Suggested Topics within your search.
Suggested Topics within your search.
-
2121
How lived experiences of illness trajectories, burdens of treatment, and social inequalities shape service user and caregiver participation in health and social care: a theory-info...
Published 2025-06-01“…They lose their ‘personal capacity’; this happens when people find it difficult to access care, find their diagnosis shocking and become fearful about the future. Symptoms can make it difficult to manage and may also make people think differently about them. …”
Get full text
Article -
2122
Understanding Home Health Agencies' Perspectives Toward Telehealth Use Among Home Health Stakeholders in the Post–COVID-19 Era: Qualitative Interview Study
Published 2025-08-01“…ResultsStakeholders identified 4 key themes: (1) telehealth offers operational efficiencies (eg, increased patient touchpoints and workforce support) and clinical benefits (eg, improved patient monitoring and potential reduction in rehospitalizations); (2) the lack of CMS reimbursement makes telehealth adoption financially unsustainable for many HHAs; (3) specific HHAs, particularly those integrated with health systems or serving high-risk patient populations, may derive sufficient benefits to continue telehealth use despite financial constraints; and (4) current regulatory policies, including new CMS G-codes, increase administrative burden without providing financial incentives and discouraging telehealth adoption. …”
Get full text
Article -
2123
SIMPLE: Simple Intensity Map Producer for Line Emission
Published 2023-01-01“…We present the Simple Intensity Map Producer for Line Emission ( Simple ), a public code for quickly simulating mock line-intensity maps, and an analytical framework for modeling intensity maps including observational effects. …”
Get full text
Article -
2124
PUBLIC DANGER AND CURRENT ISSUES OF QUALIFICATION OF VIOLATION OF INVIOLABILITY OF HOUSING
Published 2025-03-01“…Purpose: to determine, based on the analysis of criminal legislation and modern judicial practice, the influence of various circumstances on the degree of public danger of violating the inviolability of housing; to interpret the basic concepts used in Article 139 of the Criminal Code of the Russian Federation; to develop recommendations for qualifying the crime; to make proposals for amending the current legislation. …”
Get full text
Article -
2125
SURROGATE MOTHER “RENTAL AGREEMENT MADE IN THE PRESENCE OF A NOTARY
Published 2024-01-01“…Likewise with regulations in the realm of civil law, even though Article 1338 of the Civil Code states that "All agreements made legally apply to the law for those who make them," Article 1320 of the Civil Code provides conditions for the validity of an agreement, one of which is the existence of a halal cause. …”
Get full text
Article -
2126
The advantages of lexicon-based sentiment analysis in an age of machine learning.
Published 2025-01-01“…Assessing whether texts are positive or negative-sentiment analysis-has wide-ranging applications across many disciplines. Automated approaches make it possible to code near unlimited quantities of texts rapidly, replicably, and with high accuracy. …”
Get full text
Article -
2127
LI-FI TECHNOLOGY AND THE NEW CONCEPT OF DATA TRANSFER SECURITY
Published 2017-05-01“…It works basically like an incredibly advanced form of Morse code - flicking an LED on and off at extreme speeds and can be used to write and transmit things in binary code. …”
Get full text
Article -
2128
Confidential communication scheme based on uncertainty of underwater noisy channels
Published 2019-04-01“…Aiming at the influence of the uncertainty of underwater noise on information transmission and the security problem of the communication over noisy channels,a confidential communication scheme based on the uncertainty of underwater noisy channels was proposed.The proposed scheme was composed of an interactive key extraction protocol based on Godel’s code and a privacy amplification protocol based on r-circulant Toeplitz matrix.During the process of key extraction,the key sequence comparing number was reduced through the Godel’s code.When calculating the key length after privacy amplification,the uncertainty of underwater noise was considered to make the proposed scheme more practical.Experimental results show that under the condition of satisfying protocol security,it takes 11.99 s to transmit 119 940 bit string where the lower bound of the generated secret key length is 117 331 bit after privacy amplification and the upper bound of the adversary’s information about the secret key is 2 609 bit.Moreover,the proposed scheme (nt+s)×(nt+s)-order r-circulant Toeplitz matrix decreases(nt+s)-1 bit memory space compared to the traditional Toeplitz matrix with the same order.…”
