Suggested Topics within your search.
Suggested Topics within your search.
- Agriculture 1
- Artificial Intelligence 1
- Artificial intelligence 1
- Automobiles 1
- Data Mining and Knowledge Discovery 1
- Data mining 1
- Economic Policy 1
- Economic policy 1
- Energy Policy, Economics and Management 1
- Energy and state 1
- Energy policy 1
- Environmental Economics 1
- Environmental economics 1
- Fault location (Engineering) 1
- Industrial Organization 1
- Industrial organization 1
- Maintenance and repair 1
- Soil Science & Conservation 1
- Soil conservation 1
- Soil science 1
- Sustainable Development 1
- Sustainable development 1
-
2001
Developing a Model to Improve the Quality of Tax Audits
Published 2022-08-01“…The participants were selected using theoretical sampling. Data analysis was performed in three phases: open coding, axial coding, and selective coding using MAXQDA software. …”
Get full text
Article -
2002
Research and Exploration for PON Resource Automatic Discovery
Published 2013-10-01Get full text
Article -
2003
APPLICATION OF NON-TEST METHODS FOR CHANEL ESTIMATION
Published 2018-08-01“…For the problem solution, methods based on the analysis of the received information signal, taking into account the used signal-code construction, are proposed. Approaches for solving problems of non-test adaptive signals correction and channel state estimation in serial data communication systems using convolutional encoder are proposed. …”
Get full text
Article -
2004
Crowd-Sourced Evaluation: A Qualitative Study of User-Generated Product Review Videos on ExpoTV.com
Published 2012-01-01“…Analyzed in three stages – In Vivo coding, Axial coding and theme identification. Findings: This article finds intriguing strengths to user-generated video as an evaluation data source because user-generated product review videos consistently demonstrate three important elements of evaluation: they provide a description of the product, explain the broader context for both the product and nature of the specific review, and provide an evaluative conclusion that is logically related to specific evaluative descriptions. …”
Get full text
Article -
2005
Determination of the total neutron cross section for natural hafnium on the filtered neutron beam with 2 keV energy
Published 2017-12-01“…Obtained value of the total neutron cross section of the natHf was compared with the data of other authors and with data from the evaluated nuclear data libraries.…”
Get full text
Article -
2006
Evaluated empirical systematics of (n, nα) reaction cross-sections at 14 - 15 MeV incident energy
Published 2019-09-01Get full text
Article -
2007
RON‐based cross‐chain routing optimization strategy in metaverse
Published 2024-12-01Get full text
Article -
2008
PRIVOT: Privacy-Resilient Intelligent DAG Blockchain Architecture for IoT
Published 2025-01-01“…The rapid growth of the Internet of Things (IoT) demands solutions that can secure massive streams of sensitive data without sacrificing performance. Traditional blockchains struggle in IoT environments, facing significant challenges with transaction speed, scalability, and privacy. …”
Get full text
Article -
2009
Gut microbiota orchestrates skeletal muscle development and metabolism in germ-free and SPF pigs
Published 2025-06-01“…This study elucidates the interaction mechanisms between the gut microbiota and skeletal muscle, providing a theoretical foundation and data support for further exploration of the microbiota-muscle axis in pathophysiological contexts.…”
Get full text
Article -
2010
Research and application of terminal service integration digital engine in power supply stations
Published 2023-11-01“…In view of the common problems in power supply stations such as multiple systems, poor App experience, non linkage, and difficult data acquisition, zero code technology and robotic process automation (RPA) technology were researched, terminal service integration digital engine was built, providing zero code construction capability, order management capability, PC and mobile terminals collaboration capability, which was suitable for various disciplines such as electricity bills, metering, material, so as to realize the online, automated and mobile common service, reduce the burden and increase efficiency for the employees.…”
Get full text
Article -
2011
Host’s source address verification based on stream authentication in the IPv6 access subnet
Published 2013-01-01“…A cryptographically-implemented high-speed source address verification scheme for the hosts in the IPv6 access subnet was proposed.The MAC address was used as the identity of the host machine and bounded with the host’s public key.Then the IPv6 address was derived from the host machine’s public key using the cryptographically generated address algorithm.The address authenticity was guaranteed by the digital signature and the fast and secure source address verification for packet stream was achieved through message authentication code algorithm and stream authentication.The experimental system show that the scheme could ver fy the source addresses of data packets at a loss cost.Thus,it is a secure and feasible scheme.…”
Get full text
Article -
2012
Corporate governance in Serbian family-owned companies: Idle opportunities
Published 2023-01-01Get full text
Article -
2013
Spatial Images in Nominations of Feelings of Disgust and Rejection (on Material of Russian Dialect Lexis)
Published 2018-12-01Get full text
Article -
2014
Addressing the Addressees: A Discourse Stylistic Study of the Vocatives in the Holy Qurʼān
Published 2020-12-01“…Each group has different codes of their religion which have been considered here as cultural codes. …”
Get full text
Article -
2015
-
2016
Performance of the Direct Sequence Spread Spectrum Underwater Acoustic Communication System with Differential Detection in Strong Multipath Propagation Conditions
Published 2024-01-01“…This paper describes the DSSS data transmission tests in the simulation and experimental environment, using different types of pseudo-noise sequences: m-sequences and Kasami codes of the order 6 and 8. …”
Get full text
Article -
2017
Developing Laterality-Specific Computable Phenotypes from Electronic Health Record Data, Employing Treatment-Warranted Diabetic Macular Edema as a Use Case
Published 2025-09-01“…Subjects: Patients with diabetic retinopathy (DR) identified from a health safety net system and a university hospital in Los Angeles, California, employing diagnosis and procedure codes from 2013 to 2023. Methods: We investigated the completeness and accuracy of laterality-specific TW-DME status based on the following 5 categories of data: Tier 1-Physician Procedure Documentation, Tier 2-Charge Codes (Professional and Facility), Tier 3-Medication Orders, Tier 4-Crosswalked Procedure Codes, and Tier 5-Diagnosis Code associated with Procedure. …”
Get full text
Article -
2018
Identification of patients undergoing chronic kidney replacement therapy in primary and secondary care data: validation study based on OpenSAFELY and UK Renal Registry
Published 2024-08-01“…Codes also identified many patients who were not recipients of chronic kidney replacement therapy in UKRR data, particularly dialysis codes. …”
Get full text
Article -
2019
Predicting molecular mechanisms of hereditary diseases by using their tissue‐selective manifestation
Published 2023-05-01Get full text
Article -
2020
Patterns of claims and determinants of claim rejections in Kuwait's National Health Insurance for Retirees (AFYA): a comprehensive analysis
Published 2025-07-01“…IntroductionHealth insurance claim rejections can impose significant administrative and financial burdens, yet data from emerging national programs are limited. …”
Get full text
Article