Suggested Topics within your search.
Suggested Topics within your search.
- Research 2
- Agriculture 1
- Decision making 1
- EDUCATION / Leadership 1
- Evaluation research (Social action programs) 1
- Evidence-based social work 1
- Executive coaching 1
- Management 1
- Nursing 1
- Nursing Research 1
- Organizational change 1
- School management and organization 1
- Social service 1
- Soil Science & Conservation 1
- Soil conservation 1
- Soil science 1
- Sustainable Development 1
- Sustainable development 1
- Teams in the workplace 1
- methods 1
-
681
Multilane Spatiotemporal Trajectory Optimization Method (MSTTOM) for Connected Vehicles
Published 2020-01-01“…A typical scenario of intersection with a one-way 4-lane section is measured, and the data within 24 hours are collected for tests. The results demonstrate that the proposed method can optimize the traffic flow by enhancing vehicle fuel efficiency by 32% and reducing pollutants emissions by 17% compared with the advanced glidepath prototype application (GPPA) scheme.…”
Get full text
Article -
682
-
683
Common Medical Errors in Gastroenterology: A Mixed Method Study
Published 2024-01-01“…The collected data was analyzed using content analysis method and error prevention strategies were identified.Results:The mean (standard deviation) score of patients in the departments were 66.28 (98.7), and the mean number of nurses was 4.83 (26.3). …”
Get full text
Article -
684
Assessing the influence of playing method on the outcome of basketball shooting ability
Published 2023-06-01“…The devices in the study collected data directly from tests and measurements performed on the basketball court. …”
Get full text
Article -
685
Feasibility and acceptability of multiple methods of recording injecting drug use episode data among people who inject drugs in Melbourne, Australia: a pilot evaluation study proto...
Published 2024-12-01“…The In-The-Moment-Expanded (ITM-Ex) study will evaluate the feasibility and acceptability of multiple novel data collection methods to capture in situ drug injecting data.Methods and analysis ITM-Ex will purposively recruit 50 participants from an existing longitudinal cohort (SuperMIX study) of people who inject drugs in Melbourne, Australia. …”
Get full text
Article -
686
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
687
IMPROVING THE METHOD OF FROZEN BERRY PROCESSING IN THE DEVICE WITH VIBRATING PLATE
Published 2017-06-01“…Noted are drawbacks of the common method of processing of frozen fruit raw material in the field of low- frequency mechanical vibrations. …”
Get full text
Article -
688
Method of MVB and WTB Frames Decoding Based on LabVIEW
Published 2013-01-01“…Composition of MVB and WTB frame was described, and method of controlling the oscilloscope collecting the MVB or WTBdevice frame data in real time via an Ethernet by using LabVIEW program was provided. …”
Get full text
Article -
689
Understanding street-exposure and abuse among street-involved children and youth in Kenya: structural intervention insights from routinely collected program data
Published 2024-11-01“…Data were collected from participants in the Watoto wa Ahadi Rescue Center programme over a 6-year period (2016–2022). …”
Get full text
Article -
690
Combined localization method of roadheader based on vision and inertial navigation
Published 2025-06-01“…The Lagrange three-point interpolation method is used to register the visual pose data and the inertial pose data in time. …”
Get full text
Article -
691
-
692
Construction method and application of domain knowledge graph for command and guidance
Published 2025-08-01“…In future equipment testing, real-time data collection, processing, and storage present characteristics such as large data volume, redundancy, and poor intuitiveness, which pose challenges to test command and guidance. …”
Get full text
Article -
693
Implementation of Inquiry Learning Method in Maharah al-Qiro'ah
Published 2023-11-01“…In this article, maharah al-qiro'ah was discussed, which focused on reading skills and also text understanding. Primary data sources in this research included interviews with teachers or instructors involved in maharah al-qira'ah using the inquiry method. …”
Get full text
Article -
694
Validation of Organizational Isomorphism Model Using Fuzzy Delphi Method
Published 2024-12-01“…The criteria for entering the research were to have at least two years of experience as a member of the board of directors of one of the sports federations. The research data collection tool was semi-structured interviews. …”
Get full text
Article -
695
LEARNING GALLERY METHOD'S IMPACT ON ELEMENTARY STUDENTS' SCIENCE COMPREHENSION
Published 2024-06-01“…The purpose of this study was to determine whether or not there was an effect of implementing gallery learning at SD Negeri Z. The research method used was descriptive quantitative, with data collection techniques through observation, questionnaires, and interviews. …”
Get full text
Article -
696
THE RANK METHOD AND DIRECT ASSESSMENT OF FACTORS AFFECTING THE ACTIVITY OF STUDENTS
Published 2022-08-01“…Actively conducted empirical research in the framework of youth issues is aimed at collecting statistical data, as well as studying various aspects of the state of youth. …”
Get full text
Article -
697
An Interface-Based Method for Performance Improvement of the Municipal Solid Waste
Published 2023“…Using a set of nine municipalities in Limpopo Province, South Africa, stratified random sampling produced 225 observations made up of collection, treatment, and landfill sites. Field observation and repeated measurement of eight predictors and one response variable were used to collect data, followed by an experimental set of 29 sites where a three-cycle treatment of loadings was used to record changes in the response variable. …”
Get full text
Article -
698
A method to map lake ice temperature in urban environments
Published 2025-06-01“…The steps followed were: 1) UAV mission planning, 2) field data collection, 3) mission reconstruction, 4) data extraction, and 5) statistical and spatial analysis. …”
Get full text
Article -
699
Quantifying uncertainty in time perception: A modified reproduction method
Published 2024-11-01“…In time perception research, we typically measure how an observer perceives time intervals by collecting data from multiple trials with a single estimate recorded on each. …”
Get full text
Article -
700
BENCHMARKING AS THE ASSESSMENT METHOD OF EFFICIENCY THE LEBEDYNSKA BREED OF DAIRY COWS
Published 2019-01-01Get full text
Article