Showing 81 - 100 results of 142 for search 'critical procedure code', query time: 0.15s Refine Results
  1. 81

    Machine Learning Approach to Identifying Wrong-Site Surgeries Using Centers for Medicare and Medicaid Services Dataset: Development and Validation Study by Yuan-Hsin Chen, Ching-Hsuan Lin, Chiao-Hsin Fan, An Jim Long, Jeremiah Scholl, Yen-Pin Kao, Usman Iqbal, Yu-Chuan Jack Li

    Published 2025-02-01
    “…The model was trained on data from 2017 to 2019 and tested on 2020 orthopedic procedures, using ICD-10-PCS (International Classification of Diseases, Tenth Revision, Procedure Coding System) codes to distinguish body part and laterality. …”
    Get full text
    Article
  2. 82

    Pressure Vessels Structural Integrity Assessment Using Failure Analysis Diagrams by Juarez de Jesus Rocha Pinto, Miguel Mattar Neto

    Published 2025-02-01
    “…However, for evaluations requiring safety considerations under the R6 procedure, applicable to Class A service equipment in the nuclear sector, only critical length (l) = 5 mm and depth (a) = 2.5 mm are permissible values. …”
    Get full text
    Article
  3. 83

    Use of erythromycin and metoclopramide in hospitalized dogs: a multicenter historical cohort study by Ee Fung Teo, Claire R. Sharp, Claire R. Sharp, Corrin J. Boyd, Weiqin Chee

    Published 2025-04-01
    “…We hypothesized that there would be change over time and differences between institutions in the use of erythromycin and metoclopramide.MethodsDogs for inclusion were identified by fee code searches for injectable erythromycin and metoclopramide in the electronic medical record systems of The Animal Hospital at Murdoch University and Western Australian Veterinary Emergency and Specialty Hospital for the years 2018 and 2023. 75 cases from each hospital in each year were selected for inclusion from the search results using a formal randomization procedure to yield a total case number of 300. …”
    Get full text
    Article
  4. 84
  5. 85

    False expert report by Jakub Matis

    Published 2025-05-01
    “…It further discusses the procedural rules for appointing, excluding, and evaluating experts in criminal cases, emphasizing the importance of safeguarding the fairness and reliability of evidence obtained through expert testimony. …”
    Get full text
    Article
  6. 86

    SELECTED ASPECTS OF DIGITAL REPRESENTATION OF INFORMATION SYSTEMS by A. Shuparskyy, Yuriy Furgala

    Published 2024-09-01
    “…Thus, the article examines a shift from operations and operands, their further complication into code and data structures, and the transition from procedural to structured and object-oriented programming (OOP). …”
    Get full text
    Article
  7. 87
  8. 88

    Macroscopic-Level Collaborative Optimization Framework for IADS: Multiple-Route Terminal Maneuvering Area Scheduling Problem by Chaoyu Xia, Minghua Hu, Xiuying Zhu, Yi Wen, Junqing Wu, Changbo Hou

    Published 2025-07-01
    “…The terminal maneuvering area (TMA) serves as a critical transition zone between upper enroute airways and airports, representing one of the most complex regions for managing high volumes of arrival and departure traffic. …”
    Get full text
    Article
  9. 89

    Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis by Khaled Saleh, Dirar Darweesh, Omar Darwish, Eman Hammad, Fathi Amsaad

    Published 2025-06-01
    “…The swift evolution of information technology and growing connectivity in critical applications have elevated cybersecurity, protecting and certifying software and designs against rising cyber threats. …”
    Get full text
    Article
  10. 90

    On some problems of using digital technologies in the process of realizing individual rights and freedoms by A. A. Chomaev

    Published 2023-07-01
    “…The author raises the issues of the lack of uniformity of norms in the regulation of procedures for the implementation of citizens’ rights and freedoms using digital technologies and the need to adopt the Digital Code of the Russian Federation.   …”
    Get full text
    Article
  11. 91

    ViPeR: Vision-Based Surgical Phase Recognition by Soumyadeep Chandra, Sayeed Shafayet Chowdhury, Courtney Yong, Ginnie Jeng, Ashorne Mahenthiran, Kostantinos E. Morris, Harrison L. Love, Chandru P. Sundaram, Kaushik Roy

    Published 2025-01-01
    “…Surgical phase recognition is a critical, yet challenging, problem in computer vision, with significant implications for automated surgical training, intraoperative assistance, and workflow optimization. …”
    Get full text
    Article
  12. 92

    An observational study protocol on wastewater measurements and diaper culture to estimate antimicrobial resistance in long-term care facilities for people with intellectual disabil... by S Hidad, S C de Greeff, F de Haan, R Schilperoort, G L Leusink, A Timen, H Schmitt

