Results 11 to 20 of about 1,361,904 (215)

Genes CEP55, FOXD3, FOXF2, GNAO1, GRIA4, and KCNA5 as potential diagnostic biomarkers in colorectal cancer

open access: yesBMC Medical Genomics, 2019
Background Colorectal cancer (CRC) is one of the leading causes of death by cancer worldwide and in need of novel potential diagnostic biomarkers for early discovery. Methods We conducted a two-step study.
Nina Hauptman   +4 more
doaj   +1 more source

Development and validation of integrated yoga module for obesity in adolescents

open access: yesInternational Journal of Yoga, 2018
Background: Obesity is a growing global epidemic and cause of noncommunicable diseases. Yoga is one of the effective ways to reduce stress which is one of the causes of obesity.
Sunanada Surendra Rathi   +4 more
doaj   +1 more source

Mobile app validation: a digital health scorecard approach

open access: yesnpj Digital Medicine, 2021
While digital health solutions continue to grow in number and in complexity, the ability for stakeholders in healthcare to easily discern quality lags far behind.
Ramy Sedhom   +4 more
doaj   +1 more source

Critical review of validation models and practices in language testing: their limitations and future directions for validation research

open access: yesLanguage Testing in Asia, 2019
Purpose and background The purpose of this paper is to critically review the traditional and contemporary validation frameworks—the content, criterion, and construct validations; the evidence-gathering; the socio-cognitive model; the test usefulness; and
Gwan-Hyeok Im, Dongil Shin, Liying Cheng
doaj   +1 more source

Patient Activation in Childhood, Adolescent, and Young Adult Cancer Survivors: Current Insights and Implications for Survivorship Care—A Systematic Review From the e‐QuoL Project

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Patient activation—encompassing knowledge, confidence, and skills in managing individual's health—is a cornerstone of person‐centered care. However, its significance among childhood, adolescent, and young adult cancer survivors (CAYACS) remains unexplored. This article examines the application of the 13‐item Patient Activation Measure (
Charlotte Demoor‐Goldschmidt   +12 more
wiley   +1 more source

Psychometric properties of the SocioEmotional Skills Instrument for Teachers using network approach: English and Spanish version

open access: yesFrontiers in Psychology
The importance of socioemotional teaching skills has been highlighted for its link with better academic, social, emotional, and behavioral results of students, as well as for its contribution to the work wellbeing, mental health, and prosperity of ...
Fabiola Sáez-Delgado   +2 more
doaj   +1 more source

RASCH: a new approach in tool validation

open access: yesJournal of the College of Community Physicians, 2017
No abstract ...
Dushyanthi Mary Jayawardene   +2 more
doaj   +1 more source

An Efficient Data Partitioning to Improve Classification Performance While Keeping Parameters Interpretable. [PDF]

open access: yesPLoS ONE, 2016
Supervised machine learning methods typically require splitting data into multiple chunks for training, validating, and finally testing classifiers. For finding the best parameters of a classifier, training and validation are usually carried out with ...
Kristjan Korjus   +2 more
doaj   +1 more source

Utility of Computed Tomography Surveillance of Asymptomatic Infection in Children and Young Adults Before Allogeneic Hematopoietic Stem Cell Transplant

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Asymptomatic infection poses a significant risk for children undergoing hematopoietic stem cell transplantation (HSCT). Pre‐transplant surveillance computed tomography (CT) is commonly used to identify occult infection, though its diagnostic yield remains uncertain.
Tyler Obermark   +9 more
wiley   +1 more source

MULTILEVEL INTELLECTUAL APPROACH TO HTTP-REQUESTS LEGITIMACY VALIDATION

open access: yesInformation and Telecommunication Sciences, 2013
In the paper a multilevel intellectual approach to HTTP-requests legitimacy validation is proposed. The approach is devised for HTTP-flood DDoS-attacks detection and prevention in telecommunication networks with a web-server as the target attack object ...
Volodymyr Kononenko, Serhii Kravchuk
doaj   +1 more source

Home - About - Disclaimer - Privacy