Search alternatives:
implications » applications (Expand Search), application (Expand Search)
Showing 3,901 - 3,920 results of 15,905 for search 'data implications', query time: 0.14s Refine Results
  1. 3901

    Evaluating the impact, implementation experience and political economy of primary care networks in Kenya: protocol for a mixed methods study by Beatrice Amboko, Jacinta Nzinga, Benjamin Tsofa, Peter Mugo, Anita Musiega, Beryl Maritim, Ethan Wong, Caitlin Mazzilli, Wangari Ng’ang’a, Brittany Hagedorn, Gillian Turner, Anne Musuva, Felix Murira, Nirmala Ravishankar, Salim Hussein, Edwine Barasa

    Published 2025-01-01
    “…We shall undertake a thematic analysis of the qualitative data. Discussion This evaluation will contribute robust evidence on the impact, implementation experience, political economy and gendered implications of PCNs in a LMIC setting, as well as guide the refining of PCN implementation in Kenya and other LMICs implementing or planning to implement PCNs to enhance their effectiveness.…”
    Get full text
    Article
  2. 3902

    Analysing the psychological capital influence on academic performance in an e-learning environment by Lama Sameer Khoshaim

    Published 2024-11-01
    “…The study began with demographic data collection and an assessment of PsyCap dimensions. …”
    Get full text
    Article
  3. 3903

    Drivers and impacts of evolving land access in Ghana’s cocoa landscapes by Doreen Asumang-Yeboah, Joana Akua Serwaa Ameyaw, Emmanuel Acheampong

    Published 2024-11-01
    “…Methodology: Primary data for this qualitative study was collected through 16 focus group discussions, 8 key informant interviews with officials of state institutions including Ghana Cocoa Board  and landowners and one-on-one interview with 293 cocoa farmers on the underlying drivers influencing the evolving trends in land access within the cocoa landscapes and their implications on actors. …”
    Get full text
    Article
  4. 3904

    A conceptual framework for characterization of agricultural heritage in desert-prone areas by Nermeen Bahnasy

    Published 2025-06-01
    “…Research limitations/implications – The study focused solely on Siwa Oasis as a case study, limiting generalizability to other desert-prone areas. …”
    Get full text
    Article
  5. 3905

    Lamb behaviour during and shortly after tail-docking by M Teubes, AJ Scholtz, K Dzama, SWP Cloete

    Published 2025-03-01
    “… Routine husbandry procedures for lambs are increasingly scrutinised for their animal welfare implications. One such procedure is tail-docking, which is commonly performed to prevent breech blowfly strike. …”
    Get full text
    Article
  6. 3906

    A content analysis of hospitality research's research methods in the 2010s by Cass Shum, Jaimi Garlington, Ankita Ghosh, Seyhmus Baloglu

    Published 2023-11-01
    “…In addition, only a small amount of research used data from Oceania, Africa and Latin America. Research limitations/implications – This study sheds some light on the development of hospitality research in terms of research method and data source usage. …”
    Get full text
    Article
  7. 3907

    Human paradox research and practice by Aysin Pasamehmetoglu

    Published 2025-03-01
    “…They examined the data from 790 healthcare professionals in Turkiye. …”
    Get full text
    Article
  8. 3908

    THE INFLUENCE OF COMPENSATION, LEADERSHIP AND MOTIVATION ON EMPLOYEE PERFORMANCE AT CV. ARTHENIS TRAVEL by Khoiriyatul Ulumiyah, Priyo Utomo, Syamsul Arifin, Devangga Putra Adhitya Pratama, Waloyo Waloyo

    Published 2025-03-01
    “…A multiple linear regression technique was used for the data analysis, while SPSS software was used for the data processing.  …”
    Get full text
    Article
  9. 3909

    Teachers’ Virtual Education Experiences in Iraq: Insights from a Mixed-Methods Study on Challenges and Consequences by ABBAS TAHER ALLAWI GHRABAT, NASROLAH GHASHGHAEIZADEH, JALAL SHANTA JABER, FRANK MOSAVI

    Published 2025-07-01
    “…The qualitative tool was a semi-structured interview, whereas the quantitative tool was a researcher-made questionnaire consisting of 10 components and 66 items. For data analysis, exploratory factor analysis was carried out. …”
    Get full text
    Article
  10. 3910

    Navigating the training satisfaction effects on organizational performance: examining multiple mediating paths with PLS-SEM and IPMA by Md Nurun Nabi, Md Shelim Miah, Md Solaiman Hossain, Md Farijul Islam, Sabrin Sultana, Margia Yesmin, Enamul Hasan

