Showing 5,381 - 5,400 results of 17,304 for search '"random"', query time: 0.09s Refine Results
  1. 5381

    Evaluasi Portal Berita Online pada Aspek Usability Menggunakan Heurtistic Evaluation dan Think Aloud by Putu Tantri Fajarini, Ni Kadek Ayu Wirdiani, I Putu Arya Dharmaadi

    Published 2020-10-01
    “…Usability evaluation in this study used 20 research respondents who were selected using simple random sampling from readers and news portal staff who were evaluated. …”
    Get full text
    Article
  2. 5382

    Levels of Digital Inequality and The Process of Adaptation to Digital Culture by Ali Şimşek, Furkan Sürün

    Published 2024-06-01
    “…The survey form was administered to collect data from 504 participants selected from the population by random sampling. Semi-structured interviews were carried out with 8 participants who are considered capable of providing detailed information on the subject. …”
    Get full text
    Article
  3. 5383

    Friend Recommender System for Social Networks Based on Stacking Technique and Evolutionary Algorithm by Aida Ghorbani, Amir Daneshvar, Ladan Riazi, Reza Radfar

    Published 2022-01-01
    “…To learn the model in the objective function of the particle swarm algorithm, a hybrid system based on stacking is proposed. In this method, two random forests and Extreme Gradient Boosting (XGBoost) had been used as the base classifiers. …”
    Get full text
    Article
  4. 5384

    Analysis and Prediction of the Interval Duration between the First and Second Accidents considering the Spatiotemporal Threshold by Fang Liu, Lanlan Zheng, Mingyang Li, Jinjun Tang

    Published 2022-01-01
    “…Then, on the basis of using Kaiser-Meyer-Olkin (KMO) measure and Bartlett’s sphere test statistics to ensure the applicability of the data to the factor analysis method, the explanatory variables that can significantly affect the interval duration are obtained through the factor analysis method. Finally, the random forest model (RF), which combines the advantages of machine learning methods, is employed to predict the duration of the interval. …”
    Get full text
    Article
  5. 5385

    Comparative effectiveness of aripiprazole and olanzapine on neurocognitive profile of patients with schizophrenia by Sanya Sharma, Ajeet Sidana, Shivangi Mehta, Manoj Kumar Bajaj

    Published 2023-10-01
    “…Patients with schizophrenia as per the Diagnostic and Statistical Manual of Mental Disorders, Fifth Edition (DSM-5), were assessed on Brief Psychiatric Rating Scale (BPRS), Positive and Negative Syndrome Scale (PANSS), and neuropsychological tests at baseline. Patients were randomly assigned to aripiprazole (10–30 mg per day, orally) and olanzapine (5–20 mg per day, orally) groups on the basis of computer-generated random table number. …”
    Get full text
    Article
  6. 5386

    Application of Health Education Based on Phased Transition Theory Model in Continuous Nursing for Patients with Inflammatory Bowel Disease by Hongmei Xiao, Jun Ye

    Published 2022-01-01
    “…A total of 106 patients with IBD admitted to the hospital were enrolled as the research objects between October 2020 and September 2021. According to random number table method, they were divided into observation group and control group, 53 cases in each group. …”
    Get full text
    Article
  7. 5387
  8. 5388

    Analysis of the Performance of Different Types of PV Panels in Spring and Summer Using Regression Methods by Salim Kılıç, Ertuğrul Adıgüzel, Erkan Atmaca

    Published 2025-01-01
    “…The results were compared using the Root Mean Square Error (RMSE) and the coefficient of determination (R<sup>2</sup>). The Random Forest model demonstrated the greatest predictive success, while the Support Vector Regression (SVR) model exhibited the lowest performance.…”
    Get full text
    Article
  9. 5389

    Production risk of organic rice due to climate change in Magelang Regency, Central Java, Indonesia by Istiyanti Eni, Widowati Indah, Al Hasan Thohari

    Published 2025-01-01
    “…Respondents consisted of 75 organic rice farmers selected using simple random sampling methods. The data was taken through interviews based on questionnaires and documentation methods. …”
    Get full text
    Article
  10. 5390

    Finite-Time Synchronization of Fractional-Order Complex-Valued Multi-Layer Network via Adaptive Quantized Control Under Deceptive Attacks by Lulu Xu, Juan Yu, Cheng Hu, Kailong Xiong, Tingting Shi

    Published 2025-01-01
    “…This article investigates the problem of finite-time synchronization of fractional-order complex-valued random multi-layer networks without decomposing them into two real-valued systems. …”
    Get full text
    Article
  11. 5391

    Prevalence of anemia in Somalia: A systematic review and meta-analysis of 3988 participants by Yahye Ahmed Nageye, Abdirasak Sharif Ali Mude, Kizito Eneye Bello

    Published 2024-12-01
    “…A meta-analysis was performed on our eligible studies using the random effect model. Our search returned 13 eligible articles involving 3988 participants within Somalia. …”
    Get full text
    Article
  12. 5392

