-
761
Nationwide survey on ICU visiting policies in Mainland of China: Current practices and perspectives
Published 2025-07-01Get full text
Article -
762
Hierarchical in-out fusion for incomplete multimodal brain tumor segmentation
Published 2025-07-01“…Our code is available https://github.com/liufangcoca-515/InOutFusion-main .…”
Get full text
Article -
763
Effectiveness of a competency-based coordinator of advance care planning competency enhancement program: a mixed method
Published 2025-04-01“…Participants acknowledged that critical thinking education improved their ability to analyze and evaluate clinical ethical dilemmas. …”
Get full text
Article -
764
A Zero-Trust Multi-Processor Reporter-Verifier Design of Edge Devices for Firmware Authenticity in Internet of Things and Blockchain Applications
Published 2025-03-01“…In this paper, we propose a new IoT device design that works against internal threats by preventing malicious codes from device manufacturers. In IoT applications that monitor critical data, it is important to ensure that the correct firmware reporting honest data is running on the devices. …”
Get full text
Article -
765
Fatigue crack initiation and propagation in lotus-type porous material
Published 2016-01-01“…The number of stress cycles, Np, required for crack propagation from initial to the critical crack length is also numerically determined using finite element (FE) models, in the frame of Abaqus computation FEM code. …”
Get full text
Article -
766
Fatigue crack initiation and propagation in lotus-type porous material
Published 2015-12-01“…The number of stress cycles, Np, required for crack propagation from initial to the critical crack length is also numerically determined using finite element (FE) models, in the frame of Abaqus computation FEM code. …”
Get full text
Article -
767
Properties of the new N $$ \mathcal{N} $$ = 1 AdS4 vacuum of maximal supergravity
Published 2020-01-01“…Studying the structure of the submanifold of SO(3) × ℤ2-invariant supergravity scalars, we find that it has a simple interpretation as a submanifold of the 14-dimensional ℤ 2 3 $$ {\mathbb{Z}}_2^3 $$ -invariant scalar manifold (SU(1, 1)/U(1))7, for which we find a rather remarkable superpotential whose structure matches the single bit error correcting (7, 4) Hamming code. This 14-dimensional scalar manifold contains approximately one quarter of the known critical points. …”
Get full text
Article -
768
Discrepancies between physician review and algorithmic detection of the zoll rescuenet post-cardiac arrest case review
Published 2025-07-01“…Background: Accurate measurement of CPR quality metrics is critical for improving cardiac arrest outcomes. Impedance based automated devices have demonstrated limitations. …”
Get full text
Article -
769
Prawo oskarżonego do udziału w rozprawie głównej w świetle ostatnich nowelizacji: postępująca erozja
Published 2025-01-01“…In recent years, Polish legislation has continued the previous tendency (e.g. the criticized Article 378a of the Code of Criminal Procedure) to reduce these standards. …”
Get full text
Article -
770
Gendered Societies and Leadership Trajectories: A Qualitative Study of Women in the Indian Civil Services
Published 2025-07-01“…Through in-depth interviews this research aims to uncover the success code of the selected twelve women leaders. The study identified six broad themes with subthemes which acted as enablers or deterrents for these women. …”
Get full text
Article -
771
A SPIN-based Approach for Detecting Vulnerabilities in C Programs
Published 2011-12-01“…The C language is widely used for developing tools in various application areas, and a number of C software tools are used for critical systems, such as medicine, transport, etc. …”
Get full text
Article -
772
Deployment of Sensors to Optimize the Network Coverage Using Genetic Algorithm
Published 2012-12-01“…The algorithm has been implemented in MATLAB using its genetic algorithm tool box along with the custom code. …”
Get full text
Article -
773
BLOCKCHAIN PERSPECTIVES IN THE DEVELOPMENT OF GREEN ECONOMY FINANCE
Published 2020-07-01“…The relatively high cost, the presence of critical vulnerabilities in the software code, as well as the insufficient level of development of related technologies are significant obstacles to the development of blockchain technology. …”
Get full text
Article -
774
Intermittent gaslift flows in vertical pipes
Published 2007-09-01“…The resulting system of equations is numerically solved. The numerical code is verified by using experimental data and calculation data of the other authors. …”
Get full text
Article -
775
Detention measure in the preliminary investigation procedure
Published 2025-01-01“…The authors aim to examine the measure in question in a detailed and critical manner, and at the end of the paper, they offer certain de lege ferenda proposals.…”
Get full text
Article -
776
Modeling of the transition from transgranular to intergranular fracture at elevated temperatures in EI698 nickel alloy
Published 2025-07-01“…The source code of the created and used finite element is an open source project and available to download from https://github.com/Andrey-Fog/ANSYS-USERELEMENT-PHFLD. …”
Get full text
Article -
777
Enhancement of carbon nanotubes/kerosene nanofluids on mixed convective heat transfer in rectangular enclosures
Published 2024-11-01“…The system of the governing equations is tackled by a validated in-house code, where we compared the code accuracy with previous experimental and numerical works. …”
Get full text
Article -
778
Passive Design for Residential Buildings in Arid Desert Climates: Insights from the Solar Decathlon Middle East
Published 2025-08-01“…The thermal properties significantly exceed the local code requirements, with wall performance up to 80% better than that mandated. …”
Get full text
Article -
779
Healthcare data governance assessment based on hospital management perspectives
Published 2025-06-01“…The axial code was performed to get critical problem-related health data in the hospital. …”
Get full text
Article -
780
Transformer-Based Vulnerability Detection in IoT Firmware Binaries Using Opcode Sequences
Published 2025-01-01“…Firmware security is critical for maintaining the integrity of embedded systems. …”
Get full text
Article