Search alternatives:
source » sources (Expand Search)
Showing 341 - 360 results of 451 for search 'source descriptive framework', query time: 0.13s Refine Results
  1. 341

    Designing a Digital Branding Pattern in Healthy Agricultural Products by Abolghasem Mohammadnezhad Ali Zamini, Arezo Ahmadi danyali, Mahmoud Ahmadi Sharif

    Published 2024-09-01
    “…In this research, an attempt has been made to answer the question: what is the pattern of digital branding of healthy agricultural products in Iran? Theoretical Framework The pressure to compete with other brands and differentiate with others creates motivation and creates the need for branding. …”
    Get full text
    Article
  2. 342

    How do higher education staff understand the terms hybrid, hyflex and blended learning? Choice, modality and uncertainty by Emily Nordmann, Barbora Hronska, Jill R.D. MacKay

    Published 2025-05-01
    “…Our results underscore the need for clearer terminology and for all stakeholders to provide maximally descriptive definitions. The use of any broad category term should be accompanied by a specific definition that at minimum describes choice and modality, but where best practice would be to encompass additional information based on existing frameworks.…”
    Get full text
    Article
  3. 343

    Mentoring as a Social Institution and Its Types in Modern Realities by I. A. Zorina

    Published 2023-11-01
    “…The results provide a description of the specific characteristics of each type of mentoring in the context of modern times, a description of the functions of mentoring.…”
    Get full text
    Article
  4. 344

    Phenomenological Analysis of Lived Experience of Cancer: A Case Study of Patients at Ayatollah Kashani Hospital in Shahrekord by Hedari Arman, Sayedeh Sapideh Hashemi

    Published 2024-12-01
    “…The unit of analysis consisted of the sentences and contents of the participants' statements, which were initially categorized thematically and then interpreted using Van Manen's analytical framework, focusing on the four dimensions of lived body, lived space, lived time, and lived social relationships. …”
    Get full text
    Article
  5. 345

    PERFORMANCE REFINEMENT OF CONVOLUTIONAL NEURAL NETWORK ARCHITECTURES FOR SOLVING BIG DATA PROBLEMS by Saud Aljaloud

    Published 2023-02-01
    “… The use of more examples than contrasted ones to compare neural network frameworks through using the MNIST database is considered a good research method. …”
    Get full text
    Article
  6. 346

    Athletes’ access to, attitudes towards and experiences of help-seeking for mental health: a scoping review by Kirsty R Brown, Mary L Quinton, Grace Tidmarsh, Jennifer Cumming

    Published 2025-08-01
    “…Attitudes towards mental health help-seeking were investigated in 78.8% of the included studies, experiences of help-seeking in 53.8% and access to sources of support in 31.7% of studies. Of the primary articles and interventions, formal sources were investigated in 55% of studies, semiformal sources in 2% and both in 26% of studies.Conclusions This scoping review of 104 papers showed the benefit of using help-seeking frameworks to shape and analyse a review. …”
    Get full text
    Article
  7. 347

    Population dynamics by E. G. Cooch, A. A. Dhondt

    Published 2024-10-01
    “…We submit that all of the papers presented in this session indicate clearly significant interest in approaches for combining data and modeling approaches. The Bayesian framework appears a natural framework for this effort, since it is able to not only provide a rigorous way to evaluate and integrate multiple sources of information, but provides an explicit mechanism to accommodate various sources of uncertainty about the system. …”
    Get full text
    Article
  8. 348

    Overview of detection techniques for malicious social bots by Rong LIU, Bo CHEN, Ling YU, Ya-shang LIU, Si-yuan CHEN

    Published 2017-11-01
    “…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
    Get full text
    Article
  9. 349

    Overview of detection techniques for malicious social bots by Rong LIU, Bo CHEN, Ling YU, Ya-shang LIU, Si-yuan CHEN

    Published 2017-11-01
    “…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
    Get full text
    Article
  10. 350

    Relationships of the Dzungar Khanate with the Neighboring Peoples of Central Asia in the XV-First Half of the XVIII Century by A. Sh. Kadyrbaev

    Published 2023-10-01
    “…The chronological framework of the study chosen by the author is quite consistent with the task, since it allows us to analyze the relationship with the indicated neighboring peoples and their role in the history of the Kalmyks and Oirats.…”
    Get full text
    Article
  11. 351

