Search alternatives:
collect » collected (Expand Search)
Showing 681 - 700 results of 48,913 for search 'data collect (method OR methods)', query time: 0.46s Refine Results
  1. 681

    APPLICATION OF THE BACKPROPAGATION METHOD TO PREDICT RAINFALL IN NORTH SUMATRA PROVINCE by Rinjani Cyra Nabila, Arnita Arnita, Amanda Fitria, Nita Suryani

    Published 2023-04-01
    “…The rainfall time series data used in this study were collected from six stations in North Sumatra Province over the last ten years, including the Sibolga Meteorological Station, Aek Godang Meteorological Station, and Silangit Meteorological Station. …”
    Get full text
    Article
  2. 682

    COOPERATIVE LEARNING AS A METHOD FOR INCRAESING GROUP COHESION IN THE CLASSROOM by Nikolina Tareva, Doncho Donev

    Published 2019-09-01
    “…The article presents the collected and analyzed data from a two-year longitudinal research of the connection between cooperative learning and group cohesion in one classroom.…”
    Get full text
    Article
  3. 683

    What if listening rooms could become a method of assessment? by Laura Dyer

    Published 2025-06-01
    “… This brief communication proposes that Heron’s Listening Rooms data collection method could be adapted for use as an assessment method in higher education (HE), potentially replacing some forms of written assessment. …”
    Get full text
    Article
  4. 684

    Common Medical Errors in Gastroenterology: A Mixed Method Study by Amir Sadeghi, Abbas Masjedi Arani, Foroozan Atashzadeh-Shoorideh, Marzieh Pazokian, Arezoo Qadimi, Hosna Karami khaman, Raziyeh Ghafouri

    Published 2024-01-01
    “…The collected data was analyzed using content analysis method and error prevention strategies were identified.Results:The mean (standard deviation) score of patients in the departments were 66.28 (98.7), and the mean number of nurses was 4.83 (26.3). …”
    Get full text
    Article
  5. 685

    Assessing the influence of playing method on the outcome of basketball shooting ability by Zidan Dhia, Didi Suryadi, Y Touvan Juni Samodra, Mashud, Asriah Nurdini Mardiyyaningsih, Eko Saputra, Zsolt Németh, Asry Syam, Rezza Dewintha, Fazarudin

    Published 2023-06-01
    “…The devices in the study collected data directly from tests and measurements performed on the basketball court. …”
    Get full text
    Article
  6. 686
  7. 687

    Role-Playing Method In Developing Islamic Student’s Entrepreneurship Mentality by Nur Rizqi Febriandika, Sisna Gaida

    Published 2021-06-01
    “…Interviews, observation, and documentation are used as data collection technique. This study indicates that thematic learning at MI Muhammadiyah 2 Kudus has been running according to the stages in thematic learning, namely the planning stage, the implementation stage, and the evaluation stage. …”
    Get full text
    Article
  8. 688
  9. 689

    An Assisted Numerical Simulation Diagnosis Method for Atherosclerosis Based on Hemodynamics by Lei Guo, Ye Lu, Shusheng Zhang

    Published 2025-04-01
    “…According to the research reported here in, early clinical detection and follow-up of atherosclerosis can be performed by collecting data on wall shear stress and blood flow pressure difference.…”
    Get full text
    Article
  10. 690

    Innovative method of active thermoacoustic testing for aircraft composite structures by I. A. Davydov

    Published 2025-07-01
    “…The proposed technique comprises nine key stages, from control system preparation and data collection to defect analysis, damage mitigation, and residual lifespan prediction. …”
    Get full text
    Article
  11. 691

    Evaluating Diversity Metrics: A Critique of the Equity Index Method by Kenneth D. Royal, Keven Flammer

    Published 2015-11-01
    “…Research Design: Not Applicable. Data Collection and Analysis: Not Applicable. Findings: Despite the potential for problems with interpretations based on small samples and subgroups and some concerns about semantics involving the term “equity”, we believe the EIM possesses a number of strengths that many evaluators will find useful. …”
    Get full text
    Article
  12. 692

    A multipath error cancellation method based on antenna jitter by Jiyang Liu, Feixue Wang, Xiaomei Tang, Sixin Wang, Muzi Yuan

    Published 2025-02-01
    “…Moreover, extensive satellite data collection and verification were performed in Changsha, China, from December 2023 to August 2024. …”
    Get full text
    Article
  13. 693

    A novel method for precise endoscopic sampling of duodenal microbiota by Taotao Wei, Gaozhong Dai, Tianye Liu, Yaozhou Tian

    Published 2025-07-01
    “…However, sampling duodenal microbiota is technically challenging. Mucosal biopsies collected via endoscopy are the most common approach, but this method risks contamination of the working channel with gastrointestinal contents or extraneous microorganisms.MethodsThis study designed a novel accessory, an endoscopic channel plug, to improve the sampling process by ensuring a clean and sterile working channel, thereby providing more accurate microbiota results.Results and conclusionMicrobiome analysis of samples collected from the oral cavity, traditional duodenal sampling, and the modified method with the channel plug revealed that samples obtained with the plug exhibited higher PCR product concentrations and a greater number of operational taxonomic units (335). …”
    Get full text
    Article
  14. 694

    Multilane Spatiotemporal Trajectory Optimization Method (MSTTOM) for Connected Vehicles by Pangwei Wang, Yunfeng Wang, Hui Deng, Mingfang Zhang, Juan Zhang

    Published 2020-01-01
    “…A typical scenario of intersection with a one-way 4-lane section is measured, and the data within 24 hours are collected for tests. The results demonstrate that the proposed method can optimize the traffic flow by enhancing vehicle fuel efficiency by 32% and reducing pollutants emissions by 17% compared with the advanced glidepath prototype application (GPPA) scheme.…”
    Get full text
    Article
  15. 695
  16. 696

    RPKI Defense Capability Simulation Method Based on Container Virtualization by Bo Yu, Xingyuan Liu, Xiaofeng Wang

    Published 2024-09-01
    “…Finally, we propose a data collection and performance evaluation technique to evaluate BGP networks deploying RPKI under different attack scenarios and to explore the effectiveness of RPKI defense mechanisms at various deployment rates. …”
    Get full text
    Article
  17. 697
  18. 698

    Hard-coded backdoor detection method based on semantic conflict by Anxiang HU, Da XIAO, Shichen GUO, Shengli LIU

    Published 2023-02-01
    “…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
    Get full text
    Article
  19. 699
  20. 700

    An Iterative Adaptive Polarization Calibration Method Independent of Corner Reflectors by Bowen Chi, Jixian Zhang, Guoman Huang, Lijun Lu, Shucheng Yang

    Published 2025-01-01
    “…Polarimetric calibration (PolCal) is essential for the quantitative processing of polarimetric synthetic aperture radar data. Traditional distributed target methods typically require at least one corner reflector (CR) to determine the copolarization (co-pol) channel imbalance. …”
    Get full text
    Article