Suggested Topics within your search.
Search alternatives:
processes » process (Expand Search)
Showing 6,901 - 6,920 results of 9,231 for search 'Generalized processes analysis', query time: 0.27s Refine Results
  1. 6901

    Transsexuals and families: Between discrimination and inclusion by Mršević Zorica

    Published 2013-01-01
    “…The text comprises analysis of family relations of transsexual persons. …”
    Get full text
    Article
  2. 6902

    Striving to Teach Versus Modern Realia by Anzhela Nikishyna

    Published 2021-10-01
    “…Theoretical and methodological base of the research consists of an approach connected with the use of such methods as analysis, generalization and interpretation of the psychological theory of motivation and the concept of amotivation and its consequences; observation of the current educational situation with regard to its active participants. …”
    Get full text
    Article
  3. 6903

    Economic Development of Siberia during Reforms of Peter I: Craft and Emergence of Industry by L. N. Suslova, I. V. Yarkova

    Published 2023-02-01
    “…The features of the industrial development of the Siberian region at the end of the 17th — the first quarter of the 18th centuries are studied. The analysis of legislative and clerical, statistical sources, generalization and systematization of the results of research in the field of development of the Siberian handicraft and manufacturing production of the late 17th — first quarter of the 18th centuries made it possible to identify the degree of influence of Peter I’s reforms on this process. …”
    Get full text
    Article
  4. 6904

    Formation of Border Line between Kazakhstan and Siberia in 1920s - Early 1930s (The Case of Cherlaksky District) by K. B. Korzhenevsky

    Published 2020-02-01
    “…On the basis of archival documents first involved in the scientific revolution, a detailed analysis of the inclusion of the Cherlaksky district in the Omsk province is carried out. …”
    Get full text
    Article
  5. 6905

    The influence of the psychological state on the physical fitness of cadets of educational organizations of the ministry of internal affairs of Russia by S. V. Kasyanov, A. I. Zemlyanoy, A. A. Tashiyan

    Published 2023-05-01
    “…When conducting scientific research, the authors used general scientific methods of cognition of objective reality. …”
    Get full text
    Article
  6. 6906

    Near and similar restaurants: competitors or allies? by Alexander Sánchez-Rodríguez, Margarita De Miguel-Guzmán, Gelmar García-Vidal, Rodobaldo Martínez-Vivar

    Published 2020-01-01
    “…In addition, bivariate statistics were utilised to test the hypotheses, while multivariate statistics were used to conduct correspondence analysis. The results reveal that, in the cases analysed, the parties involved benefit from the existing condition when a process of distribution of demand is present and advertising expenses are minimised.…”
    Get full text
    Article
  7. 6907

    Methodological Materials on the Conduct of Forensic Examination: Basic Concepts, Similarities and Differences by E. V. Chesnokova

    Published 2023-02-01
    “…As their characteristics are presented: basic concepts, structure, form of presentation, the scope of tasks to be solved, approval procedure.During the research the author has applied a universal dialectical method, a system of general scientific methods: observation, description, comparison, analysis and synthesis, classification. …”
    Get full text
    Article
  8. 6908

    The victim’s remission in Brazilian legal penal culture in the XIX century: negotiation in the century of public justice? by Arley Fernandes Teixeira

    Published 2019-03-01
    “…The present work has as its main objective the study of the victim’s remission, a criminal institute present in both Brazilian penal codes of the nineteenth century, Criminal Code of 1830 and Penal Code of 1890. The analysis is based, above all, on the legal books on criminal law and criminal procedural law of Brazil in the nineteenth century and seeks, firstly, to understand the legal functioning of this institute, the criteria of application and how works the part's capacity to forgive and, therefore, to close the process in progress and, from there, to enter into the most important doctrinal discussions on forgiveness, from which we highlight the problem of the miserable and the issue of slight physical offenses. …”
    Get full text
    Article
  9. 6909

    Testing the effectiveness of raspberry flower extract as an inhibitor of copper's corrosion in 3% NaCl by Farzet Bikić, Fehim Korać

    Published 2022-06-01
    “…The paper presents an examination of the possibility of applying raspberry flower extract (Rubus idaeus L.) as a green inhibitor of general corrosion of copper in 3% NaCl. Raspberry flowers (Rubus idaeus L.) sort Polka were collected from the Moševac near Maglaj city, Bosnia and Herzegovina. …”
    Get full text
    Article
  10. 6910

