Search alternatives:
source » sources (Expand Search)
Showing 8,101 - 8,120 results of 8,405 for search 'source evaluation methods', query time: 0.25s Refine Results
  1. 8101

    Analyzing Stopping Behavior in Online Information Search Process from the Perspective of Information Foraging Theory by Fereshte Ilani, Mohsen Nowkarizi, Sholeh Arastoopoor

    Published 2023-09-01
    “…This study analyzes search stopping points and stopping rules used in the online information search process based on the concepts of Information Foraging Theory. The research method is a descriptive-analytical study. Sources are collected from various databases with no time restriction (before August 2022). …”
    Get full text
    Article
  2. 8102

    Future Studies of Effective Factors on Sustainable Housing In Tehran Metropolitan by Zohreh Fanni, Pirouz Hanachi, Ali Samani Majd

    Published 2021-10-01
    “…Present study in terms of functional survey, is based on library documentation and in terms of modality is based on analytical-descriptive method. The purpose of the research is to identify the factors affecting housing planning of metropolitan of Tehran in order to improve the process of achieving desirable results in the future of planning.Thus, 26 effective factors were extracted from valid sources and designs. …”
    Get full text
    Article
  3. 8103
  4. 8104

    Influence of social media and the digital environment on international migration of health workforce from low- and middle-income countries post COVID-19 pandemic: a scoping review... by Gladys Dzansi, Amankwa Abdul-Mumim, William Menkah, Vivian Ametefe, Eugenia Xatse, Believe Adzoa Azanku

    Published 2024-10-01
    “…All the information will be retrieved from open sources only. The protocol was registered with the Open Science Framework registry (osf.oi/zan3q) to serve as an audit trail. …”
    Get full text
    Article
  5. 8105

    Finding the Guardians of Royal Blood: Observations on the Supply of eunuchs to the Harem in the Ottoman Empire and the Crimean Khanate through case studies and documents by Ürkündağ A., Başer A.

    Published 2023-12-01
    “…It was found that the main method for supplying eunuchs to the harem was purchasing them from specialized merchants. …”
    Get full text
    Article
  6. 8106

    Bacteriophages as a Biocontrol Strategy to Prevent the Contamination of Meat Products with Escherichia coli – a Meta-Analysis by VEGA IRACEMA ISLAS, RODRÍGUEZ NYDIA EDITH REYES, PÉREZ VICTOR JOHAN ACOSTA, VELÁZQUEZ ANDREA PALOMA ZEPEDA, SÁNCHEZ VICENTE VEGA, ARANA JORGE LUIS DE LA ROSA, NOGUEZ JESÚS BENJAMÍN PONCE, GÓMEZ DE ANDA FABÍAN RICARDO

    Published 2025-06-01
    “…The initial search identified 2,695 bibliographic sources, of which 2,480 were discarded because they did not meet the inclusion criteria, which were the origin of phage, application method, phage taxonomy, E. coli pathotype and meat products, getting 157 articles because they were duplicates, and 47 because they lacked the necessary numerical data. …”
    Get full text
    Article
  7. 8107

    Consumer preference analysis on medium chain triglycerides (MCT) oil in the Philippines: A conjoint analysis by Genard Paul R. Bajacan, Ardvin Kester S. Ong, John Francis T. Diaz, Maela Madel L. Cahigas, Ma.Janice J. Gumasing

    Published 2025-12-01
    “…Key attributes considered were price, packaging material, certification type, product form, sourcing location, flavor, and consumption method. …”
    Get full text
    Article
  8. 8108

    Towards Ontological Approach on Trust-Aware Ambient Services by O-Joun Lee, Hoang Long Nguyen, Jai E. Jung, Tai-Won Um, Hyun-Woo Lee

    Published 2017-01-01
    “…Thereby, we propose trust ontology-based framework for deriving personalized ontologies for individual users according to their preference, perspective, and purpose. To evaluate the proposed model, we have figured out a method how the degree of trust is estimated based on the trust ontology. …”
    Get full text
    Article
  9. 8109

    The Correlation of MGMT Promoter Methylation and Clinicopathological Features in Gastric Cancer: A Systematic Review and Meta-Analysis. by Yong Ding, Qihua Yang, Bojun Wang, Guoliang Ye, Xiaoqiong Tong

    Published 2016-01-01
    “…Meta-regression and subgroup analyses based on the testing method, sample material and ethnicity failed to explain the sources of heterogeneity. …”
    Get full text
    Article
  10. 8110

    In vitro antimicrobial and antioxidant activities of Sambucus williamsii and Sambucus pendula by Kyoung-sun Seo, Kyeong Won Yun

    Published 2024-06-01
    “…The antimicrobial activity of the two plants was evaluated using the disc diffusion and minimal inhibition concentration (MIC) method against three Gram-positive bacteria (Bacillus cereus ATCC 11778, Bacillus subtilis ATCC 9327 and Listeria monocytogenes ATCC 15313), four Gram-negative bacteria (Escherichia coli ATCC 15489, Psendomonas aeruginosa ATCC 27853, Pseudomonas fluorescens KCCM 41443 and Salmonella typhimurium KCCM 11862) and one yeast (Saccharomyces cerevisiae IFO 1950). …”
    Get full text
    Article
  11. 8111

    Sectoral interactions and primary drivers in integrated CLEWs modeling: insights from Kenya by Roberto Heredia-Fonseca, Pietro Lubello, Francesco Gardumi, Will Usher

    Published 2025-01-01
    “…Using the Morris screening method, the analysis emphasizes the key role of discount rates—both global and technology- specific—influencing the energy sector, biomass use for cooking, renewable energy sources penetration, and forest land cover. …”
    Get full text
    Article
  12. 8112

