Suggested Topics within your search.
Suggested Topics within your search.
-
4061
Presenting the internal evaluation model on the performance of the banking industry based on the data theory method of the foundation
Published 2024-06-01“…The statistical population of the research includes 8 experts of the banking industry, and the sampling was done in a targeted manner and the interviews continued until reaching theoretical saturation. …”
Get full text
Article -
4062
Establishing the best step-up treatments for children with uncontrolled asthma despite inhaled corticosteroids: the EINSTEIN systematic review, network meta-analysis and cost-effec...
Published 2025-05-01“…There was considerable heterogeneity in the recording and coding of AEs data across studies. Slightly fewer patients reported neurological disorders (graded as mild or moderate) on ICS + LABA [one patient (4.3%)] compared to ICS + LTRA [seven patients (33.3%)] in one study [OR, 95% CI: 0.09 (0.01 to 0.82)], and a greater number of patients reported neurological disorders for ICS Medium compared to placebo in three studies [OR, 95% CI: 4.8 (1.12 to 20.60)]. …”
Get full text
Article -
4063
Static Characteristics and Unloading Effect of Deep Overburden Soil Ladder Arch Tunnel
Published 2024-07-01“…The safety coefficients for various working conditions have been calculated according to the “Railway Tunnel Design Code”. The structural safety coefficients for trapezoidal arch caverns are in the following order: trapezoidal arch straight top plate < diaphragm wall < side wall < trapezoidal arch sloped top plate < bottom plate. …”
Get full text
Article -
4064
Identifying factors affecting the competence of heads of units and centers of Islamic Azad University in accordance with the statement of the second step of the Islamic Revolution...
Published 2025-03-01“…Competent managers play a key role in directing and controlling the affairs of the organization by making the right decisions, providing creative solutions and responding to their duties. …”
Get full text
Article -
4065
Approaches used to prevent and reduce the use of restrictive practices on adults with learning disabilities: a realist review
Published 2025-05-01“…Inductive, deductive and retroductive thinking was used to code data with regards to contexts, mechanisms and/or their association with outcomes. …”
Get full text
Article -
4066
Invasive urodynamic investigations in the management of women with refractory overactive bladder symptoms: FUTURE, a superiority RCT and economic evaluation
Published 2025-07-01“…Based on an expected 10% drop-out rate, the recruitment target was 1096 participants in total (548 participants per group). …”
Get full text
Article -
4067
Screening Elite Genotypes of Durum Wheat Based on Univariate and Multivariate Stability Models under Unpredictable Environments
Published 2026-03-01“…Univariate stability calculations were done using the codes written by the authors in the matrix language of SAS software, which is known as Interactive Matrix Language. …”
Get full text
Article -
4068
The Effectiveness of Psychological Well-Being Training based on the PERMA Model for 14 to 16-Year-Old Girls with Anxiety Symptoms Zahra Daneshian: M.A. Student of Child and Adoles...