    Current Issues of Information Disclosure in Integrated Reporting of Economic Entities by Olga S. Karpova, Irina A. Dymova

    Published 2024-12-01
    “…Further research may improve the process of integrating financial and non-financial information into a single format. …”
    Article
  11. 6911

    Modern educational technologies at the departments of surgery by N. I. Bogomolov, A. G. Goncharov, A. A. Kashafeeva

    Published 2022-09-01
    “…The OBJECTIVE of the study was to show the effectiveness of multilevel situational tasks in the generalization and analysis of personal and collegial experience of surgeons.METHODS AND MATERIALS. …”
    Get full text
    Article
  12. 6912

    Creative Accounting in Financial Reporting by Lacramioara Mansour, Elena Cerasela Spatariu

    Published 2025-02-01
    “…In general, creative accounting is seen as a negative technique, as a method of manipulating financial statements, which can negatively influence, in particular, the decision-making process and, in the long term, even the company itself, but which can be limited by implementing some strict reporting standards, independent audits, ethical education and by the use of innovative technologies. …”
    Get full text
    Article
  13. 6913

    Domain question-driven Linked Data modeling by Sofia Baroncini, Marilena Daquino, Francesca Tomasi

    Published 2025-07-01
    “…The peculiarity of the process adopted lies in its strong grounding in the theoretical framework of the domain, as it followed an ontological modeling according to the key theories proposed and a modeling and analysis through the scholars’ key research questions. …”
    Get full text
    Article
  14. 6914
  15. 6915

    Closing the diagnostic gap in male genital schistosomiasis (MGS): current detection tools and novel strategies by Bronwyn Neufeld, Sergio España-Cueto, Lisette van Lieshout, Bonnie L. Webster, Pytsje T. Hoekstra, Sekeleghe Kayuni, J. Russell Stothard, Tegwen Marlais, Shinjiro Hamano, Amaya L. Bustinduy

    “…Further investigation is required into standardization of sample collection, processing, storage, and analysis in order to identify an evidence-based optimal diagnostic pipeline. …”
    Get full text
    Article
  16. 6916
  17. 6917

    Cost-Sensitive Radial Basis Function Neural Network Classifier for Software Defect Prediction by P. Kumudha, R. Venkatesan

    Published 2016-01-01
    “…Generally, software testing is a critical task in the software development process wherein it is to save time and budget by detecting defects at the earliest and deliver a product without defects to the customers. …”
    Get full text
    Article
  18. 6918

    Fusion of Focal Loss’s cyber threat intelligence entity extraction by Yuanbo GUO, Yongfei LI, Qingli CHEN, Chen FANG, Yangyang HU

    Published 2022-07-01
    “…Cyber threat intelligence contains a wealth of knowledge of threat behavior.Timely analysis and process of threat intelligence can promote the transformation of defense from passive to active.Nowadays, most threat intelligence that exists in the form of natural language texts contains a large amount of unstructured data, which needs to be converted into structured data for subsequent processing using entity extraction methods.However, since threat intelligence contains numerous terminology such as vulnerability names, malware and APT organizations, and the distribution of entities are extremely unbalanced, the performance of extraction methods in general field are severely limited when applied to threat intelligence.Therefore, an entity extraction model integrated with Focal Loss was proposed, which improved the cross-entropy loss function and balanced sample distribution by introducing balance factor and modulation coefficient.In addition, for the problem that threat intelligence had a complex structure and a wide range of sources, and contained a large number of professional words, token and character features were added to the model, which effectively improved OOV (out of vocabulary) problem in threat intelligence.Experiment results show that compared with existing mainstream model BiLSTM and BiLSTM-CRF, the F1 scores of the proposed model is increased by 7.07% and 4.79% respectively, which verifies the effectiveness of introducing Focal Loss and character features.…”
    Get full text
    Article
  19. 6919

    SEKO ALAS MLEBU GELAS by Moh Soehadha

    Published 2023-06-01
    “…The results of the training showed that the farmers were generally enthusiastic in participating in the training. …”
    Get full text
    Article
  20. 6920

    (De)Globalization, the Global Imaginary, and Religious Narratives: A Theoretical Framework and the East Asia Litmus Test by Beilei Bai

    Published 2025-01-01
    “…Secondly, it applies this framework to the case of China and, more cursorily, to the East Asian context in general. I start my analysis by approaching “globalization” as a shared vision of the world, referred to, in this article, as the “global imaginary”. …”
    Get full text
    Article