Showing 421 - 440 results of 879 for search 'Becket~', query time: 1.89s Refine Results
  1. 421

    Inpatient preferences among patients with multiple chronic conditions in China: A discrete choice experiment by Yueqin Wang, Shiyin Wu, Yuehua Chen, Ling Xiao, Qingling Su, Xiaoyin Huang, Weikang Wang, Wanxin Li, Shanshan Du, Wenbin Liu, Weimin Ye

    Published 2025-02-01
    “…The most important attribute of patients when choosing inpatient care is out-of-pocket expenses per visit, followed by travel time from residence to hospital, waiting time for hospital admission, institution scale, and presence of acquaintances. …”
    Get full text
    Article
  2. 422
  3. 423

    Research on key technologies and applications of fgOTN for the new electric power system by TANG Rui, GUANG Zejing, TANG Jia, GUO Xiaoxi, ZHAO Junfeng

    Published 2025-01-01
    “…The results show that fgOTN has obvious advantages in many aspects compared with the current virtual container (VC)/packet transmission (PKT)/ optical channel data unit (ODU) multi-plane OTN. …”
    Get full text
    Article
  4. 424

    The Special Archive in Moscow by Sigitas Jegelevičius

    Published 1996-12-01
    “… The author provides in his review general information on the former top-secret Special State Archive of the USSR. Its existence wasn't known even to the majority of the employees who were working in the system of the state archives at that time. …”
    Get full text
    Article
  5. 425

    GGSYOLOv5: Flame recognition method in complex scenes based on deep learning. by Fucai Sun, Liping Du, Yantao Dai

    Published 2025-01-01
    “…Firstly, a global attention mechanism (GAM) was added to the CSP1 module in the backbone part of the YOLOv5 network, and then a parameterless attention mechanism was added to the feature fusion part. Finally, packet random convolution (GSConv) was used to replace the original convolution at the output end. …”
    Get full text
    Article
  6. 426

    Meconium Peritonitis and Periorchitis: Report of a Prenatal Case by Cem Yaşar Sanhal, İnanç Mendilcioğlu, Adnan Aslan, Murat Özekinci, Mehmet Şimşek

    Published 2014-12-01
    “…The most common causes of meconium peritonitis are ischemic lesions of the small bowel associated with mechanical obstruction (atresia, volvulus, intussusception, congenital bands, Meckel diverticulum and internal hernia). These likely account for 50% of the cases of meconium peritonitis. …”
    Get full text
    Article
  7. 427
  8. 428

    Correction: Integrated different forms of business communication by using internet telephony (2017, vol.5, no.2, str.29-35) by Bjelobaba Goran, Savić Ana, Stefanović Hana

    Published 2018-01-01
    “…Comparison of performance of the original, sent speech signal and the received speech signal, after passing through the IP network, for different values of packet loss rate is analyzed.…”
    Get full text
    Article
  9. 429
  10. 430

    A SNEAK PEEK INTO LIGETI'S MAILBOX: "IL ME FERA GRAND PLAISIR D’ÉCRIRE UN QUATUOR À CORDES POUR LES ARDITTI. MAIS QUAND? ..." by Bianca ŢIPLEA TEMEŞ

    Published 2014-12-01
    “…Remaining an unrealised dream, along with other works, such as the operas Alice's Adventures in Wonderland, The Tempest and the orchestra piece Labyrinth, the String Quartets Nos.3 and 4 represent a window into Ligeti’s laboratory, allowing us to glimpse, through fragmentary clues, the author’s secret ingredients, ideas and creative mechanisms. …”
    Get full text
    Article
  11. 431
  12. 432

    Patients’ Health Records Management in Ugandan Hospitals: A Case of Kabale Regional Referral Hospital by Daniel, Nabimanya, Sembatya, Richard, Ambrose, Atuhaire, Phelix, Businge Mbabazi

