Showing 4,061 - 4,080 results of 5,630 for search '(( targeting and coding ) OR ( making and coding ))', query time: 0.22s Refine Results
  1. 4061

    Presenting the internal evaluation model on the performance of the banking industry based on the data theory method of the foundation by Zahra Ramzanpour Osmavandani, mehdi Rouholamini, Shahrbanoo Gholipour

    Published 2024-06-01
    “…The statistical population of the research includes 8 experts of the banking industry, and the sampling was done in a targeted manner and the interviews continued until reaching theoretical saturation. …”
    Get full text
    Article
  2. 4062

    Establishing the best step-up treatments for children with uncontrolled asthma despite inhaled corticosteroids: the EINSTEIN systematic review, network meta-analysis and cost-effec... by Sofia Cividini, Ian Sinha, Giovanna Culeddu, Sarah Donegan, Michelle Maden, Katie Rose, Olivia Fulton, Dyfrig Hughes, Stephen Turner, Catrin Tudur Smith

    Published 2025-05-01
    “…There was considerable heterogeneity in the recording and coding of AEs data across studies. Slightly fewer patients reported neurological disorders (graded as mild or moderate) on ICS + LABA [one patient (4.3%)] compared to ICS + LTRA [seven patients (33.3%)] in one study [OR, 95% CI: 0.09 (0.01 to 0.82)], and a greater number of patients reported neurological disorders for ICS Medium compared to placebo in three studies [OR, 95% CI: 4.8 (1.12 to 20.60)]. …”
    Get full text
    Article
  3. 4063

    Static Characteristics and Unloading Effect of Deep Overburden Soil Ladder Arch Tunnel by Li MA, Yunhua LU, Qicai WANG, Xiaobo MA, Sheng LI, Kexun ZHANG

    Published 2024-07-01
    “…The safety coefficients for various working conditions have been calculated according to the “Railway Tunnel Design Code”. The structural safety coefficients for trapezoidal arch caverns are in the following order: trapezoidal arch straight top plate < diaphragm wall < side wall < trapezoidal arch sloped top plate < bottom plate. …”
    Get full text
    Article
  4. 4064

    Identifying factors affecting the competence of heads of units and centers of Islamic Azad University in accordance with the statement of the second step of the Islamic Revolution... by Seyed samad Emadi vahdi, mohammadreza mardani, Nader Bohlouli, Mojtaba Ramazani

    Published 2025-03-01
    “…Competent managers play a key role in directing and controlling the affairs of the organization by making the right decisions, providing creative solutions and responding to their duties. …”
    Get full text
    Article
  5. 4065

    Approaches used to prevent and reduce the use of restrictive practices on adults with learning disabilities: a realist review by Joy Duxbury, Alina Haines-Delmont, John Baker, Peter Baker, Gary Bourlet, Elaine Craig, James Ridley, Rachel Whyte, Beth Morrison, Michaela Thomson, Anthony Tsang, Tella Lantta

    Published 2025-05-01
    “…Inductive, deductive and retroductive thinking was used to code data with regards to contexts, mechanisms and/or their association with outcomes. …”
    Get full text
    Article
  6. 4066
  7. 4067

    Screening Elite Genotypes of Durum Wheat Based on Univariate and Multivariate Stability Models under Unpredictable Environments by Sharyar Sasani, Armin Saed-Moucheshi

    Published 2026-03-01
    “…Univariate stability calculations were done using the codes written by the authors in the matrix language of SAS software, which is known as Interactive Matrix Language. …”
    Get full text
    Article
  8. 4068

    The Effectiveness of Psychological Well-Being Training based on the PERMA Model for 14 to 16-Year-Old Girls with Anxiety Symptoms Zahra Daneshian: M.A. Student of Child and Adoles... by zahra danesian, Shahriar Shahidi, Saeed Ghanbari

    Published 2024-08-01
    “…MethodsThe study employed a quasi-experimental design with pre-test, post-test, and follow-up phases, targeting 9th and 10th-grade female students in Tehran. …”
    Get full text
    Article
  9. 4069

    Comparative study of quantum error correction strategies for the heavy-hexagonal lattice by César Benito, Esperanza López, Borja Peropadre, Alejandro Bermudez

    Published 2025-02-01
    “…In some platforms, however, the connectivities are kept even lower in order to minimise gate errors at the hardware level, which limits the error correcting codes that can be directly implemented on them. In this work, we make a comparative study of possible strategies to overcome this limitation for the heavy-hexagonal lattice, the architecture of current IBM superconducting quantum computers. …”
    Get full text
    Article
  10. 4070
  11. 4071

    A Legal Analysis of Liability for the Loss of the Subject Matter of Sale after Contract Termination: A New Inquiry into Sunni Jurisprudence by Mohammad Hossein Taghipour Darzi Naghibi, Umm al-Banin Ramzan Zadeh, Mostafa Firoozi Rad

    Published 2025-03-01
    “…This principle is supported by Article 631 of the Iranian Civil Code, which underscores the necessity of informing the possessor to establish liability. …”
    Get full text
    Article
  12. 4072

