Suggested Topics within your search.
Suggested Topics within your search.
- Effective teaching 2
- Elementary school teaching 2
- Quality of life 2
- Social conditions 2
- Social problems 2
- ART / Digital 1
- Artificial intelligence 1
- Business 1
- Business communication 1
- Business ethics 1
- Child welfare 1
- Communication of technical information 1
- Computer animation 1
- Computer programs 1
- Criminal law 1
- Cultural policy 1
- Cultural property 1
- Custody of children 1
- Digital cinematography 1
- Electronic spreadsheets 1
- Evidence (Law) 1
- Executive coaching 1
- Family assessment 1
- Family psychotherapy 1
- Foreign Exchange Rates 1
- Forensic child psychology 1
- Historic preservation 1
- Human geography 1
- Industrial design 1
- Intelligent control systems 1
-
1481
Energy policy of the Republic of Turkey: expansion in the Eastern Mediterranean
Published 2023-05-01“…The article also emphasizes that the unresolved important interstate problems in the Eastern Mediterranean and Turkey’s active policy in this region opens up new opportunities for the Russian oil and gas business, which require their own balanced expert assessment.…”
Get full text
Article -
1482
A SUSTAINABLE PRODUCT IN VIEW OF TECHNICAL PARTS AND COMPONENTS OF A MEANS OF AGRICULTURAL TRANSPORT
Published 2024-06-01“…In the next stage, within the theoretical and design layer – following literature review and expert research – a research tool in the form of an evaluation sheet was created. …”
Get full text
Article -
1483
Innovative approaches to optimizing taxation in organizations
Published 2024-06-01“…System approach, analysis and synthesis, as well as the method of expert evaluations method have been applied as the research methods.…”
Get full text
Article -
1484
Evaluation method of penetrating jamming effectiveness for cognitive communication protection
Published 2023-11-01“…In order to support the implementation of “multidimensional orthogonal configured communication protection between communication modules as well as parameters and interference” in cognitive communication countermeasures scenarios, jamming effectiveness requires module level responsiveness.A penetrating jamming effectiveness evaluation method was proposed.Firstly, the core parameters of each signal processing module were selected as evaluation parameters.Secondly, analytic hierarchy process (AHP) and entropy weight method (EWM) were used to determine the weight of indicators.The coordination problem in AHP was solved through expert weight allocation, and the weight allocation problem in EWM was solved through non-uniform mapping.Finally, the subjective and objective weights were weighed through game theory, and the jamming effectiveness was judged by the technique for order preference by similarity to ideal solution (TOPSIS).By conducting evaluation experiments on the jamming performance of the Link16 data link, taking into account multiple aspects such as jamming types, number of jamming frequencies, jamming duration, and system types.Experiment results demonstrate that the penetration-based jamming performance evaluation method not only provides a more intuitive representation of the relationship between evaluation results and metric parameters, but also possesses excellent jamming discrimination capability.…”
Get full text
Article -
1485
A new method for assessing the health status of aerospace equipment based on a belief rule base with balanced accuracy and complexity
Published 2025-01-01“…Belief rule base (BRB) is an effective method for assessing health status that combines expert knowledge and historical data. However, in the actual assessment, the data provided by experts only form the basic framework of the model. …”
Get full text
Article -
1486
Aspekty proceduralne sprawy Gorgonowej
Published 2024-05-01“…The Gorgonowa trial was also important for the popularisation of the practice of using expert medical opinion evidence by Polish courts. …”
Get full text
Article -
1487
Development of medication reminder WhatsApp Bot application to improve medication adherence in pregnant women with hypertension
Published 2025-01-01“…Method: This study employed Research and development, which consisted of four stages: Literature Study, Development Stage, Validity Expert, and Trial. Results: A system that health workers can use in primary health facilities to remind them when to take medication has been successfully created. …”
Get full text
Article -
1488
Citrus diseases detection using innovative deep learning approach and Hybrid Meta-Heuristic.
