Search alternatives:
collect » collected (Expand Search)
Showing 481 - 500 results of 48,913 for search 'data collect (method OR methods)', query time: 0.43s Refine Results
  1. 481

    Construction and validation of a data collection instrument for nursing care during prehospital mobile assistance to trauma victims by Regilene Molina Zacareli Cyrillo, Maria Célia Barcellos Dalri, Jane Aparecida Cristina

    Published 2005-04-01
    “…The lack of references to the nursing process to trauma victims during Pre-hospital Mobile Assistance motivated us to construct a data collection instrument as an initial step in the nursing process. …”
    Get full text
    Article
  2. 482

    Pavement condition detection using acceleration data collected by smartphones based on 1D convolutional neural network by Yudong Han, Zhaobo Li, Jiaqi Li

    Published 2024-12-01
    “…In this study, a public participation solution is proposed, and a one-dimensional convolutional neural network (1D-CNN) is introduced to directly process acceleration signals, addressing the limitations of traditional machine-learning classification methods. In this study, a smartphone and bicycle were used as the experimental tools, and 422 samples of acceleration data across the X-, Y-, and Z-axes were collected, including four types of pavement conditions: bumpy pavement, speed bumps, smooth pavement, and potholes. …”
    Get full text
    Article
  3. 483
  4. 484

    Learner stimulus intent: a framework for eye tracking data collection and feature extraction in computer programming education by K. R. Chandrika, J. Amudha

    Published 2025-04-01
    “…This research presents a novel framework called the Learner Stimulus Intent that offers useful insights into learners’ cognitive processes in computer programming education and has significant implications for assessment in computer science education. The comprehensive data collection, extraction of eye gaze and semantic features, and effective visualization techniques can be utilized to evaluate students’ understanding and engagement, offering a more nuanced and detailed picture of their learning progress than traditional assessment methods. …”
    Get full text
    Article
  5. 485

    Exploring the similarities and differences of variables collected by burn registers globally: protocol for a data dictionary review study by Amber Young, Ken Dunn, Michael Peck, Yvonne Singer, Emily Bebbington, Joanna Miles

    Published 2023-02-01
    “…The aim of this project is to compare the variables collected in countrywide and intercountry burn registers internationally to understand their similarities and differences.Methods and analysis Burn register custodians will be invited to participate in the study and to share their register data dictionaries. …”
    Get full text
    Article
  6. 486

    UAV-Enabled Diverse Data Collection via Integrated Sensing and Communication Functions Based on Deep Reinforcement Learning by Yaxi Liu, Xulong Li, Boxin He, Meng Gu, Wei Huangfu

    Published 2024-11-01
    “…Unmanned aerial vehicles (UAVs) and drones are considered to represent a flexible mobile aerial platform to collect data in various applications. However, the existing data collection methods mainly consider uplink communication. …”
    Get full text
    Article
  7. 487

    Collecting Data on the Social Determinants of Health to Advance Health Equity in Cancer Care in Canada: Patient and Community Perspectives by Jacqueline L. Bender, Eryn Tong, Ekaterina An, Zhihui Amy Liu, Gilla K. Shapiro, Jonathan Avery, Alanna Chu, Christian Schulz-Quach, Sarah Hales, Alies Maybee, Ambreen Sayani, Andrew Pinto, Aisha Lofters

    Published 2025-07-01
    “…However, SDOH are inconsistently collected in many regions of the world. This two-phase multiple methods study examined patient and community perspectives regarding SDOH data collection in Canada. …”
    Get full text
    Article
  8. 488

    Rotterdam Oncology Documentation (RONCDOC) – a high-quality data warehouse and tissue collection for head and neck cancer by Arta Hoesseini, Emilie A. C. Dronkers, Eveline Dieleman, Maria J. De Herdt, Marjan. H. Wieringa, Marie-Louise F. van Velthuysen, Marinella P. J. Offerman, Aniel Sewnaik, Dominiek Monserez, Stijn Keereweer, Jose A. U. Hardillo, Robert Jan Baatenburg de Jong

    Published 2025-04-01
    “…Methods Data collected in the Netherlands Cancer Registry (NCR) of patients with HNC were obtained from the Netherlands comprehensive cancer organization (IKNL) and merged with corresponding data from the electronic patient file (EPF). …”
    Get full text
    Article
  9. 489
  10. 490

    A comparison of SWATH-MS methods for measurement of residual host cell proteins in adeno-associated virus preparations by Thomas M. Leibiger, Lie Min, Kelvin H. Lee

