Showing 2,121 - 2,140 results of 2,827 for search 'making and coding', query time: 0.14s Refine Results
  1. 2121

    How lived experiences of illness trajectories, burdens of treatment, and social inequalities shape service user and caregiver participation in health and social care: a theory-info... by Carl R May, Katja C Gravenhorst, Alyson Hillis, Mick Arber, Carolyn A Chew-Graham, Katie I Gallacher, Frances S Mair, Ellen Nolte, Alison Richardson

    Published 2025-06-01
    “…They lose their ‘personal capacity’; this happens when people find it difficult to access care, find their diagnosis shocking and become fearful about the future. Symptoms can make it difficult to manage and may also make people think differently about them. …”
    Get full text
    Article
  2. 2122

    Understanding Home Health Agencies' Perspectives Toward Telehealth Use Among Home Health Stakeholders in the Post–COVID-19 Era: Qualitative Interview Study by Daniel Spertus, Kiran Abraham-Aggarwal, Mark Aaron Unruh, Jiani Yu, Kathryn H Bowles, Michael P Thompson, Cisco Espinosa, Hye-Young Jung, Madeline R Sterling

    Published 2025-08-01
    “…ResultsStakeholders identified 4 key themes: (1) telehealth offers operational efficiencies (eg, increased patient touchpoints and workforce support) and clinical benefits (eg, improved patient monitoring and potential reduction in rehospitalizations); (2) the lack of CMS reimbursement makes telehealth adoption financially unsustainable for many HHAs; (3) specific HHAs, particularly those integrated with health systems or serving high-risk patient populations, may derive sufficient benefits to continue telehealth use despite financial constraints; and (4) current regulatory policies, including new CMS G-codes, increase administrative burden without providing financial incentives and discouraging telehealth adoption. …”
    Get full text
    Article
  3. 2123

    SIMPLE: Simple Intensity Map Producer for Line Emission by Maja Lujan Niemeyer, José Luis Bernal, Eiichiro Komatsu

    Published 2023-01-01
    “…We present the Simple Intensity Map Producer for Line Emission ( Simple ), a public code for quickly simulating mock line-intensity maps, and an analytical framework for modeling intensity maps including observational effects. …”
    Get full text
    Article
  4. 2124

    PUBLIC DANGER AND CURRENT ISSUES OF QUALIFICATION OF VIOLATION OF INVIOLABILITY OF HOUSING by NOVIKOV Valery Anatolyevich

    Published 2025-03-01
    “…Purpose: to determine, based on the analysis of criminal legislation and modern judicial practice, the influence of various circumstances on the degree of public danger of violating the inviolability of housing; to interpret the basic concepts used in Article 139 of the Criminal Code of the Russian Federation; to develop recommendations for qualifying the crime; to make proposals for amending the current legislation. …”
    Get full text
    Article
  5. 2125

    SURROGATE MOTHER “RENTAL AGREEMENT MADE IN THE PRESENCE OF A NOTARY by Sonny Gondo Hudaya, Habib Adjie

    Published 2024-01-01
    “…Likewise with regulations in the realm of civil law, even though Article 1338 of the Civil Code states that "All agreements made legally apply to the law for those who make them," Article 1320 of the Civil Code provides conditions for the validity of an agreement, one of which is the existence of a halal cause. …”
    Get full text
    Article
  6. 2126

    The advantages of lexicon-based sentiment analysis in an age of machine learning. by A Maurits van der Veen, Erik Bleich

    Published 2025-01-01
    “…Assessing whether texts are positive or negative-sentiment analysis-has wide-ranging applications across many disciplines. Automated approaches make it possible to code near unlimited quantities of texts rapidly, replicably, and with high accuracy. …”
    Get full text
    Article
  7. 2127

    LI-FI TECHNOLOGY AND THE NEW CONCEPT OF DATA TRANSFER SECURITY by Ramona DUMITRAȘCU

    Published 2017-05-01
    “…It works basically like an incredibly advanced form of Morse code - flicking an LED on and off at extreme speeds and can be used to write and transmit things in binary code. …”
    Get full text
    Article
  8. 2128

    Confidential communication scheme based on uncertainty of underwater noisy channels by Ming XU, Fang CHEN

    Published 2019-04-01
    “…Aiming at the influence of the uncertainty of underwater noise on information transmission and the security problem of the communication over noisy channels,a confidential communication scheme based on the uncertainty of underwater noisy channels was proposed.The proposed scheme was composed of an interactive key extraction protocol based on Godel’s code and a privacy amplification protocol based on r-circulant Toeplitz matrix.During the process of key extraction,the key sequence comparing number was reduced through the Godel’s code.When calculating the key length after privacy amplification,the uncertainty of underwater noise was considered to make the proposed scheme more practical.Experimental results show that under the condition of satisfying protocol security,it takes 11.99 s to transmit 119 940 bit string where the lower bound of the generated secret key length is 117 331 bit after privacy amplification and the upper bound of the adversary’s information about the secret key is 2 609 bit.Moreover,the proposed scheme (nt+s)×(nt+s)-order r-circulant Toeplitz matrix decreases(nt+s)-1 bit memory space compared to the traditional Toeplitz matrix with the same order.…”
    Get full text
    Article
  9. 2129