Published 2025-01-01“…Traditional manual disease diagnosis is not only slow, less accurate, and expensive but also relies heavily on expert intervention. To address these issues, this research examines the implementation of an automated disease classification system using deep learning and optimal feature selection. …”
Get full text
Article -
1489
INCLUSION OF THE RUSSIAN HIGHER EDUCATION SYSTEM INTO THE EUROPEAN HIGHER EDUCATION AREA
Published 2016-12-01“…The article highlights the main factors affecting the inclusion of the Russian higher education system into the European Higher Education Area focusing onthe preparation of the Russian Federation National Report for the upcoming EHEA Ministerial Conference(that will take place in Yerevan, Armenia in 2015) which is carried out within the framework of the project “Expert and analytical support of the inclusion of the Russian higher education system into European Higher Education Area withdue consideration of the European practice of integration of education and labor market and of the network form of educational programs” of the Federal Target Program for the Development of Education in 2011-2015.The article presents an information about methodological and information analysis network Centre established atthe Faculty of Economics, Lomonosov Moscow State University for the development of mechanismsof implementation and dissemination of the best practices of higher education institutions, for organizing training events, consultations and dissemination of the experience on various issues of the inclusion of the Russian higher education system into European Higher Education Area.…”
Get full text
Article -
1490
Reforming the Departmental Higher Education Institutions: A Critical Analysis
Published 2019-09-01“…The results of the reform of Russian higher education widely discussed among the pedagogical and expert community are characterized by the ambiguity and inconsistency of assessments. …”
Get full text
Article -
1491
The Lithuanian historian Jerzy Orda
Published 1997-12-01“…He was well known both as an expert in the history of the Grand Duchy of Lithuania, the history and architecture of Vilnius, and a Lithuanian archivist and archeographer. …”
Get full text
Article -
1492
Access to Business Development Support Services and Performance of Youth-Owned Enterprises in Tanzania
Published 2015-01-01“…With the support of the resource-based view, we found that access to expert advice is positively associated with a YOE’s number of employees and their ability to keep financial records. …”
Get full text
Article -
1493
Development and validation of questionnaire to assess preschool teachers’ knowledge, attitude, and self-efficacy on performing first-aid in children
Published 2024-06-01“…The questionnaire, initially comprising 40 items across three domains (knowledge, attitude, and self-efficacy), was derived from extensive literature review, guidelines, and expert suggestions. Evaluation was performed by eight experts and initial testing conducted on preschool teachers which resulted in a final version with 34 items —18 for knowledge, 4 for attitude, and 12 for self-efficacy—demonstrating strong content and face validity. …”
Get full text
Article -
1494
Host security assessment method based on attack graph
Published 2022-02-01“…In order to solve the problems of inaccurate calculation of host security value and ignoring host correlation in attack graph, a host security assessment method based on attack graph was proposed.First, the host attack graph was generated to quantify the atomic attack probability and the attack probability of the host was calculated from four perspectives, such as vulnerability itself, time, environment and operational system availability.Then, the host assets importance was calculated according to expert transcendental evaluation and correlation weighting method, and the topology importance of host was calculated according to the association relationship between hosts in attack graph.Finally, the host security value was calculated according to the impact value of host vulnerability, host importance and host attack probability.The experimental results show that the importance and security value of the proposed method accord with the real network situation and can reflect the security condition of the host more completely and accurately.The standard deviation of host safety value obtained by the proposed method is 0.078, which is larger than that obtained by other methods, indicating that the safety value obtained by the proposed method is more discrete and easier to distinguish the safety level from the subsequent risk disposal priority.…”
Get full text
Article -
1495
Awareness and Use of Electronic Resources by Undergraduate Students at Kabale University, Uganda
Published 2020“…However, the major challenge undergraduates face with the use of electronic resources is lack of adequate training, followed by lack of expert help while some others complained of slow internet connectivity.…”
Get full text
Article -
1496
Designing a Future Study Model: Examining Bank Employees’ Attitudes Towards Job Security in the Era of Blockchain Technology (Horizon 2031)
Published 2024-12-01“…The dimensions and indicators were then selected based on expert opinions and distributed in a questionnaire format. …”
Get full text
Article -
1497
-
1498
Жиророзчинні вітаміни, їхнє значення в обмінних процесах, рості та розвитку дітей різного віку
Published 2024-09-01Get full text
Article -
1499
-
1500