Showing 21 - 40 results of 1,398 for search 'face coding', query time: 0.09s Refine Results
  1. 21

    Updated Protocol for Stroke Code Management in Prehospital Settings: The Iranian Comprehensive Stroke Code Management Program (ICSCM Phase II) by Shayan Alijanpour, Fatemeh Bahramnezhad, Ashkan Mowla, Mahdi Shafiee Sabet, Nahid Dehghan Nayeri

    Published 2025-04-01
    “…Methods: This study represents the results of the second phase of the Iranian Comprehensive Stroke Code Management Program, a mixed methods study. We used the Caspian scientific 10-step method to update this protocol, which included a literature review, critical appraisal, extraction of recommendations, face-content validity, the Delphi method, RAND method, expert panel, stakeholders, and publishing and printing. …”
    Get full text
    Article
  2. 22
  3. 23

    Arboricultural codes of ethics lack protection for trees, wildlife, and biodiversity: A review of codes from national and international professional associations by Alexander J.F. Martin, Lukas G. Olson, Tenley M. Conway

    Published 2025-03-01
    “…The lack of specific prohibitions or mandates on environmentally friendly practices may allow practitioners to take advantage of COE loopholes, which would allow environmentally negative practice that could not be disciplined by an ethics committee unless the code was revised. While an alternative means of environmental governance through COEs might examine whether professional members adhered to local laws and regulations, associations may face difficulties in reviewing and properly applying legislation in disciplining their members, particularly when international associations must review legislation outside of the ethics committee's region(s) of practice. …”
    Get full text
    Article
  4. 24
  5. 25

    Impact of Computer-Mediated Versus Face-to-Face Motivational-Type Interviews on Participants’ Language and Subsequent Cannabis Use: Randomized Controlled Trial by Karla D Llanes, Jon Amastae, Paul C Amrhein, Nadra Lisha, Katherina Arteaga, Eugene Lopez, Roberto A Moran, Lawrence D Cohn

    Published 2025-04-01
    “…However, no studies have compared the information obtained from traditional face-to-face motivational interviews and computer-mediated motivational interviews or resulted in the same amount of behavior change. …”
    Get full text
    Article
  6. 26

    Automatic Coding of Facial Expressions of Pain: Are We There Yet? by Stefan Lautenbacher, Teena Hassan, Dominik Seuss, Frederik W. Loy, Jens-Uwe Garbas, Ute Schmid, Miriam Kunz

    Published 2022-01-01
    “…Our aim is to compare manual with automatic AU coding of facial expressions of pain. Methods. FaceReader7 was used for automatic AU detection. …”
    Get full text
    Article
  7. 27

    Beyond COVID-19 Lockdowns: Rethinking Mathematics Education from a Student Perspective by Hanan Shaher Almarashdi

    Published 2024-07-01
    “…Undoubtedly, the return to face-to-face learning has been affected after two years of distance learning. …”
    Get full text
    Article
  8. 28

    Stable coding of aversive associations in medial prefrontal populations by Herry, Cyril, Jercog, Daniel

    Published 2023-12-01
    “…What mPFC neuronal populations represent when we face threats? To address this question, we performed electrophysiological single-unit population recordings in the dorsal mPFC while mice faced threat-predicting cues eliciting defensive behaviours, and performed pharmacological and optogenetic inactivations of this area and the amygdala. …”
    Get full text
    Article
  9. 29

    Thick Film Transducers for High Frequency Coded Ultrasonography by Andrzej NOWICKI, Marcin LEWANDOWSKI, Janusz WÓJCIK, Ryszard TYMKIEWICZ, Rasmus LOU–MOLLER, Wanda WOLNY, Tomasz ZAWADA

    Published 2013-10-01
    “…As anticipated, in all cases the focal distance was up to 10% closer to the transducer face than the one related to the curvature radius. …”
    Get full text
    Article
  10. 30

    Reduced face aftereffects in autism are not due to poor attention. by Louise Ewing, Katie Leach, Elizabeth Pellicano, Linda Jeffery, Gillian Rhodes

    Published 2013-01-01
    “…These findings support the notion that diminished face aftereffects in autism reflect atypicalities in adaptive norm-based coding, which could also contribute to face processing difficulties in this group.…”
    Get full text
    Article
  11. 31

    Les codes graphiques contemporains de l’occitan by Alain Viaut

    Published 2019-12-01
    “…In this strong cultural context, the question of the graphic code took on a particular relief while referring for some of its features to the situation of Occitan in general.…”
    Get full text
    Article
  12. 32

    A Pilot Study Comparing the Efficacy, Fidelity, Acceptability, and Feasibility of Telehealth and Face-to-Face Creative Movement Interventions in Children with Autism Spectrum Disor... by Wan-Chun Su, Corina Cleffi, Sudha Srinivasan, Anjana Bhat

    Published 2024-04-01
    “…Aims: We compared the efficacy, fidelity, acceptability, and feasibility of a creative movement (CM) intervention for children with autism spectrum disorder (ASD), delivered face-to-face (F2F) or through telehealth (TH). Methods: Fifteen children with ASD received the CM intervention F2F or through TH. …”
    Get full text
    Article
  13. 33
  14. 34

    Rdfinet: reference-guided directional diverse face inpainting network by Qingyang Chen, Zhengping Qiang, Yue Zhao, Hong Lin, Libo He, Fei Dai

    Published 2024-07-01
    “…Our network has achieved SOTA results in face diverse inpainting when writing. Code will is available at https://github.com/nothingwithyou/RDFINet .…”
    Get full text
    Article
  15. 35

    Video-feedback intervention for promoting social engagement in children with neurodevelopmental disabilities by Rosario Montirosso, Serena Micheletti, Camilla Pisoni, Eleonora Mascheroni, Elisa Scarano, Elisa Scarano, Cecilia Naboni, Elisa Rosa, Annalisa Castagna, Margherita Bonino, Elisa Fazzi, Elisa Fazzi, Simona Orcesi, Simona Orcesi

    Published 2025-01-01
    “…., engagement and emotionality) in children with NDs during normal or stressful interactions (i.e., the Face-to-Face Still-Face, [FFSF]) paradigm.MethodsA single-cohort design with pre-(T0) and post-(T1) intervention assessment was used to evaluate 37 mother–child dyads from three units in Northern Italy. …”
    Get full text
    Article
  16. 36

    PEMILIHAN KRIM WAJAH TERBAIK YANG MENGANDUNG CERAMIDE MENGGUNAKAN METODE TOPSIS by Rifa Nurafifah Syabaniah, Andi Riyanto, Eva Marsusanti, Susilawati Susilawati

    Published 2020-10-01
    “…This means that the P1 brand code has the highest value of other face cream products with the lowest price rating of other products namely rating 5 (21.07), the packaging is quite good with a rating of 3 (8.62) and the composition is quite a lot with a value of 3 (9, 71). …”
    Get full text
    Article
  17. 37
  18. 38

    Moral ambiguity: Some shortcomings of professional codes of ethics for translators by Julie McDonough Dolmaya

    Published 2011-01-01
    “…The codes are then compared with issues discussed in the Ethics and Professionalism forum of TranslatorsCafe.com to help illustrate whether and how the codes could apply to ethical dilemmas faced by translators in their practice.…”
    Get full text
    Article
  19. 39
  20. 40

    Hard-coded backdoor detection method based on semantic conflict by Anxiang HU, Da XIAO, Shichen GUO, Shengli LIU

    Published 2023-02-01
    “…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
    Get full text
    Article