Published 2024-08-01“…MethodsThe study employed a quasi-experimental design with pre-test, post-test, and follow-up phases, targeting 9th and 10th-grade female students in Tehran. …”
Get full text
Article -
4069
Comparative study of quantum error correction strategies for the heavy-hexagonal lattice
Published 2025-02-01“…In some platforms, however, the connectivities are kept even lower in order to minimise gate errors at the hardware level, which limits the error correcting codes that can be directly implemented on them. In this work, we make a comparative study of possible strategies to overcome this limitation for the heavy-hexagonal lattice, the architecture of current IBM superconducting quantum computers. …”
Get full text
Article -
4070
Effects of pharmacological and non-pharmacological interventions for the management of sleep problems in people with fibromyalgia: a multi-methods evidence synthesis
Published 2025-05-01“…Most of the quantitative studies focused on middle-aged women living in high-income countries, making it difficult to generalise our findings to the wider fibromyalgia community. …”
Get full text
Article -
4071
A Legal Analysis of Liability for the Loss of the Subject Matter of Sale after Contract Termination: A New Inquiry into Sunni Jurisprudence
Published 2025-03-01“…This principle is supported by Article 631 of the Iranian Civil Code, which underscores the necessity of informing the possessor to establish liability. …”
Get full text
Article -
4072
Patient buy-in to social prescribing through link workers as part of person-centred care: a realist evaluation
Published 2024-09-01“…We also interviewed 61 patients and re-interviewed 41 of them 9–12 months later. Data were coded and developed into context–mechanism–outcome configurations, which were used to produce a programme theory. …”
Get full text
Article -
4073
Stage actor tracking method based on infrared ink marking(基于红外油墨标记的舞台演员跟踪算法)
Published 2025-01-01“…More specifically, the infrared ink marks are painted on actors' performance costumes in the form of binary ring codes. Then class labels of the ring codes are designated to associated actors as their identities for stable tracking. …”
Get full text
Article -
4074
Museums and Geoconservation
Published 2024-12-01“…Fossil collecting is managed through codes of conduct rather than laws. The codes operate on rapidly eroding coastlines where fossils may be found at any time and if they are not collected might be lost to erosion. …”
Get full text
Article -
4075
A Qualitative Study of the Causes of Irreligiousness Boy Adolescents in Religious Families
Published 2024-12-01“…The analysis of the contextual theory by the method of Charmaz (2014) revealed three components: a) The nature of atheism contained three core codes, which were: 1) the desire to make decisions based on individual diagnosis, 2) choosing religion as one from the types of life values, 3) acting based on individual diagnoses; b) the class of reasons for atheism with axial codes; 1) individual-oriented causes (with open codes of awakening instincts, curiosity and avoiding advice, inability to manage instincts) and 2) other-oriented causes (with open codes of friends and family, the role of society and the media, and social interactions) and c) the category of how to avoid religion With the main codes: 1) matching with the congregation (with open codes of matching with friend and matching with family), 2) finding contrary evidence for religiosity (inference in favor of atheism from social events, overgeneralization in favor of atheism) and 3) Finding supporting evidence for atheism (finding fault with religious people and positive perceptions of religion). …”
Get full text
Article -
4076
Security Visiting: RFID-Based Smartphone Indoor Guiding System
Published 2014-01-01“…The SVG system can provide visitors with the map of a given building, so that the visitor can easily find the target under its guide. It can also protect user's privacy location information by cryptographic two-dimension code and RFID. …”
Get full text
Article -
4077
Analysis of Herd Behavior in Industry Groups of the Tehran Stock Exchange
Published 2025-09-01“…Over the past decade, the TSE has undergone significant growth, marked by a dramatic increase in the number of active trading codes and a sharp rise in their trading values, underscoring the necessity of examining herd behavior in this context. …”
Get full text
Article -
4078
Uncertainty Quantification and Assimilation Method Based on Evaluated Nuclear Data Sampling Method
Published 2025-06-01“…The evaluated nuclear data sampling code, NECP-SOUL, was utilized to produce random nuclear data samples of ENDF-6 format, and then the nuclear data processing code, NECP-Atlas, was used to generate the application libraries based on each ENDF-6 sample. …”
Article -
4079
Threat ripple model: A model to characterize business-oriented attacks based on business dependencies
Published 2025-01-01“…., platforms, using malicious code. For example, it is believed that exploiting vulnerabilities to access the system, and then invading the target platform that support the specified business through lateral movement can achieve the purpose of attacking the business. …”
Get full text
Article -
4080
THE LEGAL CAPACITY OF THE PARTIES, AS A VALIDITY CONDITION FOR THE MANDATE CONTRACT
Published 2023-12-01“…First of all, the mandate contract must meet the general requirements for the validity of contracts, stipulated by art. 1179 para. (1) Civil Code. Regarding the form of the power of attorney, art. 1301 Civil Code specifies the fact that it will be effective only if it is given in compliance with the forms required by law ad validitatem for the conclusion of the contract that the representative is to make on behalf of the represented. …”
Get full text
Article