    Published 2025-01-01
    “…<h4>Ethics and dissemination</h4>The procedures described in this study protocol will be conducted in line with principles outlined in the Declaration of Helsinki, Code of Conduct for Health research, as well as the General Data Protection Regulation. …”
    Get full text
    Article
  13. 93

    Systematic Literature Review on Security Risks and its Practices in Secure Software Development by Rafiq Ahmad Khan, Siffat Ullah Khan, Habib Ullah Khan, Muhammad Ilyas

    Published 2022-01-01
    “…Security is one of the most critical aspects of software quality. Software security refers to the process of creating and developing software that assures the integrity, confidentiality, and availability of its code, data, and services. …”
    Get full text
    Article
  14. 94

    Peculiarities of the special knowledge application in the investigation of taking a government official or law enforcement officer as hostage by O. Yu. Prokopenko

    Published 2023-12-01
    “…The purpose of the study is to investigate the scientific findings on the definition of the concept of “special knowledge” and to clarify its role in the investigation of criminal proceedings under Article 349 “Taking a government official or law enforcement officer as a hostage” of the Criminal Code of Ukraine. To achieve this goal, the study used the following methods: analysis, synthesis, comparison, critical thinking, and systemic and structural methods, with the aim of conducting a thorough study of theoretical developments, results of investigative and judicial practice, systematising the results and formulating conclusions. …”
    Get full text
    Article
  15. 95
  16. 96

    Explanation of factors affecting food choice among Iranian young adults (18 to 24 years old): a qualitative study by Maryam Mohammadzadeh, Zahra Namkhah, Elaheh Abdolahzadeh, Mehrsadat Mahdizadeh, Seyyed Reza Sobhani

    Published 2025-04-01
    “…Data analysis followed a systematic procedure involving transcription, re-reading, categorization of meaning units, coding, and theme extraction, leading to the identification of new concepts. …”
    Get full text
    Article
  17. 97

    Automated Recipe Generation AI Tool from Food Images using Machine Learning. Approach for Ingredient Extraction and Cooking Instructions by Lwamaza, Eddy, Nuwasiima, Happy

    Published 2025
    “…Furthermore, this chapter elaborates on the development process, including code implementation, testing procedures, and integration efforts, culminating in the deployment ready version of the system. …”
    Get full text
    Thesis
  18. 98

    Generation Z’s Approach to Searching for and Performing Work by Dariusz Nowak, Emil Nikolov, Joanna Wiśniewska

    Published 2025-03-01
    “…The collected empirical material was coded and converted into numerical data for detailed analyses of the population. …”
    Get full text
    Article
  19. 99

    Telemedicine use in rural areas of the United Kingdom to improve access to healthcare facilities: A review of current evidence by Rama K. Gobburi, David B. Olawade, Gbolahan Deji Olatunji, Emmanuel Kokori, Nicholas Aderinto, Aanuoluwapo Clement David-Olawade

    Published 2025-03-01
    “…Methods: The research process combines a systematic literature review with a thematic analysis using open coding. The results were presented through thematic representation from an open-coding method, following an established search strategy, inclusion/exclusion criteria, a two-step screening procedure, and data extraction. …”
    Get full text
    Article
  20. 100

    Tracing Missing Surgical Specimens: A Quality Improvement Strategy for Adverse Events Based on Root Cause Analysis by Huang LL, Yang JH, Hong WW, Wang BL, Chen HF

    Published 2025-06-01
    “…Li-Li Huang,1 Ju-Hong Yang,2 Wei-Wen Hong,3 Bin-Liang Wang,4 Hai-Fei Chen5 1Department of Quality Management, Huangyan Hospital Affiliated to Wenzhou Medical University, Taizhou, Zhejiang, People’s Republic of China; 2Infusion Room, Taizhou First People’s Hospital, Huangyan, Zhejiang, People’s Republic of China; 3Department of General Surgery, Taizhou First People’s Hospital, Taizhou, Zhejiang, People’s Republic of China; 4Department of Hospital, Taizhou First People’s Hospital, Taizhou, Zhejiang, People’s Republic of China; 5Operating Room, Taizhou First People’s Hospital, Taizhou, Zhejiang, People’s Republic of ChinaCorrespondence: Hai-Fei Chen, Operating Room, Taizhou First People’s Hospital, Taizhou, Zhejiang, China, No. 218, Hengjie Road, Huangyan District, Taizhou, Zhejiang, 318020, People’s Republic of China, Tel +86-13575807288, Email chenhaifei0803@163.com Bin-Liang Wang, Hospital Department, Taizhou First People’s Hospital, No. 218, Hengjie Road, Huangyan District, Taizhou, Zhejiang, 318020, People’s Republic of China, Email billywangchina@foxmail.comBackground: In 2022, a critical incident occurred at a Chinese hospital where a surgical specimen from a rectal prostate procedure was misplaced, necessitating repeat surgery for the patient. …”
    Get full text
    Article