Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
14141
An Attention-Based Multidimensional Fault Information Sharing Framework for Bearing Fault Diagnosis
Published 2025-01-01“…Meanwhile, we propose an innovative Dynamic Adjustment Strategy (DAS) designed to adaptively regulate the training weights of FLT and FQT tasks to achieve optimal training results. …”
Get full text
Article -
14142
Diagnostic utility of special stains in defining the spectrum of maxillofacial pathologies
Published 2023-07-01“…Settings and Design: The study was conducted in the Department of Oral and Maxillofacial Pathology, where FNAC samples were collected from 150 patients with head and neck swellings. …”
Get full text
Article -
14143
Fluconazole-Like Compounds as Potential Antifungal Agents: QSAR, Molecular Docking, and Molecular Dynamics Simulation
Published 2022-01-01“…On the other hand, due to the increasing resistance to current antifungal drugs, more and more options for design of novel more efficient compounds with higher resistance are needed. …”
Get full text
Article -
14144
Financial and economic consequences of the war for Ukraine
Published 2024-11-01“…The focus is on assessing how businesses, government and other international stakeholders have responded to the various challenges posed by the war. Design / Method / Approach. According to the World Bank’s RDNA3 methodology, damage is the direct costs of destroyed or damaged physical assets and infrastructure, valued in monetary terms. …”
Get full text
Article -
14145
What factors affect teacher professional learning: a qualitative meta-analysis based on the Onion model
Published 2024-12-01“…Social implications – The design of teacher learning activities should combine theoretical, practical and inquiry learning to ensure that teachers are kept fresh and motivated by sustained and varied stimuli. …”
Get full text
Article -
14146
Evaluating the impact of an electronic support system on clinical productivity and student satisfaction in dental education
Published 2024-12-01“…Aims: This study aimed to evaluate the impact of a new electronic support system on dental students’ clinical productivity, focusing on course completion, procedures completed, peer assistance, and student satisfaction. Settings and Design: A comparative observational design was used. …”
Get full text
Article -
14147
Nature’s way-our way: A journey through the co-creation and sharing of an Indigenous physical literacy enriched early years initiative
Published 2025-01-01“…We apply a pre-mid-post design for the meaningful evaluation of the Nature’s Way-Our Way initiative. …”
Get full text
Article -
14148
Perception of Professional Practices from the voice of the student body of Pedagogy
Published 2025-01-01“…The main aim of research in this field is to assess the pedagogy students’ perception of the blog, videoconference, and peer mentoring as effective tools for reflection and communication in monitoring and evaluating professional practices. The design/methodology about the evaluation of students’ perception was conducted using a mixed design, employing both quantitative and qualitative methods. …”
Get full text
Article -
14149
Gender similarities in high school mathematics: affective and cognitive aspects
Published 2023-06-01“…The findings can be practically used to realize successful high school mathematics teaching-learning by selecting student outcomes, designing teacher and school manager training programs, and developing curricular materials in line with the findings. …”
Get full text
Article -
14150
Gender and Handedness Prediction from Offline Handwriting Using Convolutional Neural Networks
Published 2018-01-01“…Moreover, the proposed solutions have been designed using a unique network configuration for the three considered demographic problems, which has the advantage of simplifying the design complexity and debugging of these deep architectures when handling related handwriting problems. …”
Get full text
Article -
14151
Key innovation abilities on capability and the performance of women entrepreneurs: the role of entrepreneurial education and proactive personality
Published 2023-11-01“…The study also examined how proactive personality and entrepreneurial education moderate the relationship between innovative capability and women entrepreneurs' performance. Design/methodology/approach – The study used a quantitative research design and administered a questionnaire to collect data from participants. …”
Get full text
Article -
14152
Computationally secure steganography based on speech synthesis
Published 2022-06-01“…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
Get full text
Article -
14153
Surface defect detection on industrial drum rollers: Using enhanced YOLOv8n and structured light for accurate inspection.
Published 2025-01-01“…The system and algorithm designed in this paper can better ensure the production quality of drum rollers. …”
Get full text
Article -
14154
Lessons from China’s 48-h COVID-19 testing regime during the dynamic zero COVID policy period
Published 2025-01-01Get full text
Article -
14155
Developing English Material for Food and Beverage Service Used by Students at SMKN 1 Singaraja
Published 2023-11-01“…This research used the Design and Developments model that Rickey and Klein (2009) suggested, which includes planning, development, and evaluation. …”
Get full text
Article -
14156
Advancements in Development of Chemical-Looping Combustion: A Review
Published 2009-01-01“…Extensive research has been performed on CLC in the last decade with respect to oxygen carrier development, reaction kinetics, reactor design, system efficiencies, and prototype testing. …”
Get full text
Article -
14157
From hinterland granary fort to frontier mountain fortress: Initiation, construction, and expansion of the Diaoyucheng Fortress, Hechuan, China, in the wars during 1125–1279
Published 2025-02-01“…With the comparisons with the fortifications across Eurasia around the same period, this study illustrates this fortress epitomizes the development of knowledge system for fortification design in ancient China, especially the river defense fortress taking advantage of topography and navy.…”
Get full text
Article -
14158
Leveraging augmented reality in education involving new pedagogies with emerging societal relevance
Published 2025-02-01“…In the present study two research questions have been designed as: to analyze various challenges and issues in integration of augmented reality technology for education. …”
Get full text
Article -
14159
An elasto-plastic approach to estimate lifetime of notched components under variable amplitude fatigue loading: a preliminary investigation
Published 2016-07-01“…The accuracy and reliability of the proposed design methodology was checked against several experimental data taken from the literature and generated under different uniaxial variable amplitude load histories. …”
Get full text
Article -
14160
Miniaturized Inset-Fed Microstrip Patch Sensor Based on Meander-Line Slot for Water Measurement Applications
Published 2024-12-01“…The HFSS software tool is employed to design and simulate the proposed system. The inset-fed sensor size is 60×50×1 mm3 and is printed on a low-cost FR-4 dielectric substrate. …”
Get full text
Article