Suggested Topics within your search.
Suggested Topics within your search.
- Drug Dosage Calculations 1
- Manufacturing processes 1
- Mathematics 1
- Nursing 1
- Nursing Care 1
- Pharmaceutical Preparations 1
- Pharmaceutical arithmetic 1
- SCIENCE / Mechanics / General 1
- TECHNOLOGY & ENGINEERING / Manufacturing 1
- TECHNOLOGY & ENGINEERING / Material Science 1
- administration & dosage 1
- methods 1
-
1161
Telehealth Physical Therapy: More Than an Alternative to In Person Care of the Young Athlete
Published 2021-12-01“…Opportunities such as the ability to custom tailor the home program with consideration of the patient’s learning abilities, provide movement quality feedback outside of the clinical environment, observe parent/caregiver feedback, involve family members who may not be available to attend in-person visits, and the possibility of converting an in-person cancelation to a telehealth visit in order to maintain continuity of care, are examples of how this model may optimize treatment. …”
Get full text
Article -
1162
Missionary work of Mariae Vitae Congregation
Published 2009-12-01“…According to the rule of Mariae Vitae Congregation, it had to deal with religious and lay education of converted girls (mainly Jewish) and provide them with practical skills of work so they could establish in Catholic society. …”
Get full text
Article -
1163
Knowledge graph based ubiquitous power IoT security visualization technology
Published 2019-11-01“…With the construction of the ubiquitous power IoT,the power network transform to interconnection,the data become more interactive and shared,and the business transform to lateral link-up,which pose new challenges to the original network security protection system.Network security visualization technology helps network security personnel quickly identify potential attacks,locate abnormal events,discover new types of attacks,and quickly capture global network security situation by displaying and analyzing the graph patterns.Based on the knowledge graph,the ubiquitous power IoT security analysis was carried out.The internal and external threat intelligence was modeled firstly.Then the relationship between the conceptual entities was constructed.The threat intelligence as knowledge graph was modeled,and then the abstract and complex alarm information which was invisible was converted into a more intuitive and convenient style,which provided accurate support for ubiquitous network security protection decisions in the power IoT.…”
Get full text
Article -
1164
Possible Link between Metabolic Syndrome and Chronic Kidney Disease in the Development of Cardiovascular Disease
Published 2011-01-01“…Initial antihypertensive therapy should consist of an angiotensin-converting enzyme inhibitor or angiotensin receptor blocker. …”
Get full text
Article -
1165
A Novel Resource Allocation Algorithm for OFDMA System with Proportional Fairness
Published 2014-06-01“…Existing algorithms couldn't balance system capacity and high fairness well,so a multi-user rate adaptive allocation algorithm was proposed to maximize the capacity of OFDMA system under proportional fairness.Improved maximize the minimum(max-min)user rate model was proposed,the current user was allocated the highest efficiency subcarrier according to the channel efficiency control parameter.If some allocated subcarrier's channel gain was lower than the threshold value,which would be reallocated to another user whose channel gain was highest.Power allocation model was converted into expression of water-filling line; every user's power allocation was resolved according to the resolved water-filling line.Simulation results and analysis show that the proposed scheme can achieve higher capacity and perfect fairness in a variety of SNR cases,while requiring slightly less computation.…”
Get full text
Article -
1166
Особенности поэтики киноромана: проблема перекодирования текста
Published 2018-06-01“…Consequently, the process of making a movie novel is connected with converting information from one form into the other. …”
Get full text
Article -
1167
AdaBoost algorithm based on fitted weak classifier
Published 2019-11-01“…AdaBoost algorithm was proposed to minimize the accuracy caused by weak classifiers by minimizing the training error rate,and the single threshold was weaker and difficult to converge.The AdaBoost algorithm based on the fitted weak classifier was proposed.Firstly,the mapping relationship between eigenvalues and marker values was established.The least squares method was introduced to solve the fitting polynomial function,and the continuous fitting values were converted into discrete categorical values,thereby obtaining a weak classifier.From the many classifiers obtained,the classifier with smaller fitting error was selected as the weak classifier to form a new AdaBoost strong classifier.The UCI dataset and the MIT face image database were selected for experimental verification.Compared with the traditional Discrete-AdaBoost algorithm,the training speed of the improved algorithm was increased by an order of magnitude.And the face detection rate can reach 96.59%.…”
Get full text
Article -
1168
Indigenous Agency in the Missionary Encounter: The Example of the Khanty and the Nenets
Published 2011-09-01“…While those who refused to accept the missionaries’ endeavours clearly expressed their independence, those who chose to convert did it sincerely, although their understanding of Christianity did not match the missionaries’ expectations. …”