    Patient buy-in to social prescribing through link workers as part of person-centred care: a realist evaluation by Stephanie Tierney, Geoffrey Wong, Debra Westlake, Amadea Turk, Steven Markham, Jordan Gorenberg, Joanne Reeve, Caroline Mitchell, Kerryn Husk, Sabi Redwood, Tony Meacock, Catherine Pope, Beccy Baird, Kamal R Mahtani

    Published 2024-09-01
    “…We also interviewed 61 patients and re-interviewed 41 of them 9–12 months later. Data were coded and developed into context–mechanism–outcome configurations, which were used to produce a programme theory. …”
    Get full text
    Article
  13. 4073

    Stage actor tracking method based on infrared ink marking(基于红外油墨标记的舞台演员跟踪算法) by 李平(LI Ping), 陈书界(CHEN Shujie), 王登辉(WANG Denghui), 刘钟淋(LIU Zhonglin), 王勋(WANG Xun), 周迪(ZHOU Di), 丁勇(DING Yong)

    Published 2025-01-01
    “…More specifically, the infrared ink marks are painted on actors' performance costumes in the form of binary ring codes. Then class labels of the ring codes are designated to associated actors as their identities for stable tracking. …”
    Get full text
    Article
  14. 4074

    Museums and Geoconservation by Michael J. Benton, Sarah King

    Published 2024-12-01
    “…Fossil collecting is managed through codes of conduct rather than laws. The codes operate on rapidly eroding coastlines where fossils may be found at any time and if they are not collected might be lost to erosion. …”
    Get full text
    Article
  15. 4075

    A Qualitative Study of the Causes of Irreligiousness Boy Adolescents in Religious Families by Zahra Yousefi, Fatemeh Dafeian, Mohammad Mehdi Malikipour, Azam Shahbazi

    Published 2024-12-01
    “…The analysis of the contextual theory by the method of Charmaz (2014) revealed three components: a) The nature of atheism contained three core codes, which were: 1) the desire to make decisions based on individual diagnosis, 2) choosing religion as one from the types of life values, 3) acting based on individual diagnoses; b) the class of reasons for atheism with axial codes; 1) individual-oriented causes (with open codes of awakening instincts, curiosity and avoiding advice, inability to manage instincts) and 2) other-oriented causes (with open codes of friends and family, the role of society and the media, and social interactions) and c) the category of how to avoid religion With the main codes: 1) matching with the congregation (with open codes of matching with friend and matching with family), 2) finding contrary evidence for religiosity (inference in favor of atheism from social events, overgeneralization in favor of atheism) and 3) Finding supporting evidence for atheism (finding fault with religious people and positive perceptions of religion). …”
    Get full text
    Article
  16. 4076

    Security Visiting: RFID-Based Smartphone Indoor Guiding System by Hong Zeng, Jianhui Zhang, Guojun Dai, Zhigang Gao, Haiyang Hu

    Published 2014-01-01
    “…The SVG system can provide visitors with the map of a given building, so that the visitor can easily find the target under its guide. It can also protect user's privacy location information by cryptographic two-dimension code and RFID. …”
    Get full text
    Article
  17. 4077

    Analysis of Herd Behavior in Industry Groups of the Tehran Stock Exchange by Yahya Ebrahimpour, Elham Nobahar, Parviz Mohamadzadeh

    Published 2025-09-01
    “…Over the past decade, the TSE has undergone significant growth, marked by a dramatic increase in the number of active trading codes and a sharp rise in their trading values, underscoring the necessity of examining herd behavior in this context. …”
    Get full text
    Article
  18. 4078

    Uncertainty Quantification and Assimilation Method Based on Evaluated Nuclear Data Sampling Method by HUANG Yihan, ZU Tiejun, LIU Zhengming, CAO Liangzhi, WU Hongchun

    Published 2025-06-01
    “…The evaluated nuclear data sampling code, NECP-SOUL, was utilized to produce random nuclear data samples of ENDF-6 format, and then the nuclear data processing code, NECP-Atlas, was used to generate the application libraries based on each ENDF-6 sample. …”
    Article
  19. 4079

    Threat ripple model: A model to characterize business-oriented attacks based on business dependencies by Ao Shiliang, Fang Binxing, Xiao Xinguang, Zhang Hongli

    Published 2025-01-01
    “…., platforms, using malicious code. For example, it is believed that exploiting vulnerabilities to access the system, and then invading the target platform that support the specified business through lateral movement can achieve the purpose of attacking the business. …”
    Get full text
    Article
  20. 4080

    THE LEGAL CAPACITY OF THE PARTIES, AS A VALIDITY CONDITION FOR THE MANDATE CONTRACT by Dana-Lucia TULAI

    Published 2023-12-01
    “…First of all, the mandate contract must meet the general requirements for the validity of contracts, stipulated by art. 1179 para. (1) Civil Code. Regarding the form of the power of attorney, art. 1301 Civil Code specifies the fact that it will be effective only if it is given in compliance with the forms required by law ad validitatem for the conclusion of the contract that the representative is to make on behalf of the represented. …”
    Get full text
    Article