-
3201
Benefits and Applications of Oncotype DX Breast Recurrence Score Testing among Breast Cancer Patients: Current Recommendations and Controversies.
Published 2023-06-01“…We hereby aimed to review Oncotype DX testing from its initial implementation to the actual clinical setting. In addition, we revise some of the most clinically relevant studies that led to its incorporation into the international breast cancer guidelines. …”
Get full text
Article -
3202
A Reflective Account of Character-Based Professional Learning in Higher Education
Published 2024-11-01“…The reflective narrative and evaluation of ideas led to a decision about the factors that aided the project’s implementation. In future professional learning opportunities, determining attendees’ prior knowledge of the content and additional internal support for communication and development plans is key. …”
Get full text
Article -
3203
CORPORATE GOVERNANCE IN THE AGE OF GENERATIVE AI A LEGAL PERSPECTIVE
Published 2024-04-01“…The emergence of Artificial Intelligence (AI) technology has brought significant changes to corporate governance, presenting various opportunities and challenges. The implementation of AI in corporate governance can have a significant impact on the level of governance and create conditions that support better decision-making. …”
Get full text
Article -
3204
Coordinate transformation based coefficients estimation algorithm for digital predistortion of RF power amplifiers
Published 2015-01-01“…Based on the low-IF digital predistortion (DPD) architecture,a coordinate transformation based low-complex coefficients estimation algorithm is proposed to reduce the hardware implementation cost and numerical calculation complexity significantly.The proposed algorithm transforms the complex multiplication of the conventional DPD coefficients estimation method to amplitude multiplication and phase addition in polar coordinates.To complete the same calculation,times of multiplications and accumulations are reduced by 75% and 50%.The algorithm is derived from the general Volterra pass-band nonlinear model,and proves the equivalency of baseband predistortion and IF predistortion.The proposed low-IF architecture and the coefficients estimation algorithm are verified by the measurement results on a practical radio frequency power amplifier.…”
Get full text
Article -
3205
Public transport development and changing transport behavior
Published 2023-06-01“…The growing digitalization leads to the creation of a wide variety of proposals for the implementation of mobility and its use. In addition to multimodality, this also applies to suggestions for information support and organization of systems.…”
Get full text
Article -
3206
Handy formulas for binomial moments
Published 2024-07-01“…The obtained formulas are arguably better structured, simpler and superior in their numerical properties compared to prior works. In addition, the paper presents algorithms to derive these formulas along with working implementation in Python’s symbolic algebra package. …”
Get full text
Article -
3207
MOVES AND GRAMMATICAL CONSTRUCTIONS OF RESEARCH ARTICLE ABSTRACTS
Published 2018-12-01“…Rhetoric in writing an abstract is required for the writers’ goal which is to deliver adequate information to the readers by implementing an appropriate compositional structure of the abstract. …”
Get full text
Article -
3208
An approach for solving multi-objective assignment problem with interval parameters
Published 2014-09-01“…Hence, the model is converted into crisp linear programming problem by applying a substitution variables approach. In addition, a weighted min-max method is applied to transform the multi-objective problem into a single objective optimization problem. …”
Get full text
Article -
3209
Identifying influential factors on integrated marketing planning using information technology
Published 2014-07-01“…Using some statistical test, the study has confirmed the effects of three factors on integrated marketing. In addition, the implementation of Freedman test has revealed that structural factors were the most important factor followed by background factors and behavioral factors.…”
Get full text
Article -
3210
The Oasis Enrichment Model: A comprehensive program to foster Talent
Published 2010-04-01“…Several experts in gifted education were involved in the design, implementation and evaluation of the results. The model was tested in a group of public schools, in the Kingdom of Saudi Arabia (KSA). …”
Get full text
Article -
3211
Extended access control mechanism for cross-domain data exchange
