Showing 4,061 - 4,080 results of 13,271 for search 'Data aiming techniques', query time: 0.21s Refine Results
  1. 4061

    Predicting Chemotherapy-Induced Peripheral Neuropathy Using Transformer-Based Multimodal Deep Learning by Sanghee Kim

    Published 2025-01-01
    “…Aim: This study aimed to develop and evaluate a deep learning-based predictive model for CIPN by integrating multimodal data, including clinical, genomic, biosignal, wearable device, and imaging information. …”
    Get full text
    Article
  2. 4062

    Factors Influencing Induction of Labor Success in Riyadh, Saudi Arabia by Renad A. Alshalan, Rwan K. Alarfaj, Yazeed A. Almojel, Yara AlHaddad, Rahaf Alsomali, Maysoon Al Adham

    Published 2024-01-01
    “…The collected data were tabulated and cleaned in MS Excel. Final data were transferred to SPSS for subsequent data analysis. …”
    Get full text
    Article
  3. 4063

    Method for detection of cerebral blood flow in neurointensive care using longitudinal arterial spin labeling MRI. by Sofie Tapper, Anders Tisell, Jan Hillman, Karin Wårdell

    Published 2024-01-01
    “…At this initial stage, the workflow was implemented and tested using acquired test-retest data and longitudinal data from two healthy participants. …”
    Get full text
    Article
  4. 4064

    Motivation and Employee Performance in Hospital in Uganda: A Case of Kitgum General Hospital in Kitgum District. by Anenocan, Monica Oroma

    Published 2024
    “…The sample was selected using purposive and random sampling techniques, and both qualitative and quantitative data were collected. …”
    Get full text
    Thesis
  5. 4065

    PERAN INSTAGRAM @PEREMPUANBERKISAH SEBAGAI MEDIA PEMBERDAYAAN PEREMPUAN by Analisa Yudika Wulandari, Pratiwi Wahyu Widiarti

    Published 2020-11-01
    “…Research data validation used source triangulation. Data analysis technique in this research are reduction, data display, and conclusion drawing. …”
    Get full text
    Article
  6. 4066

    Advancing student outcome predictions through generative adversarial networks by Helia Farhood, Ibrahim Joudah, Amin Beheshti, Samuel Muller

    Published 2024-12-01
    “…Our mirroring approach aims to achieve accuracy rates that closely align with the original data. …”
    Get full text
    Article
  7. 4067

    IMPLEMENTASI PASAL 76 HURUF I UNDANG-UNDANG NOMOR 35 TAHUN 2014 TENTANG PERLINDUNGAN ANAK by Karmila Damariani Radjak, Newista Manti

    Published 2023-09-01
    “…Data collection techniques were obtained from observations, interviews, and documentation conducted by researchers. …”
    Get full text
    Article
  8. 4068

    Flight Performance Analysis of an Image Processing Algorithm for Integrated Sense-and-Avoid Systems by Lidia Forlenza, Giancarmine Fasano, Domenico Accardo, Antonio Moccia

    Published 2012-01-01
    “…This paper is focused on the development and the flight performance analysis of an image-processing technique aimed at detecting flying obstacles in airborne panchromatic images. …”
    Get full text
    Article
  9. 4069

    How Do Teachers and Students Perceive Human Rights, Citizenship and Democracy Course? by Arife Figen Ersoy, Nur Leman Balbağ, Ömür Gürdoğan Bayır

    Published 2017-04-01
    “…The data were gathered by using the semi-structured interview technique. …”
    Get full text
    Article
  10. 4070

    Analysis and mitigation of fire and explosion hazards in hospital environments from a biomedical engineering perspective by Augusto Jorge Antonio Ibáñez-Cruz, Dante Espinoza-Morriberon, Alejandra Micaela Elena Vergara-Florián, William C. Algoner

    Published 2025-02-01
    “…BackgroundHospitals are complex and dynamic facilities that house vulnerable people, medical equipment, and hazardous materials, making them susceptible to fires and explosions with potentially catastrophic effects. This study aims to understand and address fire and explosion risks in hospital environments using biomedical engineering, safety, and fire prevention concepts to develop effective mitigation strategies.Materials and MethodsThe study employed a mixed-methods approach, integrating quantitative and qualitative techniques. …”
    Get full text
    Article
  11. 4071

    Employing convolutional neural networks and explainable artificial intelligence for the detection of seizures from electroencephalogram signal by Tamilarasi Kathirvel Murugan, Anush Kameswaran

    Published 2024-12-01
    “…To identify the EEG data, the proposed system combines deep learning models with feature extraction technique. …”
    Get full text
    Article
  12. 4072

