Search alternatives:
source » sources (Expand Search)
description » descriptive (Expand Search)
Showing 101 - 120 results of 451 for search 'source description framework', query time: 0.12s Refine Results
  1. 101

    Assessment of the State of Cartographic Exploration of the European Part of the Russian Empire as One of the Indicators of the Historical Development of the Territory (1721–1917) by E. S. Grishin

    Published 2025-01-01
    “…The features of the main groups of sources on the history of cartographic exploration are considered. …”
    Get full text
    Article
  2. 102

    CITRA ANTIKOLONIAL DALAM FILM AVATAR (2009): SEBUAH TINJAUAN POSKOLONIAL by Eggy F Andalas

    Published 2016-04-01
    “…This study uses Edward Said’s framework to answer the problem above. This study uses qualitative approach with descriptive design. …”
    Get full text
    Article
  3. 103

    Jazz Musical Environment in Modern Saint Petersburg by E. A. Pashkovsky, V. P. Miletskiy

    Published 2024-11-01
    “…The methodological framework of the study is the theory of social representations by S. …”
    Get full text
    Article
  4. 104

    Communication Scenarios of Misunderstanding by N. V. Kazarinova

    Published 2020-11-01
    “…“Miscommunication communication” forms a communicative space that reveals the diversity of practices of personal self-realization, intergroup and intercultural interaction, while retaining the perception of the other side as incomprehensible.Methodology and sources. The methodological framework for analysis is a social constructionalist approach to the study of social reality, offering a conceptualization of the practical and observable actions of individuals or, in other words, “what people do when they act”. …”
    Get full text
    Article
  5. 105

    Digital preservation and access strategies for overseas Chinese documents: challenges and solutions by Mingwei Tian

    Published 2025-03-01
    “…Abstract The purpose of the study is to propose a framework that summarizes the processing of existing and incoming sources about the life of the overseas Chinese, their historical heritage, and documents. …”
    Get full text
    Article
  6. 106

    Phonosemantic Interference: Multiple Motivation in the Imitative Word Coinage (on the Material of Invented Languages) by V. A. Davydova

    Published 2020-10-01
    “…The objective of this article is to attempt to formulate the definition of this term and to describe the mechanisms of phonosemantic interference using new linguistic material (artificially constructed lexis).Methodology and sources. The study is conducted within the framework of the phonosemantic approach developed by Stanislav Voronin on the material of artificially constructed words from well-known fictional languages Lapin, Klingon, Elvish, and Navi. …”
    Get full text
    Article
  7. 107

    Judicial Training in Saudi Arabia: From an Unmodified to Codified System by Sümeyra Yakar, Emine Enise Yakar

    Published 2024-12-01
    “…Since the rules of codification are directly derived from the main sources (the Qur’an and Sunna) of Islamic law, the Saudi legal system is supposedly governed by the traditional framework of Islamic law, and this semi-independent nature separates it from its counterparts’ dependent codified legal systems. …”
    Get full text
    Article
  8. 108

    Optimal selection of high-production well targets for fault-controlled fractured-vuggy reservoir in Shunbei oil and gas field, Tarim Basin by Lijun GAO, Haiying LI, Wei GONG, Wei YANG, Hongyan LI

    Published 2025-05-01
    “…This model, based on the "source-connected faults + bead-string + deep chaotic high-amplitude background", provided a systematic framework for reservoir prediction and target selection. …”
    Get full text
    Article
  9. 109

    Overview of detection techniques for malicious social bots by Rong LIU, Bo CHEN, Ling YU, Ya-shang LIU, Si-yuan CHEN

    Published 2017-11-01
    “…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
    Get full text
    Article
  10. 110

    Overview of detection techniques for malicious social bots by Rong LIU, Bo CHEN, Ling YU, Ya-shang LIU, Si-yuan CHEN

    Published 2017-11-01
    “…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
    Get full text
    Article
  11. 111

    Relationships of the Dzungar Khanate with the Neighboring Peoples of Central Asia in the XV-First Half of the XVIII Century by A. Sh. Kadyrbaev

