Suggested Topics within your search.
Suggested Topics within your search.
- ART / Digital 1
- Child welfare 1
- Communication in rehabilitation 1
- Computer animation 1
- Consumer satisfaction 1
- Custody of children 1
- Customer relations 1
- Customer services 1
- Digital cinematography 1
- Executive coaching 1
- Family assessment 1
- Family psychotherapy 1
- Forensic child psychology 1
- Hospitality industry 1
- Information literacy 1
- Informationskompetenz 1
- Management 1
- Medical rehabilitation 1
- Organizational change 1
- Rehabilitation 1
- Service industries 1
- Special events industry 1
- Studium 1
- Sustainable development 1
- Teams in the workplace 1
- Telecommunication in medicine 1
- Telemedicine 1
- Tourism 1
- Wissenschaftliches Arbeiten 1
- methods 1
-
861
Appropriate Separator Sizing: A Modified Stewart and Arnold Method
Published 2012-01-01Get full text
Article -
862
Planning of Eyyübiye District Center (Şanlıurfa) Using the Geodesign Method
Published 2021-06-01“…Moreover, the rapid population growth resulted in the search for new places in which to continue socioeconomic activities. These settlements created informal structures that caused distorted urbanization especially in low-income neighborhoods. …”
Get full text
Article -
863
Path Planning Method for Wire-Based Additive Manufacturing Processes
Published 2024-12-01“…The relevance of creating specialized computer programs that convert a virtual 3D model of an object into machine code (G-code) for controlling the process of 3D printing products from wire raw materials is substantiated. …”
Get full text
Article -
864
Voice Adversarial Sample Generation Method for Ultrasonicization of Motion Noise
Published 2024-01-01“…Our method triumphs in creating adversarial samples that not only carry out successful attacks with enhanced efficacy but also conserve the natural features of the voice, underscoring the critical need for fortified security in speech-processing technologies.…”
Get full text
Article -
865
RPKI Defense Capability Simulation Method Based on Container Virtualization
Published 2024-09-01“…Research on BGP malicious attack methods requires a realistic network environment, and evaluation methods based on physical networks often suffer from high costs and insufficient flexibility. …”
Get full text
Article -
866
APPLICATION OF CASE STUDY METHOD FOR INCREASING THE EFFICIENCY OF MANAGEMENT TRAINING
Published 2018-12-01“…The development of active learning methods is the main trend in the training of managers. …”
Get full text
Article -
867
Usability in learning management systems: A mixed-method analysis
Published 2025-06-01“…Usability analysis in software has a critical role in creating useful products for users and obtaining the necessary feedback. …”
Get full text
Article -
868
Impact of a Surgical Site and an Anesthetic Method on Hemostatic Disorders
Published 2009-08-01“…Objective: to study hemostatic changes during abdominal operations in relation to the mode of anesthesia, as well as the lower incidence of perioperative hemostatic complications. Subjects and methods. Two hundred patients were examined during elective high-traumatic abdominal operations in relation to the surgical site (the upper or lower abdomen) and anesthetic method (total intravenous anesthesia alone or in combination with epidural (prolonged) or spinal anesthesia). …”
Get full text
Article -
869
Node Classification Method Based on Hierarchical Hypergraph Neural Network
Published 2024-11-01Get full text
Article -
870
SUBSTANTIATION OF THE METHOD OF MEAT SAMPLE PREPARATION FOR INSTRUMENTAL DETERMINATION OF CONSISTENCY
Published 2019-10-01“…The most commonly used method for testing meat consistency in laboratories around the world is a method that uses strength testing machines with a Warner-Bratzler blade (WB blade). …”
Get full text
Article -
871
Strategies for improving the implementation of e-learning method in undergraduate program
Published 2018-05-01“…The results show that the average value of the importance of E-learning attribute is higher than the average value of E-learning attribute of performance level related to the application of the E-learning method. The WRMD needs to improve the performance of E-learning attributes by creating some strategies. …”
Get full text
Article -
872
An Efficient Group Convolution and Feature Fusion Method for Weed Detection
Published 2024-12-01“…Currently, research on vegetable weed detection technology is relatively limited, and existing detection methods still face challenges due to complex natural conditions, resulting in low detection accuracy and efficiency. …”
Get full text
Article -
873
Possibilities of psychological methods in predicting the risk of illegal and suicidal behavior in adolescents
Published 2025-05-01“… <p style="text-align: justify;"><strong>The aim </strong>of the study was to study psychological and mathematical methods in predicting the risk of unlawful and suicidal behavior in adolescents and to create computer programs based on the results obtained. …”
Get full text
Article -
874
Ways of Concealment for Iatrogenic Crimes, Traces of Their Commission and Forensic Methods of Their Identification
Published 2020-01-01“…The greater the harm done to the victim, the more sophisticated the concealment methods are used to evade criminal liability. The need is recognized to create specific research methodologies for the destroyed traces and ways and tools of destruction of physical sources of information as well as the methodologies for forensic handwriting and technical examination of the falsified medical documents, forensic computer analysis of the altered digital data related to the event under investigation.The evidence of the ways of the iatrogenic crimes’ and their traces’ cover-up are used when initiating leads and planning the investigation, choosing the techniques of interrogation, search, examination and some other investigatory actions. …”
Get full text
Article -
875
Application of the Method of Problem Learning in the Study of the Discipline “Information Security”
Published 2021-07-01“…The paper considers the practical task of creating and resolving a problem situation for the protection of information in state information systems with terminal access devices, which can be used in the educational process to solve similar tasks by the method of problem learning.The creation of a problematic situation is based on the existing contradictions in the regulations governing the functioning and protection of information of this type of systems in which the protected information is processed in order to comply with legislation and ensure the functioning of authorities. …”
Get full text
Article -
876
New methods for gathering the spatial data from land consolidation project
Published 2015-03-01Get full text
Article -
877
The methods of forming soft skills of university students: theoretical and practical aspects
Published 2022-01-01Get full text
Article -
878
Software Implementation of Methods for Modeling the Interaction of Electromagnetic Radiation with Carbon Nanocomposites
Published 2024-02-01“…Methods for modeling the interaction of electromagnetic radiation with a carbon nanostructured composite containing various structural elements, such as carbon fibers, nanoparticles, air gaps, and transition shells are considered. …”
Get full text
Article -
879
METHODS OF ASSESSING PUBLIC(ECOLOGICAL AND ECONOMIC) EFFECTIVENESS OF TRANSPORT PROJECTS IN RUSSIA
Published 2017-10-01“…In global practice, the analysis of “costs and benefits” is widely applied to justification of public financing for transport infrastructure projects. Use of this method in Russia will allow to refocus infrastructure projects on a sustainable development and increase their financial stability, will also create a mechanism for justifying state investments channeling into transport infrastructure and will offer quantitative criteria for selection of projects. …”
Get full text
Article -
880
Lithium-ion battery state of health estimation using intelligent methods
Published 2025-03-01Get full text
Article