    Published 2025-05-01
    “…Sciex ZenoTOF 7600) were assessed. Method attributes including sample requirement and processing time, and method outputs including protein and precursor identifications, host cell protein quantitation comparisons across methods, and quantitation coefficients of variance (CV) were considered to help establish a SWATH-MS workflow well-suited for rAAV HCP analytics.ResultsA 78% increase in HCP identifications, 80% reduction in sample requirement, and 70% reduction in instrument runtime was achieved with an in silico spectral library, data processing in DIA-NN, and data collection with the Sciex ZenoTOF 7600 instrument (DIA-NN-7600 method) compared to a previously established method using a DDA-derived spectral library, data processing in Skyline, and data collection with the Sciex TripleTOF 6600 instrument (Skyline-DDA-6600 method). …”
    Get full text
    Article
  11. 491
  12. 492

    Counseling and Individual Factors on Postpartum Mother to Use Contraceptive Method by Theresia Mindarsih, Ina Debora Ratu Ludji, Marthen L Pelokilla

    Published 2018-11-01
    “…This was a quasi-experimental study. 64 respondents were selected through purposive sampling and divided into 2 groups, 32 people were given counseling and 32 were not. Data was collected using questionnaires. Data analysis was bivariate and multivariate. …”
    Get full text
    Article
  13. 493

    Introduction to the 'Iconclass' Method in Documenting Artistic Works by Maryam Dashtizadeh, Atefeh Amiri

    Published 2024-11-01
    “…With the hierarchical structure of the mentioned method, the documentarian can easily filter and separate the necessary data, as the subsets of each class are classified as alphanumeric data. …”
    Get full text
    Article
  14. 494

    Can we really use design-free hydroacoustic data from fishing vessels for assessing abundance and distribution of marine species? A proof of concept analysis on Antarctic krill by J.A. Canseco, E.J. Niklitschek, G. Skaret

    Published 2025-03-01
    “…Our results show that despite using state-of-the-art methods for processing and analyzing design-free, acoustic data collected by the fishing fleet, it still yielded unreliable RAI estimates. …”
    Get full text
    Article
  15. 495

    Detection of false data injection in electric energy metering platforms using gradient lifting decision trees and MLP neural networks by Yakui Zhu, Yangrui Zhang, Chao Zhang, Bingyu Zhang, Hongying Wang, Shaokang Feng

    Published 2024-12-01
    “…Abstract This study investigates a false data injection detection method in an automatic data acquisition platform for electric energy measurement with the aim of ensuring the stability and security of the power system. …”
    Get full text
    Article
  16. 496

    Personalized privacy protection method for group recommendation by Haiyan WANG, Jinxiang LU

    Published 2019-09-01
    “…To address the problem that most of the existing privacy protection methods can not satisfy the user’s personalized requirements very well in group recommendation,a user personalized privacy protection framework based on trusted client for group recommendation (UPPPF-TC-GR) followed with a group sensitive preference protection method (GSPPM) was proposed.In GSPPM,user’s historical data and privacy preference demands were collected in the trusted client,and similar users were selected in the group based on sensitive topic similarity between users.Privacy protection for users who had privacy preferences in the group was realized by randomization of cooperative disturbance to top k similar users.Simulation experiments show that the proposed GSPPM can not only satisfy privacy protection requirements for each user but also achieve better performance.…”
    Get full text
    Article
  17. 497

    Experience with the mother kangaroo method: mother’s perception by Antonia do Carmo Soares Campos, Mariana Pordeus Lopes Carvalho, Karla Maria Carneiro Rolim, Ana Júlia Couto de Alencar

    Published 2008-06-01
    “…It was accomplished with 13 mothers within the months of January and February/2006 in theAssis Chateaubriand Maternity School Hospitalin Fortaleza – CE. The data were collected through semi-structured interview. …”
    Get full text
    Article
  18. 498

    A Local Design Method for Pile Foundations by Nunzia Letizia, Chiara Iodice, Alessandro Mandolini

    Published 2018-01-01
    “…To prove the LPDM reliability, experimental data collected during years in the Neapolitan area (Italy) have been used to obtain the abovementioned coefficients. …”
    Get full text
    Article
  19. 499

    The Model of Disengagement of Talent with Meta-synthesis Method by Ali Asghar Mobasheri, Ali Nasr Isfahani, Hadi Teimouri

    Published 2024-11-01
    “…This selection process ensured that only the most relevant sources were included as samples. Data collection involved a thorough examination of the findings from these selected sources. …”
    Get full text
    Article
  20. 500

    Graph-based method for constructing consensus trees by Torquet Elio, Jansson Jesper, Tahiri Nadia

    Published 2025-01-01
    “…Our research focuses on creating a consensus tree from a collection of phylogenetic trees, each detailed with branch-length data. …”
    Get full text
    Article