-
221
Factors related to professional commitment of nursing students: a systematic review and thematic synthesis
Published 2025-02-01“…The process involved intensive reading of the literature, followed by the extraction of qualitative data, which was organized into topically similar codes. Researchers collaborated to merge related codes into subthemes, which were then consolidated into main themes for the final report. …”
Get full text
Article -
222
A Practical Performance Benchmark of Post-Quantum Cryptography Across Heterogeneous Computing Environments
Published 2025-05-01“…Results demonstrate that contemporary server architectures can implement these algorithms with negligible performance impact (<5% additional latency), making immediate adoption feasible for cloud services. …”
Get full text
Article -
223
Analyzing the Causes of the Failure of the Evaluation of the Implementation of Infrastructure Policies in Iran (Field of Research: Industrial Development Policies)
Published 2025-03-01“…The study involved 48 experts with substantial experience in policy evaluation, selected through targeted and snowball sampling methods. These experts were drawn from four key groups: 1) regulatory organizations (evaluators), 2) universities and research institutes, 3) executive bodies, and 4) policy-making organizations. …”
Get full text
Article -
224
Identification and Ranking of Ethical Human Resources Management Components in Payam Noor University
Published 2025-03-01“…In order to analyze and analyze data to prioritize components and indicators, a combination of decision-making methods is used in conditions of uncertainty, and finally weighting of components is done using Buckley's geometric techniques in comparisons. to be Fuzzy pairing was performed. …”
Get full text
Article -
225
Impact of healthcare-associated infection on healthcare services and survival of patients with cancer: a propensity score-matched retrospective study
Published 2025-04-01“…This study informs clinical practice and decision-making for nurses and nursing educators who manage HAI. …”
Get full text
Article -
226
Identification of Agricultural Events, Businesses and Landscapes in Chaharmahal and Bakhtiari Province
Published 2025-03-01“…After each interview, open codes were extracted until the research reached theoretical saturation in interview number 17 and no code was added to the previous codes. …”
Get full text
Article -
227
Presenting the internal evaluation model on the performance of the banking industry based on the data theory method of the foundation
Published 2024-06-01“…The statistical population of the research includes 8 experts of the banking industry, and the sampling was done in a targeted manner and the interviews continued until reaching theoretical saturation. …”
Get full text
Article -
228
Establishing the best step-up treatments for children with uncontrolled asthma despite inhaled corticosteroids: the EINSTEIN systematic review, network meta-analysis and cost-effec...
Published 2025-05-01“…There is very little evidence available on which to make conclusions regarding ICS + Theophylline and insufficient evidence at this time to suggest that treatment effect is modified by patient characteristics (age, sex, ethnicity, eczema, eosinophilia, asthma severity), although further research is recommended. …”
Get full text
Article -
229
Approaches used to prevent and reduce the use of restrictive practices on adults with learning disabilities: a realist review
Published 2025-05-01“…Inductive, deductive and retroductive thinking was used to code data with regards to contexts, mechanisms and/or their association with outcomes. …”
Get full text
Article -
230
Invasive urodynamic investigations in the management of women with refractory overactive bladder symptoms: FUTURE, a superiority RCT and economic evaluation
Published 2025-07-01“…Based on an expected 10% drop-out rate, the recruitment target was 1096 participants in total (548 participants per group). …”
Get full text
Article -
231
Comparative study of quantum error correction strategies for the heavy-hexagonal lattice
Published 2025-02-01“…In some platforms, however, the connectivities are kept even lower in order to minimise gate errors at the hardware level, which limits the error correcting codes that can be directly implemented on them. In this work, we make a comparative study of possible strategies to overcome this limitation for the heavy-hexagonal lattice, the architecture of current IBM superconducting quantum computers. …”
Get full text
Article -
232
Effects of pharmacological and non-pharmacological interventions for the management of sleep problems in people with fibromyalgia: a multi-methods evidence synthesis
Published 2025-05-01“…Most of the quantitative studies focused on middle-aged women living in high-income countries, making it difficult to generalise our findings to the wider fibromyalgia community. …”
Get full text
Article -
233
A Qualitative Study of the Causes of Irreligiousness Boy Adolescents in Religious Families
Published 2024-12-01“…The analysis of the contextual theory by the method of Charmaz (2014) revealed three components: a) The nature of atheism contained three core codes, which were: 1) the desire to make decisions based on individual diagnosis, 2) choosing religion as one from the types of life values, 3) acting based on individual diagnoses; b) the class of reasons for atheism with axial codes; 1) individual-oriented causes (with open codes of awakening instincts, curiosity and avoiding advice, inability to manage instincts) and 2) other-oriented causes (with open codes of friends and family, the role of society and the media, and social interactions) and c) the category of how to avoid religion With the main codes: 1) matching with the congregation (with open codes of matching with friend and matching with family), 2) finding contrary evidence for religiosity (inference in favor of atheism from social events, overgeneralization in favor of atheism) and 3) Finding supporting evidence for atheism (finding fault with religious people and positive perceptions of religion). …”
Get full text
Article -
234
Security Visiting: RFID-Based Smartphone Indoor Guiding System
Published 2014-01-01“…The SVG system can provide visitors with the map of a given building, so that the visitor can easily find the target under its guide. It can also protect user's privacy location information by cryptographic two-dimension code and RFID. …”
Get full text
Article -
235
Uncertainty Quantification and Assimilation Method Based on Evaluated Nuclear Data Sampling Method
Published 2025-06-01“…For transport calculations, the Monte Carlo code NECP-MCX and the deterministic code NECP-SARAX were employed to compute prior effective multiplication factors, control rod worth, and sodium void reactivity coefficients. …”
Article -
236
Threat ripple model: A model to characterize business-oriented attacks based on business dependencies
Published 2025-01-01“…., platforms, using malicious code. For example, it is believed that exploiting vulnerabilities to access the system, and then invading the target platform that support the specified business through lateral movement can achieve the purpose of attacking the business. …”
Get full text
Article -
237
THE LEGAL CAPACITY OF THE PARTIES, AS A VALIDITY CONDITION FOR THE MANDATE CONTRACT
Published 2023-12-01“…First of all, the mandate contract must meet the general requirements for the validity of contracts, stipulated by art. 1179 para. (1) Civil Code. Regarding the form of the power of attorney, art. 1301 Civil Code specifies the fact that it will be effective only if it is given in compliance with the forms required by law ad validitatem for the conclusion of the contract that the representative is to make on behalf of the represented. …”
Get full text
Article -
238
An event generator for neutrino-induced deep inelastic scattering and applications to neutrino astronomy
Published 2025-08-01“…To illustrate the capabilities of the code we provide predictions for several differential distributions in fixed-target collisions for neutrino energies up to $$1~\textrm{PeV} $$ 1 PeV .…”
Get full text
Article -
239
JDroid: Android malware detection using hybrid opcode feature vector
Published 2025-07-01“…The rapid proliferation of devices using the Android operating system makes these devices the primary target for malware developers. …”
Get full text
Article -
240
Consumption Trends of Antifungal and Antiprotozoal Agents for Human Systemic Use in Kazakhstan from 2017 to 2023
Published 2024-09-01“…Methods: Defined daily doses per 1000 inhabitants per day were calculated for systemic antifungals (J02 code of the Anatomical Therapeutic Chemical Classification System (ATC)) and antiprotozoals (P01 code of the ATC). …”
Get full text
Article