Get full text
Article -
1169
O Mar e a Independência Nacional - relendo Jaime Cortesão
Published 2007-11-01“… O autor, essencialmente, discorda da interpretação de Jaime Cortesão, por haver empolado o peso do comércio à distância, ainda que com base na agricultura, a ponto de o converter no "género da vida nacional" e em factor determinante da Expansão Ultramarina Portuguesa. …”
Get full text
Article -
1170
Raoultella Planticola Bacteremia Following Consumption of Seafood
Published 2014-01-01“…R planticola possesses the ability to convert histidine to histamine and can produce symptoms of scombroid poisoning when poorly prepared seafood is consumed in large amounts. …”
Get full text
Article -
1171
Recycling of steelmaking dusts: The Radust concept
Published 2005-01-01“…The Radust technology developed at Koverhar steelwork in Finland for treatment of the most problematic fine fractions of blast furnace and oxygen converter dusts is shortly presented and discussed.…”
Get full text
Article -
1172
CNID: Research of Network Intrusion Detection Based on Convolutional Neural Network
Published 2020-01-01“…First, the data is preprocessed, the original one-dimensional network intrusion data is converted into two-dimensional data, and then the effective features are learned using optimized convolutional neural networks, and, finally, the final test results are produced in conjunction with the Softmax classifier. …”
Get full text
Article -
1173
A New Approach for Calculation of Metamaterial Printed Fractal Antenna Using Galerkin’s Method
Published 2022-01-01“…Galerkin’s method is applied to deduce the impedance relationship of the proposed structure and then compute the return loss verses frequency by converting the impedance matrix of the proposed antenna [Z] to the scattering matrix [S]. …”
Get full text
Article -
1174
Transforming Backward
Published 2012-02-01“…In addition to the digital edition use case, we also investigate a process for converting HTML content to TEI-based language corpora.…”
Get full text
Article -
1175
THE CONUNDRUM FACING CHRISTIAN TRADITIONAL LEADERS
Published 2019-12-01“…Volz (2008:112) concedes that, although European missionaries introduced Batswana to Christianity, they had hardly any control over how early Batswana converts perceived and adapted their teachings. In some instances, dikgosi, as traditional leaders, are still facing a serious conundrum of being a Christian, on the one hand, and a custodian of culture, on the other. …”
Get full text
Article -
1176
« A Woman’s Answer » : Adelaide Procter et la poésie face au genre
Published 2012-06-01“…Thus, Procter, as a feminist, writes poems defending feminine values whilst resisting to self-deprecation and to the excessive enhancement of virtues. Converted to Catholicism in 1851, Procter, as a Tractarian, uses her poetry, both religious and feminist, as a weapon against the construction of political and poetical patterns. …”
Get full text
Article -
1177
Restoration of the Greek Catholic Church in Czechoslovakia During the Prague Spring
Published 2024-12-01“…The Greek Catholic Church in Czechoslovakia found itself outlawed after its violent liquidation by the brachial communist power in 1950, and the members of this church were forced to convert to the Orthodox faith. This study explains the difficult process of renewal of the Greek Catholic Church and its structures in the context of the <i>Ostpolitik</i> of the Holy See, represented by the Vatican diplomat and later secretary of state Agostino Casaroli, and in the context of the political relaxation in Czechoslovakia in 1968, during the so-called Prague Spring. …”
Get full text
Article -
1178
Issues at the Rural-Urban Fringe: Methods to Sustain Agricultural Land -- Use-Value Assessment
Published 2005-08-01“…Many states use more than one technique in an attempt to prevent land from converting from agricultural to non-agricultural use. …”
Get full text
Article -
1179
Continuous noise covert transmission scheme based on QCSK
Published 2022-04-01“…The existing embedded scheme requires far lower transmission power of the covert system than that of the host system, and thus decreasing the reliability of covert transmission.To figure out the above limitations, a continuous noise covert communication scheme based on quadrature chaos shift keying (QCSK) was proposed.The QCSK signal containing covert information and artificial noise were transmitted alternately, and the illegal energy detection was effectively resisted by the continuity of noise which has strong concealment in both time and frequency domains.Furthermore, extremely low power was not required to meet the demand of convert communication in QCSK, whereas allowing the increase of transmit power under the condition that the performance of the host system to improve the performance of covert transmission.Theoretical analysis and simulation results show that the bit error rate (BER) of covert transmission brings two orders of magnitude improvement compared with the existing scheme at BER=1×10<sup>-7</sup> for host system.…”
Get full text
Article -
1180
Innovation of Teaching Method of Digital Media Art Based on Convolutional Neural Network
Published 2022-01-01“…The scheme proposed in this study divides the video frame into image blocks and then uses the BDCT transform to convert the video frame from the spatial domain to the frequency domain. …”
Get full text
Article