    Assessment of potential sites for biogas production plants from domestic, agricultural, and livestock waste by Rahim Moltames, Younes Noorollahi, Hossein Yousefi, Behzad Azizimehr, Amir Naseri

    Published 2025-03-01
    “…Employing biomass energy can potentially play a key role in decreasing the environmental effects of non-renewable energy sources, especially global warming and its consequences. …”
    Get full text
    Article
  13. 8113

    Associations between dopamine D2 receptor gene polymorphisms and schizophrenia risk: a PRISMA compliant meta-analysis by He HR, Wu HH, Yang LH, Gao F, Fan YJ, Feng JQ, Ma XC

    Published 2016-12-01
    “…In addition, meta-regression indicated that the controls may be sources of heterogeneity for the rs1801028 single-nucleotide polymorphism (SNP), while ethnicity may be sources of heterogeneity for the rs6277 SNP. …”
    Get full text
    Article
  14. 8114

    Isolation and characterization of cellulose derived from prominent agricultural waste (Sugarcane bagasse) and its utilization in various biomedical field by Manoj Kumar Sharma, Anupama Diwan, Satish Sardana, Narender Yadav, Tanya Gupta, Mukesh Kumar Kumawat

    Published 2025-02-01
    “…Conclusion: Agri waste has significant potential and sources for value-based products. Here, successful extraction and derivatization of the cellulose from the sugarcane were done. …”
    Get full text
    Article
  15. 8115

    Predicting correlation relationships of entities between attack patterns and techniques based on word embedding and graph convolutional network by Weicheng QIU, Xiuzhen CHEN, Yinghua MA, Jin MA, Zhihong ZHOU

    Published 2023-08-01
    “…Threat analysis relies on knowledge bases that contain a large number of security entities.The scope and impact of security threats and risks are evaluated by modeling threat sources, attack capabilities, attack motivations, and threat paths, taking into consideration the vulnerability of assets in the system and the security measures implemented.However, the lack of entity relations between these knowledge bases hinders the security event tracking and attack path generation.To complement entity relations between CAPEC and ATT&CK techniques and enrich threat paths, an entity correlation prediction method called WGS was proposed, in which entity descriptions were analyzed based on word embedding and a graph convolution network.A Word2Vec model was trained in the proposed method for security domain to extract domain-specific semantic features and a GCN model to capture the co-occurrence between words and sentences in entity descriptions.The relationship between entities was predicted by a Siamese network that combines these two features.The inclusion of external semantic information helped address the few-shot learning problem caused by limited entity relations in the existing knowledge base.Additionally, dynamic negative sampling and regularization was applied in model training.Experiments conducted on CAPEC and ATT&CK database provided by MITRE demonstrate that WGS effectively separates related entity pairs from irrelevant ones in the sample space and accurately predicts new entity relations.The proposed method achieves higher prediction accuracy in few-shot learning and requires shorter training time and less computing resources compared to the Bert-based text similarity prediction models.It proves that word embedding and graph convolutional network based entity relation prediction method can extract new entity correlation relationships between attack patterns and techniques.This helps to abstract attack techniques and tactics from low-level vulnerabilities and weaknesses in security threat analysis.…”
    Get full text
    Article
  16. 8116

    Antioxidant Activity, Microbiological Quality, and Acceptability of Spontaneously Fermented Shrimp Sausage (Litopenaeus vannamei) by Diana N. Afifah, Uchida T. S. Dewi, Rizka D. Anggraeni, A. Fahmy A. Tsani, Nurmasari Widyastuti, Faizah Fulyani, Gemala Anjani

    Published 2022-01-01
    “…The treatment was conducted spontaneously with 1.2% salt concentration, a drying temperature of 50°C for 3 h, and fermentation at 35°C. The evaluated parameters included the antioxidant activity measured with the radical 2,2-azino-bis (3-ethylbenzothiazoline-6-sulphonic acid) method, vitamin E levels by high-performance liquid chromatography, total LAB with total plate count, and Escherichia coli bacteria by the most probable number method. …”
    Get full text
    Article
  17. 8117

    Load Frequency Control Based on Gray Wolf Optimizer Algorithm for Modern Power Systems by Dao Huy Tuan, Dao Trong Tran, Van Nguyen Ngoc Thanh, Van Van Huynh

    Published 2025-02-01
    “…The effectiveness of the GWO-PID method is evaluated on multi-area power systems, including systems integrated with wind energy. …”
    Get full text
    Article
  18. 8118

    Forced labor in accounting during World War II. The case of the company SS Ostindustrie GmbH by Mikołaj Turzyński, Adam Kędrzyński

    Published 2025-03-01
    “…Purpose: The aim of the paper is to examine the representation of forced labor in the accounting system and to analyze, interpret, and evaluate the accounting regulations of the company Osti (SS Ostindustrie GmbH).Methodology/approach: The historical method is used, which comprises researching archival sources. …”
    Get full text
    Article
  19. 8119

    A New Approach to Decision-Making Problem under Complex Pythagorean Fuzzy Information by Shakoor Muhammad, Riaz Ali, Saleem Abdullah, Samuel Okyere

    Published 2022-01-01
    “…Furthermore, the viability and applicability of the propounded method are certified by a detailed analysis with the other approaches researched in the past.…”
    Get full text
    Article
  20. 8120

    Serotype Distribution and Antimicrobial Resistance Profile of Salmonella Isolated from Traditional Chicken Doner Kebabs in Türkiye by Atakan Karakaya, Ali Gücükoğlu

    Published 2023-02-01
    “…As a result, the isolation of Salmonella spp. from the samples and their resistance to different antibiotics were evaluated as potential sources of problems in the context of foodborne infectious diseases.…”
    Get full text
    Article