Suggested Topics within your search.
Suggested Topics within your search.
- Appreciation 2
- Experimental fiction 2
- History and criticism 2
- Swahili fiction 2
- Swahili literature 2
- Themes, motives 2
- Academic achievement 1
- Behavior modification 1
- Classroom management 1
- Connecting with others 1
- Domestic relations 1
- Economic conditions 1
- Education and state 1
- Education, Humanistic 1
- Fiction 1
- Genocide (International law) 1
- Inclusive education 1
- International criminal law 1
- Knowing yourself 1
- LAW / International 1
- Microbiology 1
- Motivation in education 1
- Neoliberalism 1
- Politicians 1
- Sex role 1
- Social conditions 1
- Social skills 1
- Study and teaching 1
- Teenage girls 1
- Torts 1
-
25881
Teacher rewards and their performance: a case study of selected secondary schools in southern division, Kabale municipality
Published 2023“…Teachers’ performance management is a continuous process for identifying, evaluating and developing the work performance of teachers, so that the goals and objectives of the schools are more effectively achieved, while at the same time benefiting teachers. …”
Get full text
Article -
25882
Designing a model of institutionalization of organizational culture based on synergy in the tourism holding of Parsian Hotels Group
Published 2024-09-01“…The perfection and growth of the organization depends on how to perform the duties and responsibilities of all units in order to achieve the goals of the organization (He & etal., 2019). …”
Get full text
Article -
25883
Investigating effective factors in the model of high organizational commitment in government organizations in charge of educational and cultural affairs
Published 2024-06-01“…Organizational commitment is one of the basic elements in achieving organizational goals, and having committed employees in any business will lead to significant results in achieving these goals (Riyanto et al, 2021). …”
Get full text
Article -
25884
Dealing with Complexity – Knowledge, design, and management of the built environment
Published 2024-12-01“…How do we identify those with the best cost/benefit ratio capable of producing synergies to achieve the largest possible number of the Sustainable Development Goals promoted by the United Nations? …”
Get full text
Article -
25885
Contribution of flood early warning response measures in reducing flood effects in Kilosa District, Tanzania
Published 2025-01-01“…However, improving the dissemination of warnings is crucial. This can be achieved by building community capacity to use a variety of traditional channels and tools including drums, whistles and cow horns. …”
Get full text
Article -
25886
Vegetable Crop Growth Modeling in Digital Twin Platform Based on Large Language Model Inference
Published 2024-11-01“…The LLM-based model achieved 98% accuracy in predicting crop growth degrees and a 99.7% accuracy in identifying growth stages. …”
Get full text
Article -
25887
Geopolitical (non) opportunities vs. "late" response of the foreign political service of North Macedonia in the process of European integration
Published 2024-01-01“…In the paper, four determinants were singled out, on the basis of which explanations were provided, in a scientific and research context, why the foreign policy mechanism of North Macedonia "failed" in the process of achieving defined foreign policy goals, above all the basic goal - the country's accession to the European Union. …”
Get full text
Article -
25888
Recurrent adenoid cystic carcinoma of the left upper palate accompanied by massive maxillary hemorrhage: a case report and literature review
Published 2025-01-01“…Results Through the MDT model, the patient successfully achieved emergency hemostasis, and normal vital signs were restored. …”
Get full text
Article -
25889
Effect of gender on the ocular surface after trabeculectomy
Published 2023-08-01“…Restarting IOP-lowering medications in partial success and failure of trabeculectomy eliminates the improvement of ocular surface condition achieved during the drug-free period as early as after 6 months. …”
Get full text
Article -
25890
Presenting a Framework of Effective Factors on the Implementation of Policies in the Field of Protection and Exploitation of Forests in the North of the Country
Published 2024-11-01“…In the qualitative section, the study engaged 14 experts with substantial experience in the field, achieving theoretical saturation after conducting in-depth interviews with 12 of these participants. …”
Get full text
Article -
25891
Predicted impact of banning nonessential, energy-dense food and beverages in schools in Mexico: A microsimulation study.