Published 2019-07-01“…Aiming at the controlled sharing for cross-domain data exchange for complicated application systems,an extended access control mechanism was proposed.The control process was divided into two steps:constraint control and propagation control.The constraint control was used to ensure that access to data was authorized before access request,and the propagation control was used for further extension control after obtaining data access right.In addition,by considering data self and data provenance,the direct and indirect access control were realized.Theoretically,the security and effectiveness of the proposed mechanism were proved.Finally,taking the control of electronic invoice as an example,the implementation approach was proposed.The example shows that the proposed mechanism can perform the fine-grained extended control before and after data in the cross-domain and cross-system are exchanged.…”
Get full text
Article -
3212
Gouvernance des politiques de relocalisation face au risque de montée du niveau de la mer
Published 2016-04-01“…This article addresses the local governance conditions for adaptation policies through the case of relocation which is one of the recommended measures for adaptation to sea level rise. In addition to the funding issue, the local governance conditions for these policies are addressed through a review of arrangements that would support the implementation of relocation. …”
Get full text
Article -
3213
Review of information hiding on Chinese text
Published 2019-09-01“…Text information hiding is an important technology to protect the security and integrity of text content.The research progress of Chinese text information hiding was reviewed.According to the clue of Chinese text information hiding,the existing algorithms were divided into three categories,algorithms based on text images,algorithms based on text format and algorithms based on text content.The implementation process of each type of algorithm was elaborated and the advantages and disadvantages of the algorithm were analyzed.At the same time,their principles,embedded capacity and anti-attack capability was compared and analyzed.In addition,the problems existing in Chinese text information hiding technology was summarized,and the research trends were discussed in the future.It is expected to provide reference for research in this field.…”
Get full text
Article -
3214
Results of experimental testing of hee girl students’ motor skills at aerobic trainings
Published 2015-10-01“…Motor skills level was tested with the help of state and additional tests. Results: it was found that for training quickness it is necessary to use rope skipping in mode, corresponding to development of this quality. …”
Get full text
Article -
3215
Algorithms for estimating modular numbers in floating-point arithmetic
Published 2022-09-01“…In the residue number system (RNS), the operations of addition, subtraction, and multiplication are executed in parallel for different digits (residues) of the modular numbers. …”
Get full text
Article -
3216
Improvement of Channel Coding System in Narrowband Communication System
Published 2013-05-01“…With the advantages of low complexity and easy implementation,convolution code is widely used in practical communication systems. …”
Get full text
Article -
3217
De cima para baixo: a sobreposição de conceitos, territórios e normas
Published 2017-12-01“…Based on a reflection on an environmental policy for the creation and implementation of parks which isruled by the dominant conservationist frame of mindthis paper aims to discuss how the top-down imposition contributes to the social exclusion of traditional and indigenous populations who get involved in these processes. …”
Get full text
Article -
3218
The Role of Digitalization in Enhancing Green Innovation Efficiency: Examination of Multiple Sub-Dimensions, Transformation Speed, and Heterogeneity
Published 2025-06-01“…Key digitalization components, including cloud computing and digital technology applications, emerge as pivotal in improving green innovation efficiency, whereas technologies like artificial intelligence, blockchain, and big data face implementation challenges. Additionally, the speed of digitalization is shown to amplify these benefits. …”
Get full text
Article -
3219
THE FULFILLMENT OF WOMEN'S PRISONERS' RIGHTS AS ONE OF THE VULNERABLE GROUPS IN CORRECTIONAL INSTITUTIONS
Published 2025-03-01“…The findings indicate that although there are some policies in place, their implementation still faces significant obstacles. The article recommends the need for policy reforms, improved facilities, and specialized training for staff to more effectively and fairly meet the rights of female inmates. …”
Get full text
Article -
3220
Cultivating Ethics and Empathy through Character Building to Prevent Acts of Sexual Violence and Bullying
Published 2024-12-01“…The program evaluation indicated significant improvements: 85% of students reported increased awareness of empathy, while bullying and sexual violence cases decreased by 35%. Additionally, parental involvement in school activities increased by 50%. …”
Get full text
Article