-
421
The Hobbit in prose and comics: exploring intersemiotic relations
Published 2025-04-01“…By comparing these theoretical frameworks with the characteristics of both works, we aimed to determine the most accurate description of their relationship. …”
Get full text
Article -
422
PERFORMANCE REFINEMENT OF CONVOLUTIONAL NEURAL NETWORK ARCHITECTURES FOR SOLVING BIG DATA PROBLEMS
Published 2023-02-01“… The use of more examples than contrasted ones to compare neural network frameworks through using the MNIST database is considered a good research method. …”
Get full text
Article -
423
Issues of Developing the Socio-Philosophical Foundations of the Educational Space
Published 2025-04-01“…This need requires clarifying how and in what way, with the help of rational philosophical thought, it is possible and necessary to develop a methodology that unites the categorical apparatus of numerous educational systems.Methodology and sources. The description of the unified categorical foundations of the educational space is carried out in the ontological, epistemological and axiological content of the priorities represented by the modern educational space.Results and discussion. …”
Get full text
Article -
424
Implementation and effectiveness of transgender stigma reduction interventions in sub-Saharan Africa: a scoping review
Published 2023-03-01“…Second, while two studies incorporated conceptual frameworks, they did not show how the frameworks guided the study. …”
Get full text
Article -
425
Overview of detection techniques for malicious social bots
Published 2017-11-01“…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
Get full text
Article -
426
Overview of detection techniques for malicious social bots
Published 2017-11-01“…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
Get full text
Article -
427
Supply Chain Practices and Performance of Institutions: A Case Study of Hotloaf Bakery in Kabale Municipality.
Published 2023“…A descriptive research design was used and data was collected using interviews and questionnaires. …”
Get full text
Thesis -
428
Proactive planning for contextual fit: the role of the implementation premortem
Published 2025-08-01“…Methods and Results This manuscript contains: (1) the history and underpinning theories behind the implementation premortem; (2) a description of the implementation premortem – a tool that can be used prospectively in conjunction with existing tools to proactively promote contextual fit of implementation strategies; (3) an example of an implementation premortem; (4) useful frameworks to use when analyzing data derived from an implementation premortem; and (5) challenges and limitations of the implementation premortem. …”
Get full text
Article -
429
Cervical ripening at home or in hospital during induction of labour: the CHOICE prospective cohort study, process evaluation and economic analysis
Published 2024-12-01“…Survey data were reported using descriptive statistics and qualitative data were analysed using a thematic framework. …”
Get full text
Article -
430
War and its impact on farmers' crop and livestock productivity in south Wollo zone, northeastern Ethiopia
Published 2025-03-01“…Data were gathered through questionnaires, key informant interviews and focus group discussions, utilizing both primary and secondary sources. Quantitative data were analyzed using SAS software, while qualitative data were analyzed descriptively and narratively. …”
Get full text
Article -
431
Re-use of Building Products in the Netherlands
Published 2019-01-01“…The Industrial Ecology concept provides a system’s perspective and the foundation of this study’s methodological framework to answer the main research question. It postulates that the internal relations of the industrial process, as well as relations that go beyond the industrial boundary, are sources of perturbations in the natural system, which is driven by human activities and motivate changes in material and substance flows by demand for services provided by products. …”
Get full text
Article -
432
Compliance with Global Best Practices by Garment Producers in Ghana
Published 2025-07-01“… Purpose: This study investigates the level of compliance with global best practices among garment producers in Ghana, with a specific focus on sourcing compliance, production compliance, and distribution compliance. …”
Get full text
Article -
433
Microplastics in food products: Prevalence, artificial intelligence based detection, and potential health impacts on humans
Published 2025-06-01“…This review provides a comprehensive description of the sources, detection methods, and health risks associated with microplastics in food. …”
Get full text
Article -
434
Advances and prospect in natural beauty evaluation: insights for the World Heritage karst
Published 2024-10-01“…The combination of traditional and emerging technologies such as SD method, SBE method, AHP method, neuroscience, and UGC data has increased, breaking through time and space constraints and expanding data sources. (4) In future studies, the assessment of natural beauty should concentrate on aesthetic preferences across diverse cultural contexts, develop a concept of global localization, and enhance evaluators' aesthetic perception through multisensory integration. …”
Get full text
Article -
435
CancerClarity app: Enhancing cancer data visualization with AI-generated narratives
Published 2025-12-01“…Converting quantitative cancer statistics to narrative descriptions using large language models (LLMs) may help cancer centers communicate complex cancer data more effectively to diverse stakeholders.Methods: The CancerClarity app employs LLM prompting within the R Shiny web framework, sourcing data from Cancer InFocus. …”
Get full text
Article -
436
A Systematic Review of Ebola Treatment Trials to Assess the Extent to Which They Adhere to Ethical Guidelines.
Published 2017-01-01“…<h4>Methods and findings</h4>Data sources: MEDBASE and EMBASE databases were searched using a specific search strategy. …”
Get full text
Article -
437
Evaluation of the soft error assessment consistency of a JIT‐based virtual platform simulator
Published 2021-03-01“…Campaigns consider different open‐source and commercial compilers as well as real software stacks including FreeRTOS/Linux kernels and 52 applications. …”
Get full text
Article -
438
flexZhouse
Published 2017-01-01“…A series of focus groups and other data sources showed that the need for housing customization is high and widely acknowledged by the target group. …”
Get full text
Article -
439
Relationship between cricket participation, health and well-being: scoping review protocol
Published 2019-11-01“…The methodology of this paper was informed by previous scoping review protocols and best practice methodological frameworks. MEDLINE, CINAHL, Embase, Scopus, PsycINFO, SPORTDiscus, Cochrane Library, EBSCO, Web of Science and PEDro and grey literature sources (Google Scholar, ClinicalTrials.gov, ISRCTN Registry and ProQuest) will be systematically searched. …”
Get full text
Article -
440
An Examination and Critique of Bottom-Up Causation in the Interpretation of Free Will, Focusing on the Non-Reductionist Approach
Published 2025-05-01“…This study aims to examine and critique bottom-up causation in the interpretation of free will through a descriptive-analytical approach and from the perspective of a non-reductionist approach. …”
Get full text
Article