Showing 681 - 700 results of 48,913 for search 'data collected (method OR methods)', query time: 0.42s Refine Results
  1. 681

    Multilane Spatiotemporal Trajectory Optimization Method (MSTTOM) for Connected Vehicles by Pangwei Wang, Yunfeng Wang, Hui Deng, Mingfang Zhang, Juan Zhang

    Published 2020-01-01
    “…A typical scenario of intersection with a one-way 4-lane section is measured, and the data within 24 hours are collected for tests. The results demonstrate that the proposed method can optimize the traffic flow by enhancing vehicle fuel efficiency by 32% and reducing pollutants emissions by 17% compared with the advanced glidepath prototype application (GPPA) scheme.…”
    Get full text
    Article
  2. 682
  3. 683

    Common Medical Errors in Gastroenterology: A Mixed Method Study by Amir Sadeghi, Abbas Masjedi Arani, Foroozan Atashzadeh-Shoorideh, Marzieh Pazokian, Arezoo Qadimi, Hosna Karami khaman, Raziyeh Ghafouri

    Published 2024-01-01
    “…The collected data was analyzed using content analysis method and error prevention strategies were identified.Results:The mean (standard deviation) score of patients in the departments were 66.28 (98.7), and the mean number of nurses was 4.83 (26.3). …”
    Get full text
    Article
  4. 684

    Assessing the influence of playing method on the outcome of basketball shooting ability by Zidan Dhia, Didi Suryadi, Y Touvan Juni Samodra, Mashud, Asriah Nurdini Mardiyyaningsih, Eko Saputra, Zsolt Németh, Asry Syam, Rezza Dewintha, Fazarudin

    Published 2023-06-01
    “…The devices in the study collected data directly from tests and measurements performed on the basketball court. …”
    Get full text
    Article
  5. 685

    Feasibility and acceptability of multiple methods of recording injecting drug use episode data among people who inject drugs in Melbourne, Australia: a pilot evaluation study proto... by Alexis Roth, Peter Higgs, Paul Dietze, Nick Scott, Daniel O’Keefe, Filip Djordjevic, Ashleigh Cara Stewart, Dylan Vella-Horne, Zoe Gleeson, Damian Pavlyshyn, Matthew Gill, Rebekka Petrovic, Ben Cocchiaro

    Published 2024-12-01
    “…The In-The-Moment-Expanded (ITM-Ex) study will evaluate the feasibility and acceptability of multiple novel data collection methods to capture in situ drug injecting data.Methods and analysis ITM-Ex will purposively recruit 50 participants from an existing longitudinal cohort (SuperMIX study) of people who inject drugs in Melbourne, Australia. …”
    Get full text
    Article
  6. 686

    Hard-coded backdoor detection method based on semantic conflict by Anxiang HU, Da XIAO, Shichen GUO, Shengli LIU

    Published 2023-02-01
    “…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
    Get full text
    Article
  7. 687

    IMPROVING THE METHOD OF FROZEN BERRY PROCESSING IN THE DEVICE WITH VIBRATING PLATE by Sorokopud A.F., Plotnikov I.B., Plotnikova L.V.

    Published 2017-06-01
    “…Noted are drawbacks of the common method of processing of frozen fruit raw material in the field of low- frequency mechanical vibrations. …”
    Get full text
    Article
  8. 688

    Method of MVB and WTB Frames Decoding Based on LabVIEW by WU Yun, SHEN Hui, DENG Heng, GAO Lian-sheng

    Published 2013-01-01
    “…Composition of MVB and WTB frame was described, and method of controlling the oscilloscope collecting the MVB or WTBdevice frame data in real time via an Ethernet by using LabVIEW program was provided. …”
    Get full text
    Article
  9. 689

    Understanding street-exposure and abuse among street-involved children and youth in Kenya: structural intervention insights from routinely collected program data by Michael Goodman, Kelvin Munene, Nora Gardner, Stanley Gitari

