Suggested Topics within your search.
Suggested Topics within your search.
-
21
Updated Protocol for Stroke Code Management in Prehospital Settings: The Iranian Comprehensive Stroke Code Management Program (ICSCM Phase II)
Published 2025-04-01“…Methods: This study represents the results of the second phase of the Iranian Comprehensive Stroke Code Management Program, a mixed methods study. We used the Caspian scientific 10-step method to update this protocol, which included a literature review, critical appraisal, extraction of recommendations, face-content validity, the Delphi method, RAND method, expert panel, stakeholders, and publishing and printing. …”
Get full text
Article -
22
Fruit fast tracking and recognition of apple picking robot based on improved YOLOv5
Published 2024-10-01Subjects: “…adaptive codes…”
Get full text
Article -
23
Arboricultural codes of ethics lack protection for trees, wildlife, and biodiversity: A review of codes from national and international professional associations
Published 2025-03-01“…The lack of specific prohibitions or mandates on environmentally friendly practices may allow practitioners to take advantage of COE loopholes, which would allow environmentally negative practice that could not be disciplined by an ethics committee unless the code was revised. While an alternative means of environmental governance through COEs might examine whether professional members adhered to local laws and regulations, associations may face difficulties in reviewing and properly applying legislation in disciplining their members, particularly when international associations must review legislation outside of the ethics committee's region(s) of practice. …”
Get full text
Article -
24
THE ROLE OF THE CODE OF ETHICS IN THE CONTEMPORARY FIRMS ACTIVITY
Published 2010-01-01Get full text
Article -
25
Impact of Computer-Mediated Versus Face-to-Face Motivational-Type Interviews on Participants’ Language and Subsequent Cannabis Use: Randomized Controlled Trial
Published 2025-04-01“…However, no studies have compared the information obtained from traditional face-to-face motivational interviews and computer-mediated motivational interviews or resulted in the same amount of behavior change. …”
Get full text
Article -
26
Automatic Coding of Facial Expressions of Pain: Are We There Yet?
Published 2022-01-01“…Our aim is to compare manual with automatic AU coding of facial expressions of pain. Methods. FaceReader7 was used for automatic AU detection. …”
Get full text
Article -
27
Beyond COVID-19 Lockdowns: Rethinking Mathematics Education from a Student Perspective
Published 2024-07-01“…Undoubtedly, the return to face-to-face learning has been affected after two years of distance learning. …”
Get full text
Article -
28
Stable coding of aversive associations in medial prefrontal populations
Published 2023-12-01“…What mPFC neuronal populations represent when we face threats? To address this question, we performed electrophysiological single-unit population recordings in the dorsal mPFC while mice faced threat-predicting cues eliciting defensive behaviours, and performed pharmacological and optogenetic inactivations of this area and the amygdala. …”
Get full text
Article -
29
Thick Film Transducers for High Frequency Coded Ultrasonography
Published 2013-10-01“…As anticipated, in all cases the focal distance was up to 10% closer to the transducer face than the one related to the curvature radius. …”
Get full text
Article -
30
Reduced face aftereffects in autism are not due to poor attention.
Published 2013-01-01“…These findings support the notion that diminished face aftereffects in autism reflect atypicalities in adaptive norm-based coding, which could also contribute to face processing difficulties in this group.…”
Get full text
Article -
31
Les codes graphiques contemporains de l’occitan
Published 2019-12-01“…In this strong cultural context, the question of the graphic code took on a particular relief while referring for some of its features to the situation of Occitan in general.…”
Get full text
Article -
32
A Pilot Study Comparing the Efficacy, Fidelity, Acceptability, and Feasibility of Telehealth and Face-to-Face Creative Movement Interventions in Children with Autism Spectrum Disor...
Published 2024-04-01“…Aims: We compared the efficacy, fidelity, acceptability, and feasibility of a creative movement (CM) intervention for children with autism spectrum disorder (ASD), delivered face-to-face (F2F) or through telehealth (TH). Methods: Fifteen children with ASD received the CM intervention F2F or through TH. …”
Get full text
Article -
33
University Students’ Views on the Challenges Faced by Students with Difficulties
Published 2024-11-01Get full text
Article -
34
Rdfinet: reference-guided directional diverse face inpainting network
Published 2024-07-01“…Our network has achieved SOTA results in face diverse inpainting when writing. Code will is available at https://github.com/nothingwithyou/RDFINet .…”
Get full text
Article -
35
Video-feedback intervention for promoting social engagement in children with neurodevelopmental disabilities
Published 2025-01-01“…., engagement and emotionality) in children with NDs during normal or stressful interactions (i.e., the Face-to-Face Still-Face, [FFSF]) paradigm.MethodsA single-cohort design with pre-(T0) and post-(T1) intervention assessment was used to evaluate 37 mother–child dyads from three units in Northern Italy. …”
Get full text
Article -
36
PEMILIHAN KRIM WAJAH TERBAIK YANG MENGANDUNG CERAMIDE MENGGUNAKAN METODE TOPSIS
Published 2020-10-01“…This means that the P1 brand code has the highest value of other face cream products with the lowest price rating of other products namely rating 5 (21.07), the packaging is quite good with a rating of 3 (8.62) and the composition is quite a lot with a value of 3 (9, 71). …”
Get full text
Article -
37
Zernike Moments Description of Solar and Astronomical Features: Python Code
Published 2023-11-01Get full text
Article -
38
Moral ambiguity: Some shortcomings of professional codes of ethics for translators
Published 2011-01-01“…The codes are then compared with issues discussed in the Ethics and Professionalism forum of TranslatorsCafe.com to help illustrate whether and how the codes could apply to ethical dilemmas faced by translators in their practice.…”
Get full text
Article -
39
Characteristics of common code conducted emission of multi-boost converters
Published 2023-12-01Get full text
Article -
40
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article