Showing 2,001 - 2,020 results of 10,293 for search 'data coding', query time: 0.21s Refine Results
  1. 2001

    Developing a Model to Improve the Quality of Tax Audits by Ramin Jamshidi, Bahram Barzegar, Abdolreza Mohseni

    Published 2022-08-01
    “…The participants were selected using theoretical sampling. Data analysis was performed in three phases: open coding, axial coding, and selective coding using MAXQDA software. …”
    Get full text
    Article
  2. 2002
  3. 2003

    APPLICATION OF NON-TEST METHODS FOR CHANEL ESTIMATION by M. L. Maslakov, M. S. Smal

    Published 2018-08-01
    “…For the  problem solution,  methods based  on the  analysis  of the  received  information signal, taking  into  account the used  signal-code  construction, are proposed. Approaches for solving problems of non-test adaptive signals correction  and channel state  estimation in serial data  communication systems using  convolutional encoder  are  proposed. …”
    Get full text
    Article
  4. 2004

    Crowd-Sourced Evaluation: A Qualitative Study of User-Generated Product Review Videos on ExpoTV.com by Kurt Wilson

    Published 2012-01-01
    “…Analyzed in three stages – In Vivo coding, Axial coding and theme identification. Findings:  This article finds intriguing strengths to user-generated video as an evaluation data source because user-generated product review videos consistently demonstrate three important elements of evaluation: they provide a description of the product, explain the broader context for both the product and nature of the specific review, and provide an evaluative conclusion that is logically related to specific evaluative descriptions.   …”
    Get full text
    Article
  5. 2005

    Determination of the total neutron cross section for natural hafnium on the filtered neutron beam with 2 keV energy by О. О. Gritzay, А. K. Grymalo, V. A. Pshenychnyi

    Published 2017-12-01
    “…Obtained value of the total neutron cross section of the natHf was compared with the data of other authors and with data from the evaluated nuclear data libraries.…”
    Get full text
    Article
  6. 2006
  7. 2007
  8. 2008

    PRIVOT: Privacy-Resilient Intelligent DAG Blockchain Architecture for IoT by Faisal Alanazi, Mahdi Zareei, Alberto Rodriguez Arreola

    Published 2025-01-01
    “…The rapid growth of the Internet of Things (IoT) demands solutions that can secure massive streams of sensitive data without sacrificing performance. Traditional blockchains struggle in IoT environments, facing significant challenges with transaction speed, scalability, and privacy. …”
    Get full text
    Article
  9. 2009

    Gut microbiota orchestrates skeletal muscle development and metabolism in germ-free and SPF pigs by Zhengjie Li, Mingxing Wen, Chuang Tang, Shuangshuang Chen, Die Tang, Jinwei Zhang, Jinwei Zhang, Jinwei Zhang, Jing Sun, Jing Sun, Jing Sun, Liangpeng Ge, Liangpeng Ge, Liangpeng Ge, Keren Long, Lu Lu, Long Jin, Mingzhou Li, Xuewei Li, Jideng Ma

    Published 2025-06-01
    “…This study elucidates the interaction mechanisms between the gut microbiota and skeletal muscle, providing a theoretical foundation and data support for further exploration of the microbiota-muscle axis in pathophysiological contexts.…”
    Get full text
    Article
  10. 2010

    Research and application of terminal service integration digital engine in power supply stations by Yongliang ZHAO, Yuanhang NIU, Xianfeng WANG, Qinwu LIAO, Junshuai FANG

    Published 2023-11-01
    “…In view of the common problems in power supply stations such as multiple systems, poor App experience, non linkage, and difficult data acquisition, zero code technology and robotic process automation (RPA) technology were researched, terminal service integration digital engine was built, providing zero code construction capability, order management capability, PC and mobile terminals collaboration capability, which was suitable for various disciplines such as electricity bills, metering, material, so as to realize the online, automated and mobile common service, reduce the burden and increase efficiency for the employees.…”
    Get full text
    Article
  11. 2011

    Host’s source address verification based on stream authentication in the IPv6 access subnet by Yue CHEN, Hong-yong JIA, Peng-xu TAN, Jing SHAO

    Published 2013-01-01
    “…A cryptographically-implemented high-speed source address verification scheme for the hosts in the IPv6 access subnet was proposed.The MAC address was used as the identity of the host machine and bounded with the host’s public key.Then the IPv6 address was derived from the host machine’s public key using the cryptographically generated address algorithm.The address authenticity was guaranteed by the digital signature and the fast and secure source address verification for packet stream was achieved through message authentication code algorithm and stream authentication.The experimental system show that the scheme could ver fy the source addresses of data packets at a loss cost.Thus,it is a secure and feasible scheme.…”
    Get full text
    Article
  12. 2012
  13. 2013
  14. 2014

    Addressing the Addressees: A Discourse Stylistic Study of the Vocatives in the Holy Qurʼān by Sarwat Awan, Tazanfal Tehseem, Saba Zulfiqar

    Published 2020-12-01
    “…Each group has different codes of their religion which have been considered here as cultural codes. …”
    Get full text
    Article
  15. 2015
  16. 2016

    Performance of the Direct Sequence Spread Spectrum Underwater Acoustic Communication System with Differential Detection in Strong Multipath Propagation Conditions by Jan H. SCHMIDT, Iwona KOCHAŃSKA, Aleksander M. SCHMIDT

    Published 2024-01-01
    “…This paper describes the DSSS data transmission tests in the simulation and experimental environment, using different types of pseudo-noise sequences: m-sequences and Kasami codes of the order 6 and 8. …”
    Get full text
    Article
  17. 2017

    Developing Laterality-Specific Computable Phenotypes from Electronic Health Record Data, Employing Treatment-Warranted Diabetic Macular Edema as a Use Case by Kaili Ding, MBBS, MS, Tracy Z. Lang, BS, Roberta McKean-Cowdin, PhD, Hossein Ameri, MD, PhD, Narsing A. Rao, MD, Brian C. Toy, MD

    Published 2025-09-01
    “…Subjects: Patients with diabetic retinopathy (DR) identified from a health safety net system and a university hospital in Los Angeles, California, employing diagnosis and procedure codes from 2013 to 2023. Methods: We investigated the completeness and accuracy of laterality-specific TW-DME status based on the following 5 categories of data: Tier 1-Physician Procedure Documentation, Tier 2-Charge Codes (Professional and Facility), Tier 3-Medication Orders, Tier 4-Crosswalked Procedure Codes, and Tier 5-Diagnosis Code associated with Procedure. …”
    Get full text
    Article
  18. 2018
  19. 2019
  20. 2020

    Patterns of claims and determinants of claim rejections in Kuwait's National Health Insurance for Retirees (AFYA): a comprehensive analysis by Abdullah I. Alibrahim, Abdullah I. Alibrahim, Abdullah I. Alibrahim, Abdullah I. Alibrahim, Hisham Kelendar, Abdulaziz Alhenaidi

    Published 2025-07-01
    “…IntroductionHealth insurance claim rejections can impose significant administrative and financial burdens, yet data from emerging national programs are limited. …”
    Get full text
    Article