    Klinische Sportmedizin by Kornbeck J

    Published 2015-05-01
    “…The paper discusses the implications of this realisation to make the case that increased transparency could strengthen the fight against doping. …”
    Get full text
    Article
  10. 2130

    Research on Primary Knock-on Atom and DPA Calculation in SiC Fuel Clad of Micro Gas-cooled Reactor by WANG Ziqi, GUAN Jingyu, DONG Duo, ZHANG Chenglong, ZHU Siyang, HE Kai, LIU Guoming

    Published 2025-01-01
    “…In addition, inelastic scattering also makes a small contribution. The additional recoils due to the subsequent decay of radionuclides produced by transmutation reactions were further considered using a self-developed neutron activation analysis code named NIAC. …”
    Article
  11. 2131

    El texto, la escena apuntes de Semiótica del texto oral by Lidia Beduschi

    Published 1990-01-01
    “…It brings forth many verbal and non-verbal code, whose connections one must read in order to entirely comprehend; it not they seem "inferior" to written text. …”
    Get full text
    Article
  12. 2132

    Simulation of ions interaction with biological environment using Geant4 by S. O. Liulchenko, M. О. Zhovner, O. M. Kalinkevich

    Published 2017-08-01
    “…Computer model that makes it possible to study the interaction of ion beam with biological objects has been created. …”
    Get full text
    Article
  13. 2133

    Research on Visual Servo Grasping of Household Objects for Nonholonomic Mobile Manipulator by Huangsheng Xie, Guodong Li, Yuexin Wang, Zhihe Fu, Fengyu Zhou

    Published 2014-01-01
    “…Experimental results show that QR Code-based artificial object mark can overcome the difficulties brought by household objects’ variety and operation complexity, and the proposed visual servo scheme makes it possible for service robot to grasp and deliver objects efficiently.…”
    Get full text
    Article
  14. 2134

    Seismic retrofit of high-rise buildings using buckling-restrained braces: design methodology and performance evaluation by Shengzhi Shi, Li Xin, Chao Huang, Gangqi Han, Zhaodong XU, Xinyu Chen

    Published 2025-07-01
    “…In this retrofit, BRB were adopted to make the structure comply with the modern seismic code (GB 50011-2010). …”
    Get full text
    Article
  15. 2135
  16. 2136

    Improved Low-Complexity, Pilot-Based Channel Estimation for Large Intelligent Surface Systems by Ali Gashtasbi, Mário Marques da Silva, Rui Dinis

    Published 2025-03-01
    “…It also looks at more advanced methods, like using low-density parity-check (LDPC) codes, antenna selection, and optimized pilot design, to make the method more accurate and effective. …”
    Get full text
    Article
  17. 2137

    CONSTRUCTION OF SUBSTITUTION BOX (S-BOX) BASED ON IRREDUCIBLE POLYNOMIALS ON GF(2^8) by Faldy Tita, Adi Setiawan, Bambang Susanto

    Published 2024-03-01
    “…In contrast, the S-Box represented by hexadecimal code 169 displays a relatively lower level of security, with an average d value of 3.8750 and an average   value of 0.5156. …”
    Get full text
    Article
  18. 2138

    Optimizing Velocity Field Measurement with 3D-Printed Particles and MATLAB: A Cost-Effective System for Flow Visualization by José Juan Aliaga-Maraver, Ángel Antonio Rodríguez-Sevillano, María Jesús Casati-Calzada, Rafael Bardera-Mora, Estela Barroso-Barderas, Juan Carlos García-Matías, Alfonso Láinez-Muñiz, Davide Visentin

    Published 2024-12-01
    “…Code workflow and how to make a correct selection of the processing parameters and its activity are explained and demonstrated on artificial images, generated by a computer, as well as real images, obtained in a 2D-test in the tank, achieving an accuracy, in absolute values, of 95%. …”
    Get full text
    Article
  19. 2139

    Uncertainty Quantification and Assimilation Method Based on Evaluated Nuclear Data Sampling Method by HUANG Yihan, ZU Tiejun, LIU Zhengming, CAO Liangzhi, WU Hongchun

    Published 2025-06-01
    “…For transport calculations, the Monte Carlo code NECP-MCX and the deterministic code NECP-SARAX were employed to compute prior effective multiplication factors, control rod worth, and sodium void reactivity coefficients. …”
    Article
  20. 2140

    A Common Language of Software Evolution in Repositories (CLOSER) by Jordan Garrity, David Cutting

    Published 2025-01-01
    “…Version Control Systems (VCSs) are used by development teams to manage the collaborative evolution of source code, and there are several widely used industry standard VCSs. …”
    Get full text
    Article