Showing 1,781 - 1,800 results of 2,317 for search 'life coding', query time: 0.12s Refine Results
  1. 1781
  2. 1782

    A Qualitative Study of the Causes of Irreligiousness Boy Adolescents in Religious Families by Zahra Yousefi, Fatemeh Dafeian, Mohammad Mehdi Malikipour, Azam Shahbazi

    Published 2024-12-01
    “…The analysis of the contextual theory by the method of Charmaz (2014) revealed three components: a) The nature of atheism contained three core codes, which were: 1) the desire to make decisions based on individual diagnosis, 2) choosing religion as one from the types of life values, 3) acting based on individual diagnoses; b) the class of reasons for atheism with axial codes; 1) individual-oriented causes (with open codes of awakening instincts, curiosity and avoiding advice, inability to manage instincts) and 2) other-oriented causes (with open codes of friends and family, the role of society and the media, and social interactions) and c) the category of how to avoid religion With the main codes: 1) matching with the congregation (with open codes of matching with friend and matching with family), 2) finding contrary evidence for religiosity (inference in favor of atheism from social events, overgeneralization in favor of atheism) and 3) Finding supporting evidence for atheism (finding fault with religious people and positive perceptions of religion). …”
    Get full text
    Article
  3. 1783
  4. 1784

    Directions for the development of the criminal procedure science by S. O. Shatrava, О. V. Dzhafarova, D. Ye. Denyschuk, О. V. Pohorilets

    Published 2023-12-01
    “…In addition to playing the role of a moral and ethical component of public life, it acts as a lever in the international political arena, and also touches upon some matters of financial income and tax revenue. …”
    Get full text
    Article
  5. 1785
  6. 1786

    Representations of Female Characters in the Works of Halide Edip Adıvar and George Bernard Shaw: A Comparative Literature Study by Yasemin Bayraktar, Sevim İnal, Oya Tunaboylu

    Published 2022-12-01
    “…The origin of similar and common images of women is mostly hidden in the life experience of both authors and their way of world view. …”
    Get full text
    Article
  7. 1787

    Design of Independent Type-B LNG Fuel Tank: Comparative Study between Finite Element Analysis and International Guidance by Tae-Wook Kim, Seul-Kee Kim, Seong-Bo Park, Jae-Myung Lee

    Published 2018-01-01
    “…Fatigue life and fatigue damage were calculated using the numerical results obtained from transient thermal-structural analysis and fatigue analysis to provide the safety level of the design scheme.…”
    Get full text
    Article
  8. 1788

    Synchronization and demodulation of LoRa null port data by Lei Fang, Chen Bo, Lv Jingzhao, Li Pingan, Du Haitao, Li Su

    Published 2022-04-01
    “…The code rate is 4/5 with the best effect error correction, and the noise resistance performance improves by about 1 dB.…”
    Get full text
    Article
  9. 1789

    Social Confrontation with Menstruation: A Feminist Ethnography of Menstrual Experience among Female Instagram Users by Rana Mohammad Taghinejad Esfahani, Majid Movahed, Halimeh Enayat, Aliyar Ahmadi

    Published 2024-12-01
    “…Acknowledging this is crucial as menstruation is an inherent part of every woman's life and has significant implications for their physical, mental, and social health. …”
    Get full text
    Article
  10. 1790

    The Effectiveness of Psychological Well-Being Training based on the PERMA Model for 14 to 16-Year-Old Girls with Anxiety Symptoms Zahra Daneshian: M.A. Student of Child and Adoles... by zahra danesian, Shahriar Shahidi, Saeed Ghