Showing 421 - 440 results of 451 for search '(source OR sources) descriptive framework', query time: 0.17s Refine Results
  1. 421

    The Hobbit in prose and comics: exploring intersemiotic relations by Caio Henrique Medeiros Sousa, Cláudio Augusto Carvalho Moura, Josivan Antonio do Nascimento

    Published 2025-04-01
    “…By comparing these theoretical frameworks with the characteristics of both works, we aimed to determine the most accurate description of their relationship. …”
    Get full text
    Article
  2. 422

    PERFORMANCE REFINEMENT OF CONVOLUTIONAL NEURAL NETWORK ARCHITECTURES FOR SOLVING BIG DATA PROBLEMS by Saud Aljaloud

    Published 2023-02-01
    “… The use of more examples than contrasted ones to compare neural network frameworks through using the MNIST database is considered a good research method. …”
    Get full text
    Article
  3. 423

    Issues of Developing the Socio-Philosophical Foundations of the Educational Space by Yu. Zhang, S. N. Tsaplin, I. V. Yakovleva

    Published 2025-04-01
    “…This need requires clarifying how and in what way, with the help of rational philosophical thought, it is possible and necessary to develop a methodology that unites the categorical apparatus of numerous educational systems.Methodology and sources. The description of the unified categorical foundations of the educational space is carried out in the ontological, epistemological and axiological content of the priorities represented by the modern educational space.Results and discussion. …”
    Get full text
    Article
  4. 424

    Implementation and effectiveness of transgender stigma reduction interventions in sub-Saharan Africa: a scoping review by Patience A. Muwanguzi, Paul K. Otiku, Racheal Nabunya, Blessings Gausi

    Published 2023-03-01
    “…Second, while two studies incorporated conceptual frameworks, they did not show how the frameworks guided the study. …”
    Get full text
    Article
  5. 425

    Overview of detection techniques for malicious social bots by Rong LIU, Bo CHEN, Ling YU, Ya-shang LIU, Si-yuan CHEN

    Published 2017-11-01
    “…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
    Get full text
    Article
  6. 426

    Overview of detection techniques for malicious social bots by Rong LIU, Bo CHEN, Ling YU, Ya-shang LIU, Si-yuan CHEN

    Published 2017-11-01
    “…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
    Get full text
    Article
  7. 427

    Supply Chain Practices and Performance of Institutions: A Case Study of Hotloaf Bakery in Kabale Municipality. by Asiimwe, Elias

    Published 2023
    “…A descriptive research design was used and data was collected using interviews and questionnaires. …”
    Get full text
    Thesis
  8. 428

    Proactive planning for contextual fit: the role of the implementation premortem by Guillermo M. Wippold, Kaylyn A. Garcia, Ariel Domlyn, Dylan Wong, Maria E. Fernandez

    Published 2025-08-01
    “…Methods and Results This manuscript contains: (1) the history and underpinning theories behind the implementation premortem; (2) a description of the implementation premortem – a tool that can be used prospectively in conjunction with existing tools to proactively promote contextual fit of implementation strategies; (3) an example of an implementation premortem; (4) useful frameworks to use when analyzing data derived from an implementation premortem; and (5) challenges and limitations of the implementation premortem. …”
    Get full text
    Article
  9. 429
  10. 430

    War and its impact on farmers' crop and livestock productivity in south Wollo zone, northeastern Ethiopia by Aleme Asresie, Ali Seid, Seid Hussen Muhie, Seid Hassen

    Published 2025-03-01
    “…Data were gathered through questionnaires, key informant interviews and focus group discussions, utilizing both primary and secondary sources. Quantitative data were analyzed using SAS software, while qualitative data were analyzed descriptively and narratively. …”
    Get full text
    Article
  11. 431

    Re-use of Building Products in the Netherlands by Loriane Icibaci

    Published 2019-01-01
    “…The Industrial Ecology concept provides a system’s perspective and the foundation of this study’s methodological framework to answer the main research question. It postulates that the internal relations of the industrial process, as well as relations that go beyond the industrial boundary, are sources of perturbations in the natural system, which is driven by human activities and motivate changes in material and substance flows by demand for services provided by products. …”
    Get full text
    Article
  12. 432

