-
1421
Victorian Designs of Industrial Desire
Published 2018-06-01“…This form of industrial education resulted in a training of the eye and the mind to operate according to non-mimetic, purely conceptual codes. …”
Get full text
Article -
1422
Indigenous practices for management of epilepsy by traditional healers in South Africa
Published 2022-10-01“…The data were analysed through the open coding data analysis method.Results. The traditional healers had different perspectives on the origins and treatment plans of epilepsy based on their knowledge of the disease and their training. …”
Get full text
Article -
1423
Pesticide Safety Miniposter: Protecting Yourself
Published 2012-10-01“…This poster will serve as a valuable training tool for new technicians and a refresher tool for pest managers. …”
Get full text
Article -
1424
THE LGBTQA INTERCOLLEGIATE ATHLETES’ EXPERIENCES IN HIGHER EDUCATION INSTITUTIONS IN THE PHILIPPINES: BASIS FOR AN INSTITUTIONAL INCLUSIVE SPORTS PLAN
Published 2022-11-01“…The study proposes an inclusive institutional sports plan to support fair gender treatment that underpins the revisiting or re-examining of institutional policies, strengthens inclusive codes of conduct, provides training on a gender-fair-environment, and recognizes several LGBTQA events and celebrations. …”
Get full text
Article -
1425
Pesticide Safety Miniposter: Protecting Yourself
Published 2012-10-01“…This poster will serve as a valuable training tool for new technicians and a refresher tool for pest managers. …”
Get full text
Article -
1426
Automatic detection of expressed emotion from Five-Minute Speech Samples: Challenges and opportunities.
Published 2024-01-01“…The identification of EE is highly important as they have been linked with a range of adverse life events. Manual coding of these events requires time-consuming specialist training, amplifying the need for automated approaches. …”
Get full text
Article -
1427
Factors Influencing Telemedicine Adoption Among Health Care Professionals: Qualitative Interview Study
Published 2025-01-01“…The interview data were analyzed with deductive and inductive coding based on the EVF. Two coders conducted the coding process independently, achieving an intercoder reliability of 86.14%. …”
Get full text
Article -
1428
Identification of serum tRNA-derived small RNAs biosignature for diagnosis of tuberculosis
Published 2025-12-01“…The tRNA-derived small RNAs (tsRNAs) are a new class of non coding RNAs, which are stable in body fluids and can be used as potential biomarkers for disease diagnosis. …”
Get full text
Article -
1429
Barriers and facilitators to the integration of cervical cancer screening and treatment service with antiretroviral therapy follow-up clinics for women living with HIV in Northwest...
Published 2025-06-01“…Audio-recorded data were transcribed, translated, and coded, followed by thematic analysis using Atlas. …”
Get full text
Article -
1430
Exploring barriers and facilitators to capturing cancer stage at diagnosis in a population-based cancer registry: a cross-sectional survey of health information managers/clinical c...
Published 2025-04-01“…Results For HIM/CC, barriers related to the theoretical domains of (i) environmental context and resources, with 87% of participants agreeing required information was not readily available, (ii) knowledge, with 46% of participants agreeing they worry about incorrectly coding stage and (iii) skills, with 42% of participants agreeing they were not confident and 37% feeling they had inadequate training. …”
Get full text
Article -
1431
“May we not orchestrate our own misfortune”: a qualitative study on perception about causes and prevention of occupational injuries among bricklayers and carpenters in Osun State,...
Published 2025-06-01“…Verbatim transcription was done for FGD audios, the transcripts were coded and thematically analysed using the ATLAS.ti software. …”
Get full text
Article -
1432
Conceptual framework and responding approach of treatment burden of type 2 diabetes mellitus: A video recording-based qualitative analysis
Published 2024-04-01“…Methods: The researchers conducted a retrospective qualitative analysis using video records that filmed during 2018-2019 from general practice training clinics of a standardized training base in Guangdong Province of China. …”
Get full text
Article -
1433
Facial Emotion Recognition of 16 Distinct Emotions From Smartphone Videos: Comparative Study of Machine Learning and Human Performance
Published 2025-07-01“…Automatic FER models using both appearance and deep-learned features for binary and multiclass emotion classification were trained on the STREs WoZ dataset. The appearance features were based on the Facial Action Coding System and extracted with OpenFace. …”
Get full text
Article -
1434
Factors Affecting the Teaching and Learning of English Language in Primary Schools in Kitumba Sub-County Kabale District.
Published 2024“…Also, interview results were coded on frequency tables and calculated in terms of percentages and presented in this study. …”
Get full text
Thesis -
1435
Herschel vision: A hyperspectral image processing software for data preparation in machine learning pipelines
Published 2025-05-01“…In recent years, publications have relied on either commercial software or custom-developed codes for the analysis of hyperspectral images. This practice has inadvertently restricted the broader adoption of hyperspectral imaging. …”
Get full text
Article -
1436
Blind mask template attacks on masked cryptographic algorithm
Published 2019-01-01“…Masking is a countermeasure against differential power analysis (DPA) attacks on cryptographic devices by using random masks to randomize the leaked power of sensitive information.Template attacks (TA) against cryptographic devices with masking countermeasure by far require attackers have knowledge of masks at the profiling phase.This requirement not only increase the prerequisite of template attacking,but also lead to some sort of difference between the experimental encryption codes of the profiling device and the codes of commercial cryptographic devices,which might degrade performance in real world attacking.Blind mask template attack directly learns templates for the combination of no mask intermediate values without the need of knowing the masks of training power traces,and then uses these templates to attack masked cryptographic devices.Both traditional Gaussian distribution and neural network were adopted as the templates in experiments.Experimental results verified the feasibility of this new approach.The success rate of neural network based blind mask template attacking against masked cryptographic devices is very close to that of traditional template attacks against cryptographic devices without masking countermeasure.…”
Get full text
Article -
1437
Information Bottleneck Driven Deep Video Compression—IBOpenDVCW
Published 2024-09-01“…Video compression remains a challenging task despite significant advancements in end-to-end optimized deep networks for video coding. This study, inspired by information bottleneck (IB) theory, introduces a novel approach that combines IB theory with wavelet transform. …”
Get full text
Article -
1438
A Qualitative Study of Risk Factors of Substance Abuse among Women
Published 2023-11-01“…The research data were analyzed by open coding, axial coding, and selective coding. Results: The research findings showed that the main categories are individual factors, family factors, socio-cultural factors and economic factors were effective in the incidence of substance abuse among women. …”
Get full text
Article -
1439
The Prevalence of Star-forming Clumps as a Function of Environmental Overdensity in Local Galaxies
Published 2025-01-01Get full text
Article -
1440