Suggested Topics within your search.
Suggested Topics within your search.
- Effective teaching 2
- Elementary school teaching 2
- Quality of life 2
- Social conditions 2
- Social problems 2
- ART / Digital 1
- Artificial intelligence 1
- Business 1
- Business communication 1
- Business ethics 1
- Child welfare 1
- Communication of technical information 1
- Computer animation 1
- Computer programs 1
- Criminal law 1
- Cultural policy 1
- Cultural property 1
- Custody of children 1
- Digital cinematography 1
- Electronic spreadsheets 1
- Evidence (Law) 1
- Executive coaching 1
- Family assessment 1
- Family psychotherapy 1
- Foreign Exchange Rates 1
- Forensic child psychology 1
- Historic preservation 1
- Human geography 1
- Industrial design 1
- Intelligent control systems 1
-
4501
Human Supervision is Key to Achieving Accurate AI-assisted Wildlife Identifications in Camera Trap Images
Published 2024-12-01“…To assess classification accuracy gains, we compare the precision of species labels produced by AI and HITL protocols to a “gold standard” (GS) dataset annotated by wildlife experts. The accuracy of the AI method was species-dependent and positively correlated with the number of training images. …”
Get full text
Article -
4502
A Smart Chatbot for Interactive Management in Beta Thalassemia Patients
Published 2022-01-01“…A question/answer system was created based on knowledge pertaining to β-thalassemia assembled from experts, medical guidelines, and articles. Recommendations regarding the patient’s follow-up assessment are made based on the answers. …”
Get full text
Article -
4503
Analysis of Located Problems in Isfahan City-Region by Using of Social Network Analysis
Published 2020-09-01“…For this purpose, in the first step, identifying problems between Isfahan and ten neighboring cities has led to the formulation of a statement of problems by using the dual paths of reviewing the documents of documents and urban plans and conducting interviews with city managers and experts. In the second step, analyzing the problems and problems of the cities located in the city-region of Isfahan, based on the six-tagged codes defined for each problem, the amount of weight (severity of the problem) is determined and, through the method of analyzing social networks, the network of "actors-problems" is drawn. …”
Get full text
Article -
4504
Awareness and Disposal Practices of Medicines among the Community in Hawassa City, Ethiopia
Published 2023-01-01“…Multistage sampling procedures were employed to select 405 household (HH) respondents, and purposive sampling techniques were used to select key experts (KEs) and key informants (KIs). A pretested questionnaire was designed for HHs, KEs, and KIs. …”
Get full text
Article -
4505
Um Modelo de Antecedentes para a Cocriação de Valor em Serviços de Saúde: uma Aplicação da Modelagem de Equações Estruturais
Published 2015-01-01“…Quatro vignettes foram construídas a partir da revisão da literatura, validadas por experts , com o objetivo de capturar a percepção dos respondentes sobre as ações dos protagonistas em cenários sob re a cocriação de valor em um serviço de saúde. …”
Get full text
Article -
4506
Future Studies of Tourism Development Planning (Case study: Ardabil province)
Published 2021-12-01“…The research area of Ardabil province and the statistical population is 45 tourism experts, urban and regional planning and executive agencies of the province. …”
Get full text
Article -
4507
An Introduction to Explaining and Interpreting Laws in Measurement Fuzzy Logic
Published 2024-06-01“…The result is that with the theory of explanation and interpretation of the existing laws based on fuzzy thinking, as well as the design and implementation of the fuzzy judicial system with the help of experts, it is possible to progress towards a more accurate and fair judicial system. …”
Get full text
Article -
4508
Studying indicators of traditional architecture of Shiraz houses in order to provide a suitable model for contemporary housing design in order to use clean energy
Published 2023-06-01“…The statistical population of the research consists of 27089 experts, specialists and people familiar with the architecture of the building and a member of the Engineering System Organization of Fars Province. …”
Get full text
Article -
4509
The ResQu Index: A new instrument to appraise the quality of research on birth place.
Published 2017-01-01“…<h4>Study design</h4>The instrument development process involved five phases: 1) generation of items and a weighted scoring system; 2) content validation via a quantitative survey and a modified Delphi process with an international, multi-disciplinary panel of experts; 3) inter-rater consistency; 4) alignment with established research appraisal tools; and 5) pilot-testing of instrument usability.…”
Get full text
Article -
4510
Comparative Analysis of ChatGPT and Human Expertise in Diagnosing Primary Liver Carcinoma: A Focus on Gross Morphology
Published 2025-02-01“… Objective: This study aims to compare the diagnostic accuracy of customized ChatGPT and human experts in identifying primary liver carcinoma using gross morphology. …”
Get full text
Article -
4511
TRAINING EMPLOYEES TO WORK WITH HI-TECH EQUIPMENT
Published 2016-01-01“…Specification of the model of workers training offered by authors is carried out on the basis of deep interviews to experts – the representatives of the large enterprises who are carrying out training of the personnel.Results. …”
Get full text
Article -
4512
Celiac Disease in Children and YouTube: Do the Videos Contain Accurate Information?