    Published 2023-10-01
    “…The chronological framework of the study chosen by the author is quite consistent with the task, since it allows us to analyze the relationship with the indicated neighboring peoples and their role in the history of the Kalmyks and Oirats.…”
    Get full text
    Article
  12. 112

    Mapping data on access to and use of medicines among migrants in Flanders [version 2; peer review: 1 approved, 3 approved with reservations] by Saleh Aljadeeah, Loes Meukens

    Published 2025-07-01
    “…The World Health Organization (WHO) developed a comprehensive framework aimed at guiding research on migration and health within the WHO European Region. …”
    Get full text
    Article
  13. 113

    Armenian Diaspora of Mordovia: Socio-Cultural Portrait (Experience of Sociological Analysis) by O. N. Barinova, O. N. Kuzina, I. V. Manaeva

    Published 2024-02-01
    “…The purpose of the article is to describe the  sociocultural portrait of the Armenian Diaspora in the conditions of a multi-ethnic and multi-confessional region (Republic of Mordovia).Methodology and sources. The genre of the sociological portrait in the framework of the study of society involves a comprehensive description of society, a systematic analysis of its basic characteristics. …”
    Get full text
    Article
  14. 114

    Cognitive model of the national financial market: creating process and prospects for assessing the security of its functioning by E. A. Loktionova

    Published 2022-02-01
    “…The relevance of the study is due to the need to assess the reaction of the national financial market to various exogenous and endogenous stressors in the face of growing geopolitical tensions and the emergence of new artificial restrictions on the access of domestic investors to foreign sources of capital. The belonging of modern financial markets to complex adaptive systems consisting of elements and relationships, the formal description of the dynamics of which is very problematic, determines the advisability of using cognitive analysis and modeling methods in the process of assessing the safety of their functioning. …”
    Get full text
    Article
  15. 115
  16. 116

    The purification of violence and the translation of fairy tales: a corpus-based study by Cybelle Saffa Soares

    Published 2018-09-01
    “… This study aims to investigate the translation of violence, to propose and to analyse the translation strategies of English Fairytales (EFT) to the Portuguese language. The theoretical framework of this study is based on the interface of Corpus-based Translation Studies (CTS) and Descriptive Translation Studies (DTS). …”
    Get full text
    Article
  17. 117

    An interpretation attempt of Hungarian small towns’ shrinking in a post-socialist transformation context by András Trócsányi, Gábor Pirisi, Éva Máté

    Published 2018-06-01
    “…The aim of the present paper is to analyse the shrinking of small towns among the framework of post-socialists urban trans-formation models and concepts. …”
    Get full text
    Article
  18. 118

    Me and AAC - Alternative and Augmented Communication in West Germany from a Biographical and Media Archaeological Perspective by Jan Müggenburg, Andreas Wagenknecht

    Published 2024-12-01
    “…It brings together two disciplinary perspectives in a dialogue based on interviews, published primary sources, and the description of historical hardware and software. …”
    Get full text
    Article
  19. 119

    PERFORMANCE REFINEMENT OF CONVOLUTIONAL NEURAL NETWORK ARCHITECTURES FOR SOLVING BIG DATA PROBLEMS by Saud Aljaloud

    Published 2023-02-01
    “… The use of more examples than contrasted ones to compare neural network frameworks through using the MNIST database is considered a good research method. …”
    Get full text
    Article
  20. 120

    Instructional-based learning of cyclic quadrilateral theorems: Making geometric thinking visible and enhancing learners’ spatial and geometry cognitions by Rajendran Govender, Godfred Amevor

    Published 2025-03-01
    “…Quantitative data were collected through a pre-test-post-test design and analysed using independent sample t-test whereas qualitative data were collected using content analysis and analysed using descriptive analysis. The analysis was guided by the theoretical frameworks of Van Hiele theory of levels of geometric understanding and Zazkis et al.’s visualisation-analysis model. …”
    Get full text
    Article