    Published 2025-01-01
    “…We utilized PLS-SEM to analyze the data and assessed the measurement model and structural model for hypothesis testing. …”
    Get full text
    Article
  11. 3911

    Rethinking Macramé Instruction: A Mathematical Approach to Sustainable Cord Usage in Textile Education by Fatimatu Hajia Ibrahim, Boakye Antwi, Karim Azumah, Issah Mohammed Seini

    Published 2025-06-01
    “…Practical and Social Implications: The study offers practical implications for tertiary institutions considering Macramé as a formal course of study. …”
    Get full text
    Article
  12. 3912

    An Investigation of the Effect of the Traditional Naxi Herbal Formula Against Liver Cancer Through Network Pharmacology, Molecular Docking, and In Vitro Experiments by Xiuxiang Yan, Angkhana Inta, Xuefei Yang, Hataichanok Pandith, Terd Disayathanoowat, Lixin Yang

    Published 2024-10-01
    “…<b>Methods</b>: Network pharmacology, microarray data analysis, survival analysis, and molecular docking were employed to predict potential compounds, targets, and pathways for the treatment of liver cancer. …”
    Get full text
    Article
  13. 3913

    Artificial Intelligence and Privacy: The Urgent Need for Children’s Media Literacy by Katharine Sarikakis, Angeliki Chatziefraimidou

    Published 2025-06-01
    “…Older children may begin to grasp the implications of data used in AI but still lack the critical skills to evaluate AI-driven disinformation. …”
    Get full text
    Article
  14. 3914

    Enhancing Property-Based Token Attestation With Homomorphic Encryption (PTA-HE) for Secure Mobile Computing by Thinh Le Vinh, Huan Thien Tran, Samia Bouzefrane

    Published 2025-01-01
    “…Our main contributions are: the introduction of PTA-HE, which resolves these vulnerabilities by enabling computations directly on encrypted data, ensuring continuous protection and resilience against unauthorized access and manipulation; a strategic employment of Trusted Third Parties (TTPs) for secure attestation management, leveraging HE to maintain data confidentiality throughout the entire attestation workflow; rigorous experimental evaluations quantifying computational overhead, communication costs, latency, and scalability implications, transparently illustrating the performance trade-offs associated with enhanced security; and formal verification using the Scyther tool demonstrating PTA-HE&#x2019;s superior correctness and robustness against multiple security threats, such as replay and man-in-the-middle attacks. …”
    Get full text
    Article
  15. 3915

    The Impact of Space Weather on Ultraviolet Radiation at Mid Latitudes by Abdullrahman H. Maghrabi, Abdullah F. Aldosari

    Published 2025-01-01
    “…These parameters include solar radio flux at 10.7 cm (F10.7 cm) and sunspot number (SSN), as well as cosmic ray data from the Oulu neutron monitor for the same period as the UV data. …”
    Get full text
    Article
  16. 3916

    Understanding and addressing the challenges of conducting quantitative evaluation at a local level: a worked example of the available approaches by Gerry Richardson, Sebastian Hinde, Laura Bojke

    Published 2019-11-01
    “…Although it will not always be possible to obtain a complete set of data and conduct extensive analysis, it is vital to understand the implications of the data used and consider the implicit assumptions made through its use.…”
    Get full text
    Article
  17. 3917

    Comparison of Machine Learning and Statistical Approaches of Detecting Anomalies Using a Simulation Study by Klaudia Lenart

    Published 2025-02-01
    “…Anomaly detection has many applications, not only as a step of data preparation but also, for example, as a way of identifying credit card fraud detection, network intrusions and much more. …”
    Get full text
    Article
  18. 3918

    Weather-Baglog Parameters Monitoring System Based IoT-MQTT-Nodered For Mushroom Cultivation Room: A Precision Agriculture by Sumarsono Sumarsono, Nur Muflihah, Hadi Sucipto

    Published 2025-06-01
    “…The monitoring tool's system design comprises three parts: multi-sensor data acquisition, communication protocol to the server, and smartphone-based data monitoring. …”
    Get full text
    Article
  19. 3919

    Measuring human–wildlife conflicts: Comparing insights from different monitoring approaches by Anna Songhurst

    Published 2017-06-01
    “…With these systems running simultaneously, I compared the data collection efficiency of the 2 approaches and explored implications of each on HEC management. …”
    Get full text
    Article
  20. 3920

    Applying PageRank to Team Ranking in Single-Elimination Tournaments: Evidence from Taiwan’s High School Baseball by Yu-Chia Hsu, Wen-Jie Zhang

    Published 2025-06-01
    “…The results indicate that incorporating historical data substantially improves forecasting accuracy, achieving up to 92.9% when data from up to four previous seasons are included. …”
    Get full text
    Article