Suggested Topics within your search.
Suggested Topics within your search.
- methods 3
- Child care 2
- Child, Hospitalized 2
- Developing Countries 2
- Electric wiring, Interior 2
- Equity 2
- History 2
- Hospitals 2
- Nursing assessment 2
- Pediatric Emergencies 2
- Pediatrics 2
- Psychological aspects 2
- Research 2
- Trusts and trustees 2
- nursing 2
- ART / Digital 1
- Archaeological expeditions 1
- Archeology 1
- Arrhythmias, Cardiac 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Cognitive therapy 1
- Collection and preservation 1
- Computer animation 1
- Crimes against 1
- Decision Making 1
- Decision making 1
- Desertions 1
- Design 1
- Diagnostic tests 1
-
421
Inpatient preferences among patients with multiple chronic conditions in China: A discrete choice experiment
Published 2025-02-01“…The most important attribute of patients when choosing inpatient care is out-of-pocket expenses per visit, followed by travel time from residence to hospital, waiting time for hospital admission, institution scale, and presence of acquaintances. …”
Get full text
Article -
422
-
423
Research on key technologies and applications of fgOTN for the new electric power system
Published 2025-01-01“…The results show that fgOTN has obvious advantages in many aspects compared with the current virtual container (VC)/packet transmission (PKT)/ optical channel data unit (ODU) multi-plane OTN. …”
Get full text
Article -
424
The Special Archive in Moscow
Published 1996-12-01“… The author provides in his review general information on the former top-secret Special State Archive of the USSR. Its existence wasn't known even to the majority of the employees who were working in the system of the state archives at that time. …”
Get full text
Article -
425
GGSYOLOv5: Flame recognition method in complex scenes based on deep learning.
Published 2025-01-01“…Firstly, a global attention mechanism (GAM) was added to the CSP1 module in the backbone part of the YOLOv5 network, and then a parameterless attention mechanism was added to the feature fusion part. Finally, packet random convolution (GSConv) was used to replace the original convolution at the output end. …”
Get full text
Article -
426
Meconium Peritonitis and Periorchitis: Report of a Prenatal Case
Published 2014-12-01“…The most common causes of meconium peritonitis are ischemic lesions of the small bowel associated with mechanical obstruction (atresia, volvulus, intussusception, congenital bands, Meckel diverticulum and internal hernia). These likely account for 50% of the cases of meconium peritonitis. …”
Get full text
Article -
427
-
428
Correction: Integrated different forms of business communication by using internet telephony (2017, vol.5, no.2, str.29-35)
Published 2018-01-01“…Comparison of performance of the original, sent speech signal and the received speech signal, after passing through the IP network, for different values of packet loss rate is analyzed.…”
Get full text
Article -
429
-
430
A SNEAK PEEK INTO LIGETI'S MAILBOX: "IL ME FERA GRAND PLAISIR D’ÉCRIRE UN QUATUOR À CORDES POUR LES ARDITTI. MAIS QUAND? ..."
Published 2014-12-01“…Remaining an unrealised dream, along with other works, such as the operas Alice's Adventures in Wonderland, The Tempest and the orchestra piece Labyrinth, the String Quartets Nos.3 and 4 represent a window into Ligeti’s laboratory, allowing us to glimpse, through fragmentary clues, the author’s secret ingredients, ideas and creative mechanisms. …”
Get full text
Article -
431
A Survey of Avian Fauna in Kabale Municipality, South Western Uganda
Published 2021Get full text
Article -
432
Patients’ Health Records Management in Ugandan Hospitals: A Case of Kabale Regional Referral Hospital
Published 2021“…The researcher interviewed fifty (50) Interviewees and data was analyzed using NVIVO version 11.The findings revealed that 88% of the total interviewees express the need for their information to be kept secret from untrusted parties while 12% of the total interviewees didn’t express the need for their information secrecy from untrusted parties. …”
Get full text
Article -
433
Optimization design of an acoustic cover layer for a cylindrical cavity based on porous materials
Published 2025-03-01“…During the launch and flight of carrier rockets, the acoustic and vibrational excitations generated by the external environment pose significant threats to their internal payloads. …”
Get full text
Article -
434
Analisis Kinerja Algoritme TCP Congestion Control Berdasarkan Single dan Multiple Flow pada Multi-Path Routing
Published 2020-10-01“…Berdasarkan hasil emulasi, multi-path routing dapat berdampak pada packet reordering, tetapi tidak mengakibatkan penurunan rata-rata throughput yang signifikan. …”
Get full text
Article -
435
Application of Gegenbauer Polynomials with Two Variables to Bi-univalency of Generalized Discrete Probability Distribution Via Zero-Truncated Poisson Distribution Series
Published 2024-07-01“…We aim to obtain coefficient bounds, the classical Fekete-Szegö inequality, and Hankel and Toeplitz determinants to generalize the probability of a gambler's ruin. …”
Get full text
Article -
436
THE OPPORTUNITY OF USING CLOUD-BASED COMPUTING IN NUMERICAL SIMULATIONS ON STRUCTURAL ANALYSIS - CASE STUDY
Published 2022-06-01“…Therefore, this paper is a case study in which an industrial component – beam bracket – is subjected to a structural analysis on three different software solutions. …”
Get full text
Article -
437
COMBATTING CULTISM IN NIGERIA’S DIGITAL SOCIETY BY LEVERAGING YOUTHPRENUERSHIP FOR COMMUNITY DEVELOPMENT
Published 2024-04-01“…It traces the historical roots of cultism and secret societies in Nigeria to the pre-colonial era, with particular focus on their emergence in university settings in 1952. …”
Get full text
Article -
438
An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs
Published 2024-01-01“…Our approach relies on discrete logarithmic zero-knowledge proofs and Feldman verifiable secret sharing, reducing complexity by forgoing multiplication triple protocols. …”
Get full text
Article -
439
A plunger lifting optimization control method based on APSO-MPC for edge computing applications
Published 2025-02-01“…Simulations show APSO-MPC improves gas production by 18% compared to traditional methods, while edge computing increases data transmission by 24%, reduces packet loss by 83%, and lowers server memory and computational delays.…”
Get full text
Article -
440
The role of the Holy Spirit in Calvin's doctrine of the sacraments
Published 2002-01-01“…The Word and faith are requisites for any efficacious experience of the sacraments, but “whatever God offers us in the sacraments depends on the secret operation of his Spirit” (Calvin). Baptism signifies the forgiveness of our sins and regeneration, although the beginning of that regeneration may precede or follow the act of baptism. …”
Get full text
Article