    Application of Bioinformatics in Chronobiology Research by Robson da Silva Lopes, Nathalia Maria Resende, Adenilda Cristina Honorio-França, Eduardo Luzía França

    Published 2013-01-01
    “…Bioinformatics and other well-established sciences, such as molecular biology, genetics, and biochemistry, provide a scientific approach for the analysis of data generated through “omics” projects that may be used in studies of chronobiology. …”
    Get full text
    Article
  13. 4073

    Exploring Hindu Eco-Ethics in School-Based Zero Waste Initiatives: Implications for Student Character Education in Denpasar by Ni Komang Sutriyanti, I Putu Andre Suhardiana, I Dewa Gede Darma Permana

    Published 2025-08-01
    “…Through qualitative data analysis using the Miles and Huberman approach and verified with triangulation techniques, the findings reveal that the Zero Waste program focuses on systematic efforts to enable school communities to manage their own waste. …”
    Get full text
    Article
  14. 4074

    Modern features of coronary thrombosis imaging in non-ST-elevation acute coronary syndrome by A. V. Strelkova, M. G. Chashchin, A. Yu. Gorshkov, O. M. Drapkina, A. V. Yurin, E. V. Gagarina, A. S. Tereshchenko

    Published 2025-05-01
    “…In modern medicine, there are both invasive and non-invasive coronary thrombosis imaging methods. The aim of the study was to analyze and systematize the literature data on coronary thrombosis imaging methods. …”
    Get full text
    Article
  15. 4075

    Analisis Penyajian, Pengungkapan, dan Pemanfaatan Dana Nonhalal pada BAZNAS Kabupaten Pekalongan Tahun 2018-2022 by Fitriana, Fitri Kurniawati

    Published 2024-06-01
    “…Testing the validity of the data uses triangulation techniques with results from documentation whose validity is tested using data from interviews. …”
    Get full text
    Article
  16. 4076

    Applications of UAV Technologies in Assessment of Transportation Infrastructure Systems by Ahmad Akib Uz Zaman, Ahmed Abdelaty, Mohamed S. Yamany

    Published 2025-06-01
    “…Furthermore, integrating various data-collecting sensors enhances the versatility of UAVs, enabling the acquisition of diverse data types to support comprehensive infrastructure evaluations. …”
    Get full text
    Article
  17. 4077

    Seq2Seq-based GRU autoencoder for anomaly detection and failure identification in coal mining hydraulic support systems by Kai Zhan, Cong Wang, Xigui Zheng, Chao Kong, Guangming Li, Wei Xin, Longhe Liu

    Published 2025-01-01
    “…This study proposes an anomaly detection and failure identification method based on Gated Recurrent Unit Autoencoder (GRU-AE), aimed at achieving anomaly detection in hydraulic support pressure data and equipment failure early warning. …”
    Get full text
    Article
  18. 4078

    Masked Modeling-Based Ultrasound Image Classification via Self-Supervised Learning by Kele Xu, Kang You, Boqing Zhu, Ming Feng, Dawei Feng, Cheng Yang

    Published 2024-01-01
    “…Additionally, the presence of speckle noise and other imaging artifacts can introduce numerous hard examples for ultrasound data classification. In this paper, drawing inspiration from self-supervised learning techniques, we present a pre-training method based on mask modeling specifically designed for ultrasound data. …”
    Get full text
    Article
  19. 4079

    Analisis resepsi toxic relationship dalam drama Korea Nevertheless di kalangan mahasiswa Yogyakarta by Laila Putri Wahyuni, Pratiwi Wahyu Widiarti

    Published 2024-03-01
    “…Data analysis used encoding/decoding reception analysis techniques which divided the audience into three positions, namely dominant hegemony, negotiation, and opposition. …”
    Get full text
    Article
  20. 4080

    Dual defense: Combining preemptive exclusion of members and knowledge distillation to mitigate membership inference attacks by Jun Niu, Peng Liu, Chunhui Huang, Yangming Zhang, Moxuan Zeng, Kuo Shen, Yangzhong Wang, Suyu An, Yulong Shen, Xiaohong Jiang, Jianfeng Ma, He Wang, Gaofei Wu, Anmin Fu, Chunjie Cao, Xiaoyan Zhu, Yuqing Zhang

    Published 2025-01-01
    “…During the knowledge distillation phase, we add ground-truth labeled data to the reference dataset to decrease the protected student model's dependency on soft labels, aiming to maintain or improve its test accuracy. …”
    Get full text
    Article