-
341
Designing a Digital Branding Pattern in Healthy Agricultural Products
Published 2024-09-01“…In this research, an attempt has been made to answer the question: what is the pattern of digital branding of healthy agricultural products in Iran? Theoretical Framework The pressure to compete with other brands and differentiate with others creates motivation and creates the need for branding. …”
Get full text
Article -
342
How do higher education staff understand the terms hybrid, hyflex and blended learning? Choice, modality and uncertainty
Published 2025-05-01“…Our results underscore the need for clearer terminology and for all stakeholders to provide maximally descriptive definitions. The use of any broad category term should be accompanied by a specific definition that at minimum describes choice and modality, but where best practice would be to encompass additional information based on existing frameworks.…”
Get full text
Article -
343
Mentoring as a Social Institution and Its Types in Modern Realities
Published 2023-11-01“…The results provide a description of the specific characteristics of each type of mentoring in the context of modern times, a description of the functions of mentoring.…”
Get full text
Article -
344
Phenomenological Analysis of Lived Experience of Cancer: A Case Study of Patients at Ayatollah Kashani Hospital in Shahrekord
Published 2024-12-01“…The unit of analysis consisted of the sentences and contents of the participants' statements, which were initially categorized thematically and then interpreted using Van Manen's analytical framework, focusing on the four dimensions of lived body, lived space, lived time, and lived social relationships. …”
Get full text
Article -
345
PERFORMANCE REFINEMENT OF CONVOLUTIONAL NEURAL NETWORK ARCHITECTURES FOR SOLVING BIG DATA PROBLEMS
Published 2023-02-01“… The use of more examples than contrasted ones to compare neural network frameworks through using the MNIST database is considered a good research method. …”
Get full text
Article -
346
Athletes’ access to, attitudes towards and experiences of help-seeking for mental health: a scoping review
Published 2025-08-01“…Attitudes towards mental health help-seeking were investigated in 78.8% of the included studies, experiences of help-seeking in 53.8% and access to sources of support in 31.7% of studies. Of the primary articles and interventions, formal sources were investigated in 55% of studies, semiformal sources in 2% and both in 26% of studies.Conclusions This scoping review of 104 papers showed the benefit of using help-seeking frameworks to shape and analyse a review. …”
Get full text
Article -
347
Population dynamics
Published 2024-10-01“…We submit that all of the papers presented in this session indicate clearly significant interest in approaches for combining data and modeling approaches. The Bayesian framework appears a natural framework for this effort, since it is able to not only provide a rigorous way to evaluate and integrate multiple sources of information, but provides an explicit mechanism to accommodate various sources of uncertainty about the system. …”
Get full text
Article -
348
Overview of detection techniques for malicious social bots
Published 2017-11-01“…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
Get full text
Article -
349
Overview of detection techniques for malicious social bots
Published 2017-11-01“…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
Get full text
Article -
350
Relationships of the Dzungar Khanate with the Neighboring Peoples of Central Asia in the XV-First Half of the XVIII Century
Published 2023-10-01“…The chronological framework of the study chosen by the author is quite consistent with the task, since it allows us to analyze the relationship with the indicated neighboring peoples and their role in the history of the Kalmyks and Oirats.…”
Get full text
Article -
351
Properties of Amplitude Distributions of Acoustic Emission Signals Generated in Pressure Vessel During Testing
Published 2019-07-01“…For complex signals, the description using ADC, ADP and ADNC descriptors based on the analysis of amplitude distributions of recorded signals gives the order of signals with more accurate connection with deformational processes being sources of acoustic emission signals.…”
Get full text
Article -
352
The application of blockchain with a comparative approach and its impact on risk, flexibility and internal control evaluation
Published 2024-09-01“…This research is applicable in terms of purpose, and descriptive-analytical in terms of method and data collection method. …”
Get full text
Article -
353
Using Implementation Science to Evaluate the Implementation of Patient-Reported Outcome Measures (PROMs) in a Clinical Heart Failure Care Setting
Published 2025-08-01“…Quantitative data were analyzed using descriptive statistics, and qualitative data were analyzed using behaviour-change frameworks and latent content analysis. …”
Get full text
Article -
354
Modifications to the National Early Warning Score: a scoping review protocol
Published 2024-10-01“…The analysis will be descriptive to provide a summary of modifications identified and their influence on the predictive accuracy of NEWS/NEWS 2.Ethics and dissemination Ethical approval is not required as data will be obtained from already published sources. …”
Get full text
Article -
355
Measures of diabetic retinopathy treatment coverage: protocol for a methodological review
Published 2025-03-01“…Data will be synthesised descriptively to outline the full range of definitions of diabetic retinopathy treatment coverage in the literature and identify the common sources of data used.Ethics and dissemination This review will only include published data; thus, no ethical approval will be sought. …”
Get full text
Article -
356
Methods for the health technology assessment of complex interventions: A scoping review.
Published 2025-01-01“…<h4>Materials and methods</h4>A systematic scoping review was conducted using JBI guidelines, Arksey and O'Malley's six-stage framework and recent advances in scoping review methodology. …”
Get full text
Article -
357
Evaluation of health recommender systems: a scoping review protocol
Published 2024-10-01“…After using EndNote 21 for initial screening, two independent reviewers will screen the titles, abstracts and full texts of the references, and then extract data from included studies related to the recommender system characteristics, evaluation design and evaluation findings into a predetermined form. A descriptive analysis will be conducted to provide an overview of the literature; key themes and gaps in the literature will be discussed.Ethics and dissemination Ethical approval is not required as data will be obtained from already published sources. …”
Get full text
Article -
358
Jesus’ Teaching on Servant-Leadership (Matthew 20:25-28): A Model for Christian Youth Participation in Politics
Published 2024-05-01“…Data collected from the Bible and bibliographic sources were exegetically and descriptively analysed respectively. …”
Get full text
Article -
359
Supply Chain Practices and Performance of Institutions: A Case Study of Hotloaf Bakery in Kabale Municipality.
Published 2023“…A descriptive research design was used and data was collected using interviews and questionnaires. …”
Get full text
Thesis -
360
Enhancing referrals to Child and Adolescent Mental Health Services: the EN-CAMHS mixed-methods study
Published 2025-06-01“…Referral outcome was explored over time descriptively and using logistic regression on the monthly aggregate data. …”
Get full text
Article