Suggested Topics within your search.
Suggested Topics within your search.
- Research 2
- Agriculture 1
- Decision making 1
- EDUCATION / Leadership 1
- Evaluation research (Social action programs) 1
- Evidence-based social work 1
- Executive coaching 1
- Management 1
- Nursing 1
- Nursing Research 1
- Organizational change 1
- School management and organization 1
- Social service 1
- Soil Science & Conservation 1
- Soil conservation 1
- Soil science 1
- Sustainable Development 1
- Sustainable development 1
- Teams in the workplace 1
- methods 1
-
681
APPLICATION OF THE BACKPROPAGATION METHOD TO PREDICT RAINFALL IN NORTH SUMATRA PROVINCE
Published 2023-04-01“…The rainfall time series data used in this study were collected from six stations in North Sumatra Province over the last ten years, including the Sibolga Meteorological Station, Aek Godang Meteorological Station, and Silangit Meteorological Station. …”
Get full text
Article -
682
COOPERATIVE LEARNING AS A METHOD FOR INCRAESING GROUP COHESION IN THE CLASSROOM
Published 2019-09-01“…The article presents the collected and analyzed data from a two-year longitudinal research of the connection between cooperative learning and group cohesion in one classroom.…”
Get full text
Article -
683
What if listening rooms could become a method of assessment?
Published 2025-06-01“… This brief communication proposes that Heron’s Listening Rooms data collection method could be adapted for use as an assessment method in higher education (HE), potentially replacing some forms of written assessment. …”
Get full text
Article -
684
Common Medical Errors in Gastroenterology: A Mixed Method Study
Published 2024-01-01“…The collected data was analyzed using content analysis method and error prevention strategies were identified.Results:The mean (standard deviation) score of patients in the departments were 66.28 (98.7), and the mean number of nurses was 4.83 (26.3). …”
Get full text
Article -
685
Assessing the influence of playing method on the outcome of basketball shooting ability
Published 2023-06-01“…The devices in the study collected data directly from tests and measurements performed on the basketball court. …”
Get full text
Article -
686
Simulating method for TCP aggregated traffic of large scale network
Published 2006-01-01Get full text
Article -
687
Role-Playing Method In Developing Islamic Student’s Entrepreneurship Mentality
Published 2021-06-01“…Interviews, observation, and documentation are used as data collection technique. This study indicates that thematic learning at MI Muhammadiyah 2 Kudus has been running according to the stages in thematic learning, namely the planning stage, the implementation stage, and the evaluation stage. …”
Get full text
Article -
688
Simulating method for TCP aggregated traffic of large scale network
Published 2006-01-01Get full text
Article -
689
An Assisted Numerical Simulation Diagnosis Method for Atherosclerosis Based on Hemodynamics
Published 2025-04-01“…According to the research reported here in, early clinical detection and follow-up of atherosclerosis can be performed by collecting data on wall shear stress and blood flow pressure difference.…”
Get full text
Article -
690
Innovative method of active thermoacoustic testing for aircraft composite structures
Published 2025-07-01“…The proposed technique comprises nine key stages, from control system preparation and data collection to defect analysis, damage mitigation, and residual lifespan prediction. …”
Get full text
Article -
691
Evaluating Diversity Metrics: A Critique of the Equity Index Method
Published 2015-11-01“…Research Design: Not Applicable. Data Collection and Analysis: Not Applicable. Findings: Despite the potential for problems with interpretations based on small samples and subgroups and some concerns about semantics involving the term “equity”, we believe the EIM possesses a number of strengths that many evaluators will find useful. …”
Get full text
Article -
692
A multipath error cancellation method based on antenna jitter
Published 2025-02-01“…Moreover, extensive satellite data collection and verification were performed in Changsha, China, from December 2023 to August 2024. …”
Get full text
Article -
693
A novel method for precise endoscopic sampling of duodenal microbiota
Published 2025-07-01“…However, sampling duodenal microbiota is technically challenging. Mucosal biopsies collected via endoscopy are the most common approach, but this method risks contamination of the working channel with gastrointestinal contents or extraneous microorganisms.MethodsThis study designed a novel accessory, an endoscopic channel plug, to improve the sampling process by ensuring a clean and sterile working channel, thereby providing more accurate microbiota results.Results and conclusionMicrobiome analysis of samples collected from the oral cavity, traditional duodenal sampling, and the modified method with the channel plug revealed that samples obtained with the plug exhibited higher PCR product concentrations and a greater number of operational taxonomic units (335). …”
Get full text
Article -
694
Multilane Spatiotemporal Trajectory Optimization Method (MSTTOM) for Connected Vehicles
Published 2020-01-01“…A typical scenario of intersection with a one-way 4-lane section is measured, and the data within 24 hours are collected for tests. The results demonstrate that the proposed method can optimize the traffic flow by enhancing vehicle fuel efficiency by 32% and reducing pollutants emissions by 17% compared with the advanced glidepath prototype application (GPPA) scheme.…”
Get full text
Article -
695
Rubrics: A Method for Surfacing Values and Improving the Credibility of Evaluation
Published 2013-08-01Get full text
Article -
696
RPKI Defense Capability Simulation Method Based on Container Virtualization
Published 2024-09-01“…Finally, we propose a data collection and performance evaluation technique to evaluate BGP networks deploying RPKI under different attack scenarios and to explore the effectiveness of RPKI defense mechanisms at various deployment rates. …”
Get full text
Article -
697
Research on Modeling Method of Gas Turbine Inlet Pressure Loss
Published 2021-08-01Get full text
Article -
698
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
699
-
700
An Iterative Adaptive Polarization Calibration Method Independent of Corner Reflectors
Published 2025-01-01“…Polarimetric calibration (PolCal) is essential for the quantitative processing of polarimetric synthetic aperture radar data. Traditional distributed target methods typically require at least one corner reflector (CR) to determine the copolarization (co-pol) channel imbalance. …”
Get full text
Article