    Compliance with Global Best Practices by Garment Producers in Ghana by Stella Daah Siaw, Ebenezer Kofi Howard, Ninette Afi Appiah, Cynthia Akua Chichi, Benjamin Kwablah Asinyo

    Published 2025-07-01
    “… Purpose: This study investigates the level of compliance with global best practices among garment producers in Ghana, with a specific focus on sourcing compliance, production compliance, and distribution compliance. …”
    Get full text
    Article
  13. 433

    Microplastics in food products: Prevalence, artificial intelligence based detection, and potential health impacts on humans by M. Amin Mir, Muhammad Azhar Ali Khan, Bimal Krishna Banik, Syed M. Hasnain, Lina Alzayer, K. Andrews, Sani I. Abba

    Published 2025-06-01
    “…This review provides a comprehensive description of the sources, detection methods, and health risks associated with microplastics in food. …”
    Get full text
    Article
  14. 434

    Advances and prospect in natural beauty evaluation: insights for the World Heritage karst by Xi Zhao, Kangning Xiong, Meng Zhang

    Published 2024-10-01
    “…The combination of traditional and emerging technologies such as SD method, SBE method, AHP method, neuroscience, and UGC data has increased, breaking through time and space constraints and expanding data sources. (4) In future studies, the assessment of natural beauty should concentrate on aesthetic preferences across diverse cultural contexts, develop a concept of global localization, and enhance evaluators' aesthetic perception through multisensory integration. …”
    Get full text
    Article
  15. 435

    CancerClarity app: Enhancing cancer data visualization with AI-generated narratives by Edgar Munoz, Alexander D. VanHelene, Nuen Tsang Yang, Amelie G. Ramirez

    Published 2025-12-01
    “…Converting quantitative cancer statistics to narrative descriptions using large language models (LLMs) may help cancer centers communicate complex cancer data more effectively to diverse stakeholders.Methods: The CancerClarity app employs LLM prompting within the R Shiny web framework, sourcing data from Cancer InFocus. …”
    Get full text
    Article
  16. 436

    A Systematic Review of Ebola Treatment Trials to Assess the Extent to Which They Adhere to Ethical Guidelines. by Thomas Richardson, Andrew McDonald Johnston, Heather Draper

    Published 2017-01-01
    “…<h4>Methods and findings</h4>Data sources: MEDBASE and EMBASE databases were searched using a specific search strategy. …”
    Get full text
    Article
  17. 437

    Evaluation of the soft error assessment consistency of a JIT‐based virtual platform simulator by Geancarlo Abich, Rafael Garibotti, Vitor Bandeira, Felipe da Rosa, Jonas Gava, Felipe Bortolon, Guilherme Medeiros, Fernando G. Moraes, Ricardo Reis, Luciano Ost

    Published 2021-03-01
    “…Campaigns consider different open‐source and commercial compilers as well as real software stacks including FreeRTOS/Linux kernels and 52 applications. …”
    Get full text
    Article
  18. 438

    flexZhouse by Mohd Zairul

    Published 2017-01-01
    “…A series of focus groups and other data sources showed that the need for housing customization is high and widely acknowledged by the target group. …”
    Get full text
    Article
  19. 439

    Relationship between cricket participation, health and well-being: scoping review protocol by Nigel K Arden, Garrett Scott Bullock, Nirmala K Panagodage-Perera, Stephanie R Filbay

    Published 2019-11-01
    “…The methodology of this paper was informed by previous scoping review protocols and best practice methodological frameworks. MEDLINE, CINAHL, Embase, Scopus, PsycINFO, SPORTDiscus, Cochrane Library, EBSCO, Web of Science and PEDro and grey literature sources (Google Scholar, ClinicalTrials.gov, ISRCTN Registry and ProQuest) will be systematically searched. …”
    Get full text
    Article
  20. 440

    An Examination and Critique of Bottom-Up Causation in the Interpretation of Free Will, Focusing on the Non-Reductionist Approach by Tayybhe Gholami, Zahra khazaei

    Published 2025-05-01
    “…This study aims to examine and critique bottom-up causation in the interpretation of free will through a descriptive-analytical approach and from the perspective of a non-reductionist approach. …”
    Get full text
    Article