Showing 221 - 240 results of 276 for search '"\"((\\"making AND coding\\") OR (\"targeting AND coding\\"))~\""', query time: 0.19s Refine Results
  1. 221

    Factors related to professional commitment of nursing students: a systematic review and thematic synthesis by Hengxi Chen, Yali Chen, Ai Zheng, Xin Tan, Ling Han

    Published 2025-02-01
    “…The process involved intensive reading of the literature, followed by the extraction of qualitative data, which was organized into topically similar codes. Researchers collaborated to merge related codes into subthemes, which were then consolidated into main themes for the final report. …”
    Get full text
    Article
  2. 222

    A Practical Performance Benchmark of Post-Quantum Cryptography Across Heterogeneous Computing Environments by Maryam Abbasi, Filipe Cardoso, Paulo Váz, José Silva, Pedro Martins

    Published 2025-05-01
    “…Results demonstrate that contemporary server architectures can implement these algorithms with negligible performance impact (<5% additional latency), making immediate adoption feasible for cloud services. …”
    Get full text
    Article
  3. 223

    Analyzing the Causes of the Failure of the Evaluation of the Implementation of Infrastructure Policies in Iran (Field of Research: Industrial Development Policies) by Mohammad Haghshenas Gorgabi, Davood Hosseinpour, Vajhollah Ghorbanizadeh, Ali Asghar Pourezzat

    Published 2025-03-01
    “…The study involved 48 experts with substantial experience in policy evaluation, selected through targeted and snowball sampling methods. These experts were drawn from four key groups: 1) regulatory organizations (evaluators), 2) universities and research institutes, 3) executive bodies, and 4) policy-making organizations. …”
    Get full text
    Article
  4. 224

    Identification and Ranking of Ethical Human Resources Management Components in Payam Noor University by Saeid Besharati Kivi, Hamid Taboli, Zahra Forotani, Naser Barkhrordar

    Published 2025-03-01
    “…In order to analyze and analyze data to prioritize components and indicators, a combination of decision-making methods is used in conditions of uncertainty, and finally weighting of components is done using Buckley's geometric techniques in comparisons. to be Fuzzy pairing was performed. …”
    Get full text
    Article
  5. 225
  6. 226

    Identification of Agricultural Events, Businesses and Landscapes in Chaharmahal and Bakhtiari Province by Golrokh Amiri Dowrhooni, Neda Torabi Farsani, Majid Farhadi Uonaki, Mehdi Karami Dehkordi

    Published 2025-03-01
    “…After each interview, open codes were extracted until the research reached theoretical saturation in interview number 17 and no code was added to the previous codes. …”
    Get full text
    Article
  7. 227

    Presenting the internal evaluation model on the performance of the banking industry based on the data theory method of the foundation by Zahra Ramzanpour Osmavandani, mehdi Rouholamini, Shahrbanoo Gholipour

    Published 2024-06-01
    “…The statistical population of the research includes 8 experts of the banking industry, and the sampling was done in a targeted manner and the interviews continued until reaching theoretical saturation. …”
    Get full text
    Article
  8. 228

    Establishing the best step-up treatments for children with uncontrolled asthma despite inhaled corticosteroids: the EINSTEIN systematic review, network meta-analysis and cost-effec... by Sofia Cividini, Ian Sinha, Giovanna Culeddu, Sarah Donegan, Michelle Maden, Katie Rose, Olivia Fulton, Dyfrig Hughes, Stephen Turner, Catrin Tudur Smith

    Published 2025-05-01
    “…There is very little evidence available on which to make conclusions regarding ICS + Theophylline and insufficient evidence at this time to suggest that treatment effect is modified by patient characteristics (age, sex, ethnicity, eczema, eosinophilia, asthma severity), although further research is recommended. …”
    Get full text
    Article
  9. 229

    Approaches used to prevent and reduce the use of restrictive practices on adults with learning disabilities: a realist review by Joy Duxbury, Alina Haines-Delmont, John Baker, Peter Baker, Gary Bourlet, Elaine Craig, James Ridley, Rachel Whyte, Beth Morrison, Michaela Thomson, Anthony Tsang, Tella Lantta

    Published 2025-05-01
    “…Inductive, deductive and retroductive thinking was used to code data with regards to contexts, mechanisms and/or their association with outcomes. …”
    Get full text
    Article
  10. 230
  11. 231

    Comparative study of quantum error correction strategies for the heavy-hexagonal lattice by César Benito, Esperanza López, Borja Peropadre, Alejandro Bermudez