    Published 2021
    “…The researcher interviewed fifty (50) Interviewees and data was analyzed using NVIVO version 11.The findings revealed that 88% of the total interviewees express the need for their information to be kept secret from untrusted parties while 12% of the total interviewees didn’t express the need for their information secrecy from untrusted parties. …”
    Get full text
    Article
  13. 433

    Optimization design of an acoustic cover layer for a cylindrical cavity based on porous materials by Bohan ZHANG, Jili RONG, Xiuyan CHENG

    Published 2025-03-01
    “…During the launch and flight of carrier rockets, the acoustic and vibrational excitations generated by the external environment pose significant threats to their internal payloads. …”
    Get full text
    Article
  14. 434

    Analisis Kinerja Algoritme TCP Congestion Control Berdasarkan Single dan Multiple Flow pada Multi-Path Routing by Bayu Sutawijaya, Achmad Basuki, Fitra Abdurrachman Bachtiar

    Published 2020-10-01
    “…Berdasarkan hasil emulasi, multi-path routing dapat berdampak pada packet reordering, tetapi tidak mengakibatkan penurunan rata-rata throughput yang signifikan. …”
    Get full text
    Article
  15. 435

    Application of Gegenbauer Polynomials with Two Variables to Bi-univalency of Generalized Discrete Probability Distribution Via Zero-Truncated Poisson Distribution Series by Tunji Ibrahim Awolere, Abiodun Tinuoye Oladipo, Şahsene Altınkaya

    Published 2024-07-01
    “…We aim to obtain coefficient bounds, the classical Fekete-Szegö inequality, and Hankel and Toeplitz determinants to generalize the probability of a gambler's ruin. …”
    Get full text
    Article
  16. 436

    THE OPPORTUNITY OF USING CLOUD-BASED COMPUTING IN NUMERICAL SIMULATIONS ON STRUCTURAL ANALYSIS - CASE STUDY by VLAD ANDREI CIUBOTARIU, COSMIN GRIGORAS, CRINA MARIA RADU, CATALIN NICOLAE TAMPU, VALENTIN ZICHIL

    Published 2022-06-01
    “…Therefore, this paper is a case study in which an industrial component – beam bracket – is subjected to a structural analysis on three different software solutions. …”
    Get full text
    Article
  17. 437

    COMBATTING CULTISM IN NIGERIA’S DIGITAL SOCIETY BY LEVERAGING YOUTHPRENUERSHIP FOR COMMUNITY DEVELOPMENT by CHIDI FRANKLIN UZOIGWE, OZINNA OKOYE

    Published 2024-04-01
    “…It traces the historical roots of cultism and secret societies in Nigeria to the pre-colonial era, with particular focus on their emergence in university settings in 1952. …”
    Get full text
    Article
  18. 438

    An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs by Jing Wang, Xue Yuan, Yingjie Xu, Yudi Zhang

    Published 2024-01-01
    “…Our approach relies on discrete logarithmic zero-knowledge proofs and Feldman verifiable secret sharing, reducing complexity by forgoing multiplication triple protocols. …”
    Get full text
    Article
  19. 439

    A plunger lifting optimization control method based on APSO-MPC for edge computing applications by Zhi Qiu, Lei Zhang, He Zhang, Haibo Liang, Yinxian Li

    Published 2025-02-01
    “…Simulations show APSO-MPC improves gas production by 18% compared to traditional methods, while edge computing increases data transmission by 24%, reduces packet loss by 83%, and lowers server memory and computational delays.…”
    Get full text
    Article
  20. 440

    The role of the Holy Spirit in Calvin's doctrine of the sacraments by I. J. Hesselink

    Published 2002-01-01
    “…The Word and faith are requisites for any  efficacious experience of the sacraments, but “whatever God offers us in the sacraments depends on the secret operation of his Spirit” (Calvin). Baptism signifies the forgiveness of our sins and regeneration, although the beginning of that regeneration may precede or follow the act of baptism. …”
    Get full text
    Article