    Properties of Amplitude Distributions of Acoustic Emission Signals Generated in Pressure Vessel During Testing by Franciszek WITOS

    Published 2019-07-01
    “…For complex signals, the description using ADC, ADP and ADNC descriptors based on the analysis of amplitude distributions of recorded signals gives the order of signals with more accurate connection with deformational processes being sources of acoustic emission signals.…”
    Get full text
    Article
  12. 352

    The application of blockchain with a comparative approach and its impact on risk, flexibility and internal control evaluation by mohammadsadegh aminipoor, HamidReza GholamniaRoshan, azadeh kiapour, Iman Dadashi

    Published 2024-09-01
    “…This research is applicable in terms of purpose, and descriptive-analytical in terms of method and data collection method. …”
    Get full text
    Article
  13. 353

    Using Implementation Science to Evaluate the Implementation of Patient-Reported Outcome Measures (PROMs) in a Clinical Heart Failure Care Setting by Sarah V.C. Lawrason, MSc, PhD, Heather Ross, MSc, MD, Michael McDonald, MD, Juan Duero Posada, MD, Samantha Engbers, BAH, Anne Simard, MHSc

    Published 2025-08-01
    “…Quantitative data were analyzed using descriptive statistics, and qualitative data were analyzed using behaviour-change frameworks and latent content analysis. …”
    Get full text
    Article
  14. 354

    Modifications to the National Early Warning Score: a scoping review protocol by Chris Plummer, Edward Meinert, Ananya Ananthakrishnan, Madison Milne-Ives, Victoria Riccalton, Lynsey Threlfall, Cen Cong

    Published 2024-10-01
    “…The analysis will be descriptive to provide a summary of modifications identified and their influence on the predictive accuracy of NEWS/NEWS 2.Ethics and dissemination Ethical approval is not required as data will be obtained from already published sources. …”
    Get full text
    Article
  15. 355

    Measures of diabetic retinopathy treatment coverage: protocol for a methodological review by Stuart Keel, Matthew J Burton, Jacqueline Ramke, Iris Gordon, Jennifer Evans, Nyawira Mwangi, Covadonga Bascaran, Rinki Murphy, Pushkar Raj Silwal, Subash Bhatta, Nayana Pant, Nimisha Chabba

    Published 2025-03-01
    “…Data will be synthesised descriptively to outline the full range of definitions of diabetic retinopathy treatment coverage in the literature and identify the common sources of data used.Ethics and dissemination This review will only include published data; thus, no ethical approval will be sought. …”
    Get full text
    Article
  16. 356

    Methods for the health technology assessment of complex interventions: A scoping review. by Abdolvahab Baghbanian, Drew Carter, Tracy Merlin

    Published 2025-01-01
    “…<h4>Materials and methods</h4>A systematic scoping review was conducted using JBI guidelines, Arksey and O'Malley's six-stage framework and recent advances in scoping review methodology. …”
    Get full text
    Article
  17. 357

    Evaluation of health recommender systems: a scoping review protocol by Rohit Shankar, Edward Meinert, Ananya Ananthakrishnan, Madison Milne-Ives

    Published 2024-10-01
    “…After using EndNote 21 for initial screening, two independent reviewers will screen the titles, abstracts and full texts of the references, and then extract data from included studies related to the recommender system characteristics, evaluation design and evaluation findings into a predetermined form. A descriptive analysis will be conducted to provide an overview of the literature; key themes and gaps in the literature will be discussed.Ethics and dissemination Ethical approval is not required as data will be obtained from already published sources. …”
    Get full text
    Article
  18. 358

    Jesus’ Teaching on Servant-Leadership (Matthew 20:25-28): A Model for Christian Youth Participation in Politics by Funke Elizabeth Oyekan

    Published 2024-05-01
    “…Data collected from the Bible and bibliographic sources were exegetically and descriptively analysed respectively. …”
    Get full text
    Article
  19. 359

    Supply Chain Practices and Performance of Institutions: A Case Study of Hotloaf Bakery in Kabale Municipality. by Asiimwe, Elias

    Published 2023
    “…A descriptive research design was used and data was collected using interviews and questionnaires. …”
    Get full text
    Thesis
  20. 360