Published 2024-05-01“…<h4>Conclusions</h4>Even in the most conservative scenario, banning sales of NEDFBs in schools is expected to significantly reduce obesity, but achieving high compliance will be key to its success.…”
Get full text
Article -
25892
Development of a clinical decision support tool for Primary care Management of lower Urinary tract Symptoms in men: the PriMUS study
Published 2025-01-01“…At a threshold of 53.3%, a specificity of 75.5% could be achieved with a sensitivity of 71.3% approximately. …”
Get full text
Article -
25893
Meta-analysis of MitraClip and PASCAL for transcatheter mitral edge-to-edge repair
Published 2025-01-01“…The statistical analysis revealed no significant difference between the two devices in achieving a two-grade reduction in MR severity (RR = 0.95; 95% CI: [0.86, 1.04]; p = 0.28), one-grade reduction (RR = 1.17; 95% CI: [0.92, 1.49]; p = 0.19), or in cases with no improvement (RR = 1.23; 95% CI: [0.79, 1.90]; p = 0.36). …”
Get full text
Article -
25894
Carrier-independent deep optical watermarking algorithm
Published 2022-08-01“….), so that the carrier carries the identification information but does not affect the normal use of the carrier.The common digital watermark embedding scheme is to embed the watermark information by modifying the carrier via specific algorithms.In the actual application scenarios, there are many images or objects to be protected (such as art paintings, etc.) that are not allowed to be modified.Based on this background, a new carrier-independent deep optical watermarking algorithm was proposed, which can realize watermark information embedding without modifying the original carrier and achieve the purpose of copyright protection.Specifically, a new watermark template expression scheme at the embedding end was proposed, which expressed the watermark information by visible light modulation.By analyzing the visual system of human eyes, a watermark template pattern based on alternating projection was proposed to embed the watermark information, which made the embedding process neither require modification of the original carrier nor affect the visual senses of human eyes.At the extraction end, a watermark extraction network based on residual connection was designed, and the captured watermarked images were fed into this network after perspective transformation to extract the watermark information.The experiments were conducted under various conditions and comparisons with three baseline algorithms were made.The experimental results show that the proposed algorithm generates watermarked images with less visual distortion and is robust to the &quot;projecting-shooting&quot; process.The watermark extraction network has high accuracy in extracting watermark information at different distances, angles and illumination conditions, and has certain advantages over other general networks.…”
Get full text
Article -
25895
Data recommendation algorithm of network security event based on knowledge graph
Published 2023-12-01“…To address the difficulty faced by network security operation and maintenance personnel in timely and accurate identification of required data during network security event analysis, a recommendation algorithm based on a knowledge graph for network security events was proposed.The algorithm utilized the network threat framework ATT&amp;CK to construct an ontology model and establish a network threat knowledge graph based on this model.It extracted relevant security data such as attack techniques, vulnerabilities, and defense measures into interconnected security knowledge within the knowledge graph.Entity data was extracted based on the knowledge graph, and entity vectors were obtained using the TransH algorithm.These entity vectors were then used to calculate data similarity between entities in network threat data.Disposal behaviors were extracted from literature on network security event handling and treated as network security data entities.A disposal behavior matrix was constructed, and the behavior matrix enabled the vector representation of network threat data.The similarity of network threat data entities was calculated based on disposal behaviors.Finally, the similarity between network threat data and threat data under network security event handling behavior was fused to generate a data recommendation list for network security events, which established correlations between network threat domains based on user behavior.Experimental results demonstrate that the algorithm performs optimally when the fusion weight α=7 and the recommended data volume K=5, achieving a recall rate of 62.37% and an accuracy rate of 68.23%.By incorporating disposition behavior similarity in addition to data similarity, the algorithm better represents factual disposition behavior.Compared to other algorithms, this algorithm exhibits significant advantages in recall rate and accuracy, particularly when the recommended data volume is less than 10.…”
Get full text
Article -
25896
Comparison of Active Aging Indicators and Associated Factors Among Urban and Rural Elderly in Behshahr, Iran (2023)
Published 2024-12-01“…Participants with higher education levels and income also achieved significantly greater scores. In contrast, an increase in age and the number of children was associated with a notable reduction in the Active Aging Index score (P<0.05). …”
Get full text
Article -
25897
Design of a TSR-based project learning strategy for biochemistry undergraduate teaching and research labs: a case study
Published 2025-01-01“…Five specific strategies have been developed to achieve students’ highest potentials. (i) This lab exercise is designed as a project-oriented learning approach. …”
Get full text
Article -
25898
Using a Mobile Health App (ColonClean) to Enhance the Effectiveness of Bowel Preparation: Development and Usability Study
Published 2025-01-01“…ResultsThe results showed that 75% (30/40) of participants achieved an “excellent” or “good” level of BP according to the Aronchick Bowel Preparation Scale. …”
Get full text
Article -
25899
VRU-YOLO: A Small Object Detection Algorithm for Vulnerable Road Users in Complex Scenes
Published 2025-01-01“…Moreover, in a generalization test conducted on the remote sensing small target dataset VisDrone2019, the VRU-YOLO model achieved an mAP50 of 31%. This study demonstrates that the improved model offers more efficient performance in small object detection scenarios, making it well-suited for VRU detection in complex road environments.…”
Get full text
Article -
25900
M-Mode in grade 3 dyspneic patients assessment
Published 2024-01-01“…However, it is very challenging to make an accurate diagnosis in this domain. To clinically achieve higher accuracy during the diagnostic process, our study uses motion-mode (M-MODE) echo parameters. …”
Get full text
Article