Get full text
Article -
2129
Klinische Sportmedizin
Published 2015-05-01“…The paper discusses the implications of this realisation to make the case that increased transparency could strengthen the fight against doping. …”
Get full text
Article -
2130
Research on Primary Knock-on Atom and DPA Calculation in SiC Fuel Clad of Micro Gas-cooled Reactor
Published 2025-01-01“…In addition, inelastic scattering also makes a small contribution. The additional recoils due to the subsequent decay of radionuclides produced by transmutation reactions were further considered using a self-developed neutron activation analysis code named NIAC. …”
Article -
2131
El texto, la escena apuntes de Semiótica del texto oral
Published 1990-01-01“…It brings forth many verbal and non-verbal code, whose connections one must read in order to entirely comprehend; it not they seem "inferior" to written text. …”
Get full text
Article -
2132
Simulation of ions interaction with biological environment using Geant4
Published 2017-08-01“…Computer model that makes it possible to study the interaction of ion beam with biological objects has been created. …”
Get full text
Article -
2133
Research on Visual Servo Grasping of Household Objects for Nonholonomic Mobile Manipulator
Published 2014-01-01“…Experimental results show that QR Code-based artificial object mark can overcome the difficulties brought by household objects’ variety and operation complexity, and the proposed visual servo scheme makes it possible for service robot to grasp and deliver objects efficiently.…”
Get full text
Article -
2134
Seismic retrofit of high-rise buildings using buckling-restrained braces: design methodology and performance evaluation
Published 2025-07-01“…In this retrofit, BRB were adopted to make the structure comply with the modern seismic code (GB 50011-2010). …”
Get full text
Article -
2135
A Procedure for Extending Input Selection Algorithms to Low Quality Data in Modelling Problems with Application to the Automatic Grading of Uploaded Assignments
Published 2014-01-01“…It will be shown that this technique makes the most use of the available information in some vague datasets. …”
Get full text
Article -
2136
Improved Low-Complexity, Pilot-Based Channel Estimation for Large Intelligent Surface Systems
Published 2025-03-01“…It also looks at more advanced methods, like using low-density parity-check (LDPC) codes, antenna selection, and optimized pilot design, to make the method more accurate and effective. …”
Get full text
Article -
2137
CONSTRUCTION OF SUBSTITUTION BOX (S-BOX) BASED ON IRREDUCIBLE POLYNOMIALS ON GF(2^8)
Published 2024-03-01“…In contrast, the S-Box represented by hexadecimal code 169 displays a relatively lower level of security, with an average d value of 3.8750 and an average value of 0.5156. …”
Get full text
Article -
2138
Optimizing Velocity Field Measurement with 3D-Printed Particles and MATLAB: A Cost-Effective System for Flow Visualization
Published 2024-12-01“…Code workflow and how to make a correct selection of the processing parameters and its activity are explained and demonstrated on artificial images, generated by a computer, as well as real images, obtained in a 2D-test in the tank, achieving an accuracy, in absolute values, of 95%. …”
Get full text
Article -
2139
Uncertainty Quantification and Assimilation Method Based on Evaluated Nuclear Data Sampling Method
Published 2025-06-01“…For transport calculations, the Monte Carlo code NECP-MCX and the deterministic code NECP-SARAX were employed to compute prior effective multiplication factors, control rod worth, and sodium void reactivity coefficients. …”
Article -
2140
A Common Language of Software Evolution in Repositories (CLOSER)
Published 2025-01-01“…Version Control Systems (VCSs) are used by development teams to manage the collaborative evolution of source code, and there are several widely used industry standard VCSs. …”
Get full text
Article