    La recolocación de monumentos dentro del juego de pelota como mecanismo de activación ritual durante el periodo Clásico maya by Octavio Quetzalcóatl Esparza Olguín, Rogelio Valencia Rivera

    Published 2020-06-01
    “…The reuse of stelae, located at special positions inside this architectonic context, mainly at the corners of the ballcourts and visible to the spectator, indicates that this relocation did not have a random or economical reason, such as reuse of these highly valuable materials as simple construction elements. …”
    Get full text
    Article
  13. 5393

    The effect of teacher leadership and school climate on students’ learning outcomes by Carolus Patampang, Patrio Tandiangga, Frans Fandy Palinoan

    Published 2024-05-01
    “…Sampling in this study was carried out by means of simple random sampling. The sample size was determined using Issac & Michael’s table. …”
    Get full text
    Article
  14. 5394

    From vulnerable to resilience: an assessment of small-scale fisheries livelihood in South Malang of Indonesia by Puji Handayati, Ahmad Munjin Nasih, Indah Susilowati, Idris, Prateep Kumar Nayak, Bagus Shandy Narmaditya

    Published 2025-01-01
    “…The data were obtained from small-scale fisheries in South Malang of Indonesia through questionnaires directed to the respondents using simple random sampling. The findings indicate that two main components (livelihood strategy and climate variability and natural disaster) were included in high vulnerability, while another two main components (sociodemographic and social network) were categorized as moderate vulnerability. …”
    Get full text
    Article
  15. 5395

    One Step Ahead Prediction of Ozone Concentration for Determination of Outdoor Air Quality Level by Ercan Avşar, Waleed Mahmood

    Published 2021-06-01
    “…The utilized machine learning methods are multilayer perception (MLP), Support Vector Regression (SVM), k-Nearest Neighbor (K-NN), Random Forests (RF), Gradient Boosting (GB), and Elastic Net (EN). …”
    Get full text
    Article
  16. 5396

    The influence of agricultural development initiatives on women's empowerment and their right of access to land in Burkina Faso: the case of the Bama plain by Akinni Raoul AKANRO, ZONOU Bienvenu, BOUGOUMA-YAMEOGO Valérie

    Published 2025-01-01
    “…Methodology:  The present study uses data collected from 230 people in the rural commune of Bama, including 130 women and 100 men, using the simple random sampling method. Results: Descriptive statistics were used to process the information. …”
    Get full text
    Article
  17. 5397

    Cyber security entity recognition method based on residual dilation convolution neural network by Bo XIE, Guowei SHEN, Chun GUO, Yan ZHOU, Miao YU

    Published 2020-10-01
    “…In recent years,cybersecurity threats have increased,and data-driven security intelligence analysis has become a hot research topic in the field of cybersecurity.In particular,the artificial intelligence technology represented by the knowledge graph can provide support for complex cyberattack detection and unknown cyberattack detection in multi-source heterogeneous threat intelligence data.Cybersecurity entity recognition is the basis for the construction of threat intelligence knowledge graphs.The composition of security entities in open network text data is very complex,which makes traditional deep learning methods difficult to identify accurately.Based on the pre-training language model of BERT (pre-training of deep bidirectional transformers),a cybersecurity entity recognition model BERT-RDCNN-CRF based on residual dilation convolutional neural network and conditional random field was proposed.The BERT model was used to train the character-level feature vector representation.Combining the residual convolution and the dilation neural network model to effectively extract the important features of the security entity,and finally obtain the BIO annotation of each character through CRF.Experiments on the large-scale cybersecurity entity annotation dataset constructed show that the proposed method achieves better results than the LSTM-CRF model,the BiLSTM-CRF model and the traditional entity recognition model.…”
    Get full text
    Article
  18. 5398

    Investigating Strategies for Mitigating and Avoiding Expert Blind Spot Development in Teaching English Attributive Adjectives by Farisani Thomas Nephawe

    Published 2023-06-01
    “…A questionnaire was used to collect data from 35 selected Grade 10 respondents using a simple random sampling technique. Qualitatively, semi-structured interviews were conducted on two purposely sampled schoolteachers from Dzindi Circuit, based on the researcher’s preference for obtaining an in-depth understating of the topic. …”
    Get full text
    Article
  19. 5399

    Maritime Pilots’ Risky Operational Behavior Analysis Based on Structural Equation Model by Tingliu Xu, Yingjie Xiao, Zhuohong Jiang

    Published 2021-01-01
    “…The biggest influence on maritime pilots’ safety behavior is crowd psychology, which indicates that the maritime pilot’s mental health course, the psychological guidance course system, the psychological health consultation management, and safety training should be carried out regularly. Random evaluation and attention are significantly correlated with the risky cognition of maritime pilots. …”
    Get full text
    Article
  20. 5400

    Chaotic Image Encryption Based on Running-Key Related to Plaintext by Cao Guanghui, Hu Kai, Zhang Yizhi, Zhou Jun, Zhang Xing

    Published 2014-01-01
    “…In the image encryption stage, by introducing random-feedback mechanism, the difficulty of breaking this scheme is increased. …”
    Get full text
    Article