Showing 1,021 - 1,040 results of 48,913 for search 'data collected (method OR methods)', query time: 0.43s Refine Results
  1. 1021

    THE EFFECTS OF THE TOMATIS METHOD ON ATTENTION OF A CHILD WITH ATTENTION-DEFICIT/HYPERACTIVITY DISORDER: A CASE STUDY by Zlata Avdić, Mirela Duranović

    Published 2025-07-01
    “…A software-based assessment tool specifically designed to evaluate components of executive functions was used to measure attention. The collected data were processed using IBM SPSS Statistics 21 software for statistical analysis. …”
    Get full text
    Article
  2. 1022
  3. 1023

    IMPLEMENTATION OF THE ABU NU’AIM’S METHOD OF HADITH TRANSMISSION IN HILYAT AL-AULIYA’ by M. Yusuf Syafiq Alfian

    Published 2023-06-01
    “…This research employs a literature review and document analysis as the methodological approach. Data are collected from Abu Nu'aim's writings and other works of scholars that explain Abu Nu'aim's hadith transmission methods. …”
    Get full text
    Article
  4. 1024

    Screening uncalibrated priority pollutants by improved AHP-CRITIC method at development land by Xinni Wei, Xiuli Dang, Peng Liu, Ge Gao, Hang Zhu, Jiayue Shi, Qiyuan Zhang, Roland Bol, Peng Zhang, Iseult Lynch, Long Zhao

    Published 2025-08-01
    “…The grading standards of these indicators were refined in accordance with the relevant criteria and the availability of monitoring data collected from databases and predicted data by models. 11 types of uncalibrated priority pollutants were screened out using the comprehensive evaluation method and conducting cluster analysis based on total pollutant scores. …”
    Get full text
    Article
  5. 1025

    Microcrystal Delivery Using a Syringe and Syringe Pump Method for Serial Crystallography by Ki Hyun Nam

    Published 2025-02-01
    “…This method does not require specialized skills for sample delivery and can be tested in the laboratory prior to SX data collection at the beamline. …”
    Get full text
    Article
  6. 1026

    OPTIMIZATION OF RICE INVENTORY USING FUZZY INVENTORY MODEL AND LAGRANGE INTERPOLATION METHOD by Eka Susanti, Fitri Maya Puspita, Evi Yuliza, Siti Suzlin Supadi, Oki Dwipurwani, Novi Rustiana Dewi, Ahmad Farhan Ramadhan, Ahmad Rindarto

    Published 2023-09-01
    “…Interpolation is a method to determine the value that is between two values and is known from the data. …”
    Get full text
    Article
  7. 1027

    A METHOD AND APPLICATION TO IDENTIFY REASONS FOR DECREASING VEHICLES’ DRIVING SPEED IN CITIES by Mariusz WALA, Piotr NOWAKOWSKI

    Published 2018-03-01
    “…This paper proposes a method for traffic data collection and an application for recording data of variable factors having impact on a vehicle speed in cities and agglomerations. …”
    Get full text
    Article
  8. 1028

    Detection Method of Apple Alternaria Leaf Spot Based on Deep-Semi-NMF by FU Zhuojun, HU Zheng, DENG Yangjun, LONG Chenfeng, ZHU Xinghui

    Published 2024-11-01
    “…[Methods]A novel detection method named Deep Semi-Non-negative Matrix Factorization-based Mahalanobis Distance Anomaly Detection (DSNMFMAD) was proposed, which combines Deep Semi-Non-negative Matrix Factorization (DSNMF) with Mahalanobis distance for robust anomaly detection in complex image backgrounds. …”
    Get full text
    Article
  9. 1029

    Forensic Tool Comparison on Instagram Digital Evidence Based on Android with The NIST Method by Imam Riadi, Anton Yudhana, Muhamad Caesar Febriansyah Putra

    Published 2018-11-01
    “…The investigation in this study uses the National Institute of Standards and Technology (NIST) method which provides several stages of collecting, examining, analyzing, reporting while forensic tools use forensic oxygen and axiom magnets. …”
    Get full text
    Article
  10. 1030

    Ranking of the Territory of Sochi by the Risk of Infection with HFRS Using the Method of Maximum Entropy by E. V. Chehvalova, E. A. Manin, A. N. Kulichenko

    Published 2024-01-01
    “…The implementation of this work consisted of the sequential implementation of four main stages: the first – the collection, generalization and transformation of bioclimatic and epizootic-epidemiological data; the second – the selection of the most significant data for the construction of the model; the third – the ranking of the territory of the city. …”
    Get full text
    Article
  11. 1031
  12. 1032

