Suggested Topics within your search.
Suggested Topics within your search.
-
4121
Evaluation of parenting interventions for those with additional health and social care needs during pregnancy: THRIVE a multi-arm RCT with embedded economic and process components
Published 2025-05-01“…The main themes were independently coded across a sample of interviews by two researchers, Rosaleen O’Brien (RO) and Katie Buston (KB), using NVivo 10 (QSR International, Warrington, UK). …”
Get full text
Article -
4122
Distributed Storage System for Electric Power Data Based on HBase
Published 2018-12-01Get full text
Article -
4123
Software watermarking scheme with cloud computing constraints
Published 2016-09-01“…A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the source code unavailable.Watermarks map to transform rules were embedded concurrently into these obfuscated codes.The recovery module was a recognizer to prove the watermarks when the original program was recovering.Experimental results,using Java decompliers,indicate that the code become ob-fuscated,is difficult to reverse engineering,thereby mabe the watermarks robust.…”
Get full text
Article -
4124
Missense variants in FRS3 affect body mass index in populations of diverse ancestries
Published 2025-03-01Get full text
Article -
4125
First steps on plasma beam prebuncher for free electron lasers through more suitable relativistic reference-frame-based particle-in-cell tools
Published 2025-06-01“…However, the computational and time resources needed for PICs make them impractical when high resolution and long time/distance simulations are required. …”
Get full text
Article -
4126
Neutronics/thermal-hydraulics coupling simulation using JAMPAN in a single BWR assembly
Published 2025-04-01“…Hence, a continuous energy Monte Carlo code MVP is adopted as a neutronics analysis code and a detailed and phenomenological numerical analysis code JUPITER is adopted as a thermal-hydraulics analysis code. …”
Get full text
Article -
4127
Involving young people with lived experience in advancing mental health science: an exploratory qualitative study from Pakistan and India
Published 2025-07-01“…The qualitative data was analysed using a thematic analysis approach that moved through the phases of familiarization, generation of codes, searching, identification and review of themes and selection of illustrative quotes. …”
Get full text
Article -
4128
Designing and Interpreting a Mathematical Programming Language
Published 2019-12-01“…The interpreter consists of several basic components such as parser, semantic controller and code evaluator, each of which makes a different kind of code interpretation. …”
Get full text
Article -
4129
Children and youngster's gaze behaviour when cycling in familiar environments
Published 2023-12-01“…Additionally, glance targets and glance purpose were coded. More than 80 % of all target areas were monitored. …”
Get full text
Article -
4130
Exemption from Criminal Liability in Connection with Other Measures of Criminal Law
Published 2016-09-01“…The article outlines the problems which can arise after passing the draft of the federal law “On Amendments to the Criminal Code of the Russian Federation and the Criminal Procedure Code of the Russian Federation on the improvement of the grounds and procedure of exemption from criminal responsibility”. …”
Get full text
Article -
4131
PENGGUNAAN ALIH KODE DALAM PERCAKAPAN PADA JARINGAN WHATSAPP OLEH MAHASISWA KNB YANG BERKULIAH DI UNIVERSITAS SEBELAS MARET
Published 2017-05-01“…The result of analizing research that refers to Spreadly theory or etnography theory showed that intrasentential was the dominan switching code that appear on KNB students conversation about 43% (2) the factors that caused KNB students switching the code of on their conversation were speaker, addresse speaker, topic, situation, humor, ability, technology, familiarity, and relation whereas (3) the functions of switching codes on the KNB students conversations were to familiar between the speaker and address speaker, to respect the local culture they stayed, to make easy the communication, words of technology, to rich language ability, to remind something to address speaker, to respond the questions, to begin, middle and to end the conversations, to emphasize the speaker meaning, invitation, to change formal situation to informal, perception, to express the speaker feeling, to quote the other person conversation, humor, to address specification, to ask a help, to explain the speaker meaning, and to change a topic. …”
Get full text
Article -
4132
MENAKAR DALUWARSA: Kajian Perbandingan Daluwarsa Pemalsuan Surat Dalam Pembaharuan Hukum Pidana
Published 2024-01-01“…Comparison of the expiration of mail forgery in the Criminal Code and the New Criminal Code from the aspect of offense formulation and expiration limitation is very different, but there is a similarity in placing the object that can be subject to the crime of mail forgery, namely a person who makes a fake letter and uses a fake letter. …”
Get full text
Article -
4133
Revision of the Protocol of the Telephone Triage System in Tokyo, Japan
Published 2021-01-01“…This study examined the revision of the #7119 protocol by referring the linked data to each code of the triage protocol. Methods. We selected candidates based on the medical codes targeted by the revision, linking data from the nurses’ decisions in triage and the patients’ condition severity when the ambulance arrived at the hospital, gathering data from June 1, 2016, to December 31, 2017. …”
Get full text
Article -
4134
The linkage between opioid treatment programs and recovery community centers: results of a survey of OTP directors
Published 2025-08-01“…Close collaboration is needed especially in Black communities, as Black Americans face significant disparities in opioid-involved overdoses and deaths.MethodsWe conducted an online survey and interviews of directors of OTPs located near RCCs serving Black communities (operationally defined as located in a ZIP code where ≥25% of residents are Black, as per US Census data). …”
Get full text
Article -
4135
Influence of hydrogen content in tokamak scrape-off-layer on performance of lithium divertor
Published 2024-01-01“…The target erosion rate and surface temperatures are within limits of the most target designs. …”
Get full text
Article -
4136
Virtual Channel Purification
Published 2025-05-01“…Quantum error mitigation is a key approach for extracting target state properties on state-of-the-art noisy machines and early fault-tolerant devices. …”
Get full text
Article -
4137
Bayesian Analysis of Complex Mutations in HBV, HCV, and HIV Studies
Published 2019-09-01Get full text
Article -
4138
The Necessity and Feasibility of the Pledge of Intangible Assets in the Contemporary Legal System of Iran
Published 2022-05-01“…In article 774 of the civil code following the well-known opinion in fiqh, the void of the pledge of intangible assets has been specified. …”
Get full text
Article -
4139
A Cross-Project Defect Prediction Model Based on Deep Learning With Self-Attention
Published 2022-01-01“…In particular, we provide semantic extractor named ALC to extract source code semantics based on source code files, and propose classification algorithm based on the semantic information of source project and target project, namely BSL, to build a prediction model. …”
Get full text
Article -
4140
Low Overhead Qutrit Magic State Distillation
Published 2025-06-01“…Moreover, the $[[20,7,2]]_3$ qutrit code that arises from our construction when $m=3$ already has a yield parameter of $1.51$ which outperforms all known qubit triorthogonal codes of size less than a few hundred qubits.…”
Get full text
Article