    Published 2025-02-01
    “…In some platforms, however, the connectivities are kept even lower in order to minimise gate errors at the hardware level, which limits the error correcting codes that can be directly implemented on them. In this work, we make a comparative study of possible strategies to overcome this limitation for the heavy-hexagonal lattice, the architecture of current IBM superconducting quantum computers. …”
    Get full text
    Article
  12. 232
  13. 233

    A Qualitative Study of the Causes of Irreligiousness Boy Adolescents in Religious Families by Zahra Yousefi, Fatemeh Dafeian, Mohammad Mehdi Malikipour, Azam Shahbazi

    Published 2024-12-01
    “…The analysis of the contextual theory by the method of Charmaz (2014) revealed three components: a) The nature of atheism contained three core codes, which were: 1) the desire to make decisions based on individual diagnosis, 2) choosing religion as one from the types of life values, 3) acting based on individual diagnoses; b) the class of reasons for atheism with axial codes; 1) individual-oriented causes (with open codes of awakening instincts, curiosity and avoiding advice, inability to manage instincts) and 2) other-oriented causes (with open codes of friends and family, the role of society and the media, and social interactions) and c) the category of how to avoid religion With the main codes: 1) matching with the congregation (with open codes of matching with friend and matching with family), 2) finding contrary evidence for religiosity (inference in favor of atheism from social events, overgeneralization in favor of atheism) and 3) Finding supporting evidence for atheism (finding fault with religious people and positive perceptions of religion). …”
    Get full text
    Article
  14. 234

    Security Visiting: RFID-Based Smartphone Indoor Guiding System by Hong Zeng, Jianhui Zhang, Guojun Dai, Zhigang Gao, Haiyang Hu

    Published 2014-01-01
    “…The SVG system can provide visitors with the map of a given building, so that the visitor can easily find the target under its guide. It can also protect user's privacy location information by cryptographic two-dimension code and RFID. …”
    Get full text
    Article
  15. 235

    Uncertainty Quantification and Assimilation Method Based on Evaluated Nuclear Data Sampling Method by HUANG Yihan, ZU Tiejun, LIU Zhengming, CAO Liangzhi, WU Hongchun

    Published 2025-06-01
    “…For transport calculations, the Monte Carlo code NECP-MCX and the deterministic code NECP-SARAX were employed to compute prior effective multiplication factors, control rod worth, and sodium void reactivity coefficients. …”
    Article
  16. 236

    Threat ripple model: A model to characterize business-oriented attacks based on business dependencies by Ao Shiliang, Fang Binxing, Xiao Xinguang, Zhang Hongli

    Published 2025-01-01
    “…., platforms, using malicious code. For example, it is believed that exploiting vulnerabilities to access the system, and then invading the target platform that support the specified business through lateral movement can achieve the purpose of attacking the business. …”
    Get full text
    Article
  17. 237

    THE LEGAL CAPACITY OF THE PARTIES, AS A VALIDITY CONDITION FOR THE MANDATE CONTRACT by Dana-Lucia TULAI

    Published 2023-12-01
    “…First of all, the mandate contract must meet the general requirements for the validity of contracts, stipulated by art. 1179 para. (1) Civil Code. Regarding the form of the power of attorney, art. 1301 Civil Code specifies the fact that it will be effective only if it is given in compliance with the forms required by law ad validitatem for the conclusion of the contract that the representative is to make on behalf of the represented. …”
    Get full text
    Article
  18. 238

    An event generator for neutrino-induced deep inelastic scattering and applications to neutrino astronomy by Silvia Ferrario Ravasio, Rhorry Gauld, Barbara Jäger, Alexander Karlberg, Giulia Zanderighi

    Published 2025-08-01
    “…To illustrate the capabilities of the code we provide predictions for several differential distributions in fixed-target collisions for neutrino energies up to $$1~\textrm{PeV} $$ 1 PeV .…”
    Get full text
    Article
  19. 239

    JDroid: Android malware detection using hybrid opcode feature vector by Recep Sinan Arslan

    Published 2025-07-01
    “…The rapid proliferation of devices using the Android operating system makes these devices the primary target for malware developers. …”
    Get full text
    Article
  20. 240

    Consumption Trends of Antifungal and Antiprotozoal Agents for Human Systemic Use in Kazakhstan from 2017 to 2023 by Yuliya Semenova, Assiya Kussainova, Laura Kassym, Ainur Aimurziyeva, Daniil Semenov, Lisa Lim

    Published 2024-09-01
    “…Methods: Defined daily doses per 1000 inhabitants per day were calculated for systemic antifungals (J02 code of the Anatomical Therapeutic Chemical Classification System (ATC)) and antiprotozoals (P01 code of the ATC). …”
    Get full text
    Article