    The Effect of the Reading Circle Method on Curiosity and Exploration, Creative Reading and Visual Literacy by Yasemin Baki

    Published 2025-06-01
    “…The Life Skills Scale, Individual Innovation Scale and semi-structured interview form were used to collect the data in this study. To examine the effect of the experimental process in this study, the data obtained were analyzed with a t-test for dependent groups; the data obtained from the interviews were analyzed with content analysis. …”
    Get full text
    Article
  13. 1033

    Experience of clinical incivility and stress in nursing students: A mixed-method study. by Youngjin Lee, Cheryl Brandt, Younglee Kim

    Published 2025-01-01
    “…To analyze the qualitative focus group data, Colaizzi's method to identify significant themes was used. …”
    Get full text
    Article
  14. 1034

    Automatic Detection Method for Surface Diseases of Shield Tunnel Based on Deep Learning by WANG Baokun, WANG Rulu, CHEN Jinjian, PAN Yue, WANG Lujie

    Published 2024-11-01
    “…Then, through original data collection, data preprocessing, and manual annotation, a shield tunnel surface multiple diseases dataset with 4 500 pictures is constructed. …”
    Get full text
    Article
  15. 1035

    Identifying the antecedents of wisdom management in organizations using the fuzzy cognitive map method by Mohsen Arefnezhad, Seyedeh Maryam Mousavi Zadeh, Rezvan Mennati

    Published 2024-09-01
    “…The data collection tool is used in the qualitative part of the research interviews, and a questionnaire is used in the quantitative part. …”
    Get full text
    Article
  16. 1036

    Analysis to Predict the Number of New Students At UNU Pasuruan using Arima Method by Fachri Ayudi Fitrony, Laksmita Dewi Supraba, Tessa Rantung, I Made Artha Agastya, Kusrini Kusrini

    Published 2025-01-01
    “…This study aims to evaluate the historical pattern of new student admissions at UNU Pasuruan and predict the number of new students in the coming years using the ARIMA (Auto Regressive Integrated Moving Average) method. The data used is historical data on new student admissions in the last five years, which is analyzed to identify trends, seasonality, and fluctuation patterns. …”
    Get full text
    Article
  17. 1037

    A location-constrained crowdsensing task allocation method for improving user satisfaction by Huihui Chen, Bin Guo, Zhiwen Yu, Liming Chen

    Published 2019-10-01
    “…Mobile crowdsensing is a special data collection manner which collects data by smart phones taken by people every day. …”
    Get full text
    Article
  18. 1038

    Applicability of the “5S Management Method” for Quality Improvement at Health Care Facilities in India by Aesh Katiyar, Jay Patwa, Nikhil Chavda

    Published 2025-08-01
    “…A structured 5S audit checklist and semi-structured interviews were used for baseline assessment, external evaluation, and qualitative data collection, respectively. Results: Following 5S implementation, the mean scores increased in all twelve departments, with statistically significant improvements in most cases. …”
    Get full text
    Article
  19. 1039

    Detection method of LDoS attack based on ACK serial number step-length by Zhijun WU, Qingbo PAN, Meng YUE

    Published 2018-07-01
    “…Low-rate denial of service (LDoS) attack is a potential security threat to big data centers and cloud computing platforms because of its strong concealment.Based on the analysis of network traffic during the LDoS attack,statistical analysis was given of ACK packets returned by the data receiver to the sender,and result reveals the sequence number step had the characteristics of volatility during the LDoS attack.The permutation entropy method was adopted to extract the characteristics of volatility.Hence,an LDoS attack detection method based on ACK serial number step permutation entropy was proposed.The serial number was sampled and the step length was calculated through collecting the ACK packets that received at the end of sender.Then,the permutation entropy algorithm with strong time-sensitive was used to detect the mutation step time,and achieve the goal of detecting LDoS attack.A test-bed was designed and built in the actual network environment for the purpose of verifying the proposed approach performance.Experimental results show that the proposed approach has better detection performance and has achieved better detection effect.…”
    Get full text
    Article
  20. 1040

    The Concept of Tazkiyat al-Nafs by Al-Ghazali as a Method in Moral Education by Erlin Wulandari, Evi Verlantika, M Hafidz Khusnadi

    Published 2021-12-01
    “…In collecting data, the author uses the documentation method, namely by collecting various books and journals. …”
    Get full text
    Article