used for collecting empirical data presented in the article is a content analysis of the co-messages sent by the participants of the online intensive “Personalized Learning Technologies” on the Zoom-conference, which was held on August 23–27, 2021. …”
Get full text
Article -
18513
Impact of blended teaching on knowledge, skills, and work-related stress among novice operating room nurses
Published 2025-06-01“…The assessment tools employed include the OR Knowledge Inventory, the Taiwan Nurse Stress Checklist, and the DOPS Checklist. Data analysis is performed using SPSS, with both descriptive and inferential statistics applied. …”
Get full text
Article -
18514
Active Landslide Mapping Along the Karakoram Highway Alternate Route in North Pakistan; Implications for the Expansion of China−Pakistan Economic Corridor
Published 2025-04-01“…We detected 1037 active landslides in the study region using phase gradient stacking and a deep learning network. Based on the detection, we applied time series InSAR analysis to reveal the velocity and deformation series for some large-scale landslides, revealing high displacement rates with line-of-sight velocities reaching up to −81 mm/yr. …”
Get full text
Article -
18515
Updimensioning strategy derived from synthetic equiaxed grain structures for approximating 3D grain size distributions from 2D visualizations with 1D parameters
Published 2024-10-01“…The procedure requires larger sample sizes to lower variance and a deeper analysis which could become more practical with machine learning (ML) models for grain boundary segmentation, which synthetic grain structures can help train. …”
Get full text
Article -
18516
Prospective Teachers’ Perceptions of Using Information and Communication Technologies in Biology Education: Insights from Some Colleges of Teacher Education in Ethiopia
Published 2025-03-01“…Questionnaires and semi-structured interviews were used to collect data. The study subjects, 142 PTs, were selected using purposeful and stratified random sampling techniques. …”
Get full text
Article -
18517
Computationally secure steganography based on speech synthesis
Published 2022-06-01“…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
Get full text
Article -
18518
Exploring Transformation Through Travel by Means of the Movie The Way
Published 2023-06-01“…To analyze the document that constitutes the data source of the research study, a narrative analysis, and a qualitative research design, was followed. …”
Get full text
Article -
18519
Relationship between Self-Compassion and Uneasiness about the Professional Future among Dental Hygiene Students: A Cross-Sectional Study
Published 2023-01-01“…Results. Data were obtained from 464 participants (response rate: 96.3%). …”
Get full text
Article -
18520
La inteligencia artificial, los retos y oportunidades en la gestión del conocimiento
Published 2023-12-01“…Recent advances in AI offer opportunities to transform KM by automating tasks such as data analysis and categorization, although they also pose challenges. …”
Get full text
Article