Showing 861 - 880 results of 26,058 for search 'create methods', query time: 0.19s Refine Results
  1. 861
  2. 862

    Planning of Eyyübiye District Center (Şanlıurfa) Using the Geodesign Method by Abdullah İzzeddin Karabulut, Sedat Benek, Fred Barış Ernst

    Published 2021-06-01
    “…Moreover, the rapid population growth resulted in the search for new places in which to continue socioeconomic activities. These settlements created informal structures that caused distorted urbanization especially in low-income neighborhoods. …”
    Get full text
    Article
  3. 863

    Path Planning Method for Wire-Based Additive Manufacturing Processes by Alexey Shcherbakov, Alexander Gudenko, Andrey Sliva, Daria Gaponova, Artem Marchenkov, Alexey Goncharov

    Published 2024-12-01
    “…The relevance of creating specialized computer programs that convert a virtual 3D model of an object into machine code (G-code) for controlling the process of 3D printing products from wire raw materials is substantiated. …”
    Get full text
    Article
  4. 864

    Voice Adversarial Sample Generation Method for Ultrasonicization of Motion Noise by Jun Wang, Juan Liu

    Published 2024-01-01
    “…Our method triumphs in creating adversarial samples that not only carry out successful attacks with enhanced efficacy but also conserve the natural features of the voice, underscoring the critical need for fortified security in speech-processing technologies.…”
    Get full text
    Article
  5. 865

    RPKI Defense Capability Simulation Method Based on Container Virtualization by Bo Yu, Xingyuan Liu, Xiaofeng Wang

    Published 2024-09-01
    “…Research on BGP malicious attack methods requires a realistic network environment, and evaluation methods based on physical networks often suffer from high costs and insufficient flexibility. …”
    Get full text
    Article
  6. 866

    APPLICATION OF CASE STUDY METHOD FOR INCREASING THE EFFICIENCY OF MANAGEMENT TRAINING by О. В. Жмай

    Published 2018-12-01
    “…The development of active learning methods is the main trend in the training of managers. …”
    Get full text
    Article
  7. 867

    Usability in learning management systems: A mixed-method analysis by Pembe Pelin Koca, Hakan Özcan

    Published 2025-06-01
    “…Usability analysis in software has a critical role in creating useful products for users and obtaining the necessary feedback. …”
    Get full text
    Article
  8. 868

    Impact of a Surgical Site and an Anesthetic Method on Hemostatic Disorders by P. A. Lyuboshevsky, A. V. Zabusov, N. I. Artamonova

    Published 2009-08-01
    “…Objective: to study hemostatic changes during abdominal operations in relation to the mode of anesthesia, as well as the lower incidence of perioperative hemostatic complications. Subjects and methods. Two hundred patients were examined during elective high-traumatic abdominal operations in relation to the surgical site (the upper or lower abdomen) and anesthetic method (total intravenous anesthesia alone or in combination with epidural (prolonged) or spinal anesthesia). …”
    Get full text
    Article
  9. 869
  10. 870

    SUBSTANTIATION OF THE METHOD OF MEAT SAMPLE PREPARATION FOR INSTRUMENTAL DETERMINATION OF CONSISTENCY by Kirill I. Spiridonov, Victoria V. Nasonova, Elena K. Tunieva

    Published 2019-10-01
    “…The most commonly used method for testing meat consistency in laboratories around the world is a method that uses strength testing machines with a Warner-Bratzler blade (WB blade). …”
    Get full text
    Article
  11. 871

    Strategies for improving the implementation of e-learning method in undergraduate program by Mohamad Muchlis

    Published 2018-05-01
    “…The results show that the average value of the importance of E-learning attribute is higher than the average value of E-learning attribute of performance level related to the application of the E-learning method. The WRMD needs to improve the performance of E-learning attributes by creating some strategies. …”
    Get full text
    Article
  12. 872

    An Efficient Group Convolution and Feature Fusion Method for Weed Detection by Chaowen Chen, Ying Zang, Jinkang Jiao, Daoqing Yan, Zhuorong Fan, Zijian Cui, Minghua Zhang

    Published 2024-12-01
    “…Currently, research on vegetable weed detection technology is relatively limited, and existing detection methods still face challenges due to complex natural conditions, resulting in low detection accuracy and efficiency. …”
    Get full text
    Article
  13. 873

    Possibilities of psychological methods in predicting the risk of illegal and suicidal behavior in adolescents by V.A. Mudrov, A.V. Sakharov

    Published 2025-05-01
    “… <p style="text-align: justify;"><strong>The aim </strong>of the study was to study psychological and mathematical methods in predicting the risk of unlawful and suicidal behavior in adolescents and to create computer programs based on the results obtained. …”
    Get full text
    Article
  14. 874

    Ways of Concealment for Iatrogenic Crimes, Traces of Their Commission and Forensic Methods of Their Identification by M. V. Tuzlukova

    Published 2020-01-01
    “…The greater the harm done to the victim, the more sophisticated the concealment methods are used to evade criminal liability. The need is recognized to create specific research methodologies for the destroyed traces and ways and tools of destruction of physical sources of information as well as the methodologies for forensic handwriting and technical examination of the falsified medical documents, forensic computer analysis of the altered digital data related to the event under investigation.The evidence of the ways of the iatrogenic crimes’ and their traces’ cover-up are used when initiating leads and planning the investigation, choosing the techniques of interrogation, search, examination and some other investigatory actions. …”
    Get full text
    Article
  15. 875

    Application of the Method of Problem Learning in the Study of the Discipline “Information Security” by V. A. Sizov, D. M. Malinichev, Kh. K. Kuchmezov, V. V. Mochalov

    Published 2021-07-01
    “…The paper considers the practical task of creating and resolving a problem situation for the protection of information in state information systems with terminal access devices, which can be used in the educational process to solve similar tasks by the method of problem learning.The creation of a problematic situation is based on the existing contradictions in the regulations governing the functioning and protection of information of this type of systems in which the protected information is processed in order to comply with legislation and ensure the functioning of authorities. …”
    Get full text
    Article
  16. 876
  17. 877
  18. 878

    Software Implementation of Methods for Modeling the Interaction of Electromagnetic Radiation with Carbon Nanocomposites by А. А. Likhachou, M. S. Baranava, A. L. Danilyuk

    Published 2024-02-01
    “…Methods for modeling the interaction of electromagnetic radiation with a carbon nanostructured composite containing various structural elements, such as carbon fibers, nanoparticles, air gaps, and transition shells are considered. …”
    Get full text
    Article
  19. 879

    METHODS OF ASSESSING PUBLIC(ECOLOGICAL AND ECONOMIC) EFFECTIVENESS OF TRANSPORT PROJECTS IN RUSSIA by A. I. Artemenkov, O. E. Medvedeva, P. V. Medvedev, Yu. V. Trofimenko

    Published 2017-10-01
    “…In global practice, the analysis of “costs and benefits” is widely applied to justification of public financing for transport infrastructure projects. Use of this method in Russia will allow to refocus infrastructure projects on a sustainable development and increase their financial stability, will also create a mechanism for justifying state investments channeling into transport infrastructure and will offer quantitative criteria for selection of projects. …”
    Get full text
    Article
  20. 880