Published 2025-01-01“…At this point, analyzing videos on medical topics by experts and adding them to the search algorithm according to the scores will help users access reliable information.…”
Get full text
Article -
4513
THE ANALYSIS OF THE KEY DRIVERS AND BARRIERS OF CLOUD MIGRATION IN COMPANIES IN BOSNIA AND HERZEGOVINA
Published 2020-05-01“…According to the research results, the most significant obstacles of cloud migration include the fo-llowing: lack of internal experts, privacy, lack of respo-nsibility of cloud providers in case of security incident, costs and complexity of migration to the cloud, etc. …”
Get full text
Article -
4514
The Application of Al-Qahtani Method for Dental Age Estimation of Down Syndrome Children
Published 2024-04-01“…Dental age estimates are often carried out to complete the victim's identity using methods from experts such as Al-Qahtani. There have been many studies related to estimating tooth age using the Al-Qahtani method in normal humans but not in human subjects with special needs, such as children with down syndrome. …”
Get full text
Article -
4515
Peculiarities of Operator Shooting of Television Programs in Interiors
Published 2024-12-01“…The empirical method was employed to conduct practical research, collect data and conduct interviews with experts. The resulting data was then processed and analysed to study the impact of these programmes on the audience and their perception. …”
Get full text
Article -
4516
Novel pathogenically oriented surgical technique for advanced glaucoma
Published 2020-03-01“…Kazantseva</b><br> </p> <p> <b>Pirogov Russian National Research Medical University, Moscow, Russian Federation</b> </p> <p> <i>For many experts, the choice of management strategy for glaucoma is still controversial. …”
Get full text
Article -
4517
The role of the family environment and parental nutritional knowledge in the prevention of behavioral feeding disorders in toddlers and preschool children – a narrative review
Published 2024-07-01“…Sensory-based food education also generates positive outcomes by increasing children’s intake of fruits and vegetables, and this approach should be used to prevent selective eating. According to experts, parents can use various strategies to familiarize children with food. …”
Get full text
Article -
4518
Understanding the use of patient-reported data by health care insurers: A scoping review.
Published 2020-01-01“…Relevant grey literature was identified through online searches, reference mining and recommendations from experts. Forty-two documents were included. We synthesized the evidence on the uses of patient-reported data by insurers following a structure-process-outcome approach; we also mapped the use and function of those data by a health insurer.…”
Get full text
Article -
4519
Test Items Validation in the Context of Education Export
Published 2020-07-01“…It was analyzed by five independent experts, who work as teachers of organic chemistry. …”
Get full text
Article -
4520
Deep learning vulnerability detection method based on optimized inter-procedural semantics of programs
Published 2023-12-01“…In recent years, software vulnerabilities have been causing a multitude of security incidents, and the early discovery and patching of vulnerabilities can effectively reduce losses.Traditional rule-based vulnerability detection methods, relying upon rules defined by experts, suffer from a high false negative rate.Deep learning-based methods have the capability to automatically learn potential features of vulnerable programs.However, as software complexity increases, the precision of these methods decreases.On one hand, current methods mostly operate at the function level, thus unable to handle inter-procedural vulnerability samples.On the other hand, models such as BGRU and BLSTM exhibit performance degradation when confronted with long input sequences, and are not adept at capturing long-term dependencies in program statements.To address the aforementioned issues, the existing program slicing method has been optimized, enabling a comprehensive contextual analysis of vulnerabilities triggered across functions through the combination of intra-procedural and inter-procedural slicing.This facilitated the capture of the complete causal relationship of vulnerability triggers.Furthermore, a vulnerability detection task was conducted using a Transformer neural network architecture equipped with a multi-head attention mechanism.This architecture collectively focused on information from different representation subspaces, allowing for the extraction of deep features from nodes.Unlike recurrent neural networks, this approach resolved the issue of information decay and effectively learned the syntax and semantic information of the source program.Experimental results demonstrate that this method achieves an F1 score of 73.4% on a real software dataset.Compared to the comparative methods, it shows an improvement of 13.6% to 40.8%.Furthermore, it successfully detects several vulnerabilities in open-source software, confirming its effectiveness and applicability.…”
Get full text
Article