    Published 2024-11-01
    “…Data were collected from participants in the Watoto wa Ahadi Rescue Center programme over a 6-year period (2016–2022). …”
    Get full text
    Article
  10. 690

    Combined localization method of roadheader based on vision and inertial navigation by Jicheng WAN, Xuhui ZHANG, Wenjuan YANG, Chao ZHANG, Zheng DONG, Yuyang DU, Mengyu LEI, Xin CHEN, Junhao YANG

    Published 2025-06-01
    “…The Lagrange three-point interpolation method is used to register the visual pose data and the inertial pose data in time. …”
    Get full text
    Article
  11. 691
  12. 692

    Construction method and application of domain knowledge graph for command and guidance by GONG Bowen

    Published 2025-08-01
    “…In future equipment testing, real-time data collection, processing, and storage present characteristics such as large data volume, redundancy, and poor intuitiveness, which pose challenges to test command and guidance. …”
    Get full text
    Article
  13. 693

    Implementation of Inquiry Learning Method in Maharah al-Qiro'ah by Siti Shalihah, Ummi Nisa, Achmad Yani

    Published 2023-11-01
    “…In this article, maharah al-qiro'ah was discussed, which focused on reading skills and also text understanding. Primary data sources in this research included interviews with teachers or instructors involved in maharah al-qira'ah using the inquiry method. …”
    Get full text
    Article
  14. 694

    Validation of Organizational Isomorphism Model Using Fuzzy Delphi Method by Najmeh Rezasoltani, Mehrdad Moharramzadeh, Nasrin Azizian Kohan, Abbas Naghizadeh-Baghi

    Published 2024-12-01
    “…The criteria for entering the research were to have at least two years of experience as a member of the board of directors of one of the sports federations. The research data collection tool was semi-structured interviews. …”
    Get full text
    Article
  15. 695

    LEARNING GALLERY METHOD'S IMPACT ON ELEMENTARY STUDENTS' SCIENCE COMPREHENSION by Diah Susanti

    Published 2024-06-01
    “…The purpose of this study was to determine whether or not there was an effect of implementing gallery learning at SD Negeri Z. The research method used was descriptive quantitative, with data collection techniques through observation, questionnaires, and interviews. …”
    Get full text
    Article
  16. 696

    THE RANK METHOD AND DIRECT ASSESSMENT OF FACTORS AFFECTING THE ACTIVITY OF STUDENTS by G. R. Zmanovsky, O. V. Myasoutov

    Published 2022-08-01
    “…Actively conducted empirical research in the framework of youth issues is aimed at collecting statistical data, as well as studying various aspects of the state of youth. …”
    Get full text
    Article
  17. 697

    An Interface-Based Method for Performance Improvement of the Municipal Solid Waste by Tabukeli, Musigi Ruhiiga, Virginia, Nthavheleni Mudau

    Published 2023
    “…Using a set of nine municipalities in Limpopo Province, South Africa, stratified random sampling produced 225 observations made up of collection, treatment, and landfill sites. Field observation and repeated measurement of eight predictors and one response variable were used to collect data, followed by an experimental set of 29 sites where a three-cycle treatment of loadings was used to record changes in the response variable. …”
    Get full text
    Article
  18. 698

    A method to map lake ice temperature in urban environments by Paulo Pereira, Luis Valenca Pinto, Miguel Inacio, Damia Barcelo

    Published 2025-06-01
    “…The steps followed were: 1) UAV mission planning, 2) field data collection, 3) mission reconstruction, 4) data extraction, and 5) statistical and spatial analysis. …”
    Get full text
    Article
  19. 699

    Quantifying uncertainty in time perception: A modified reproduction method by Jaume Boned, Joan López-Moliner

    Published 2024-11-01
    “…In time perception research, we typically measure how an observer perceives time intervals by collecting data from multiple trials with a single estimate recorded on each. …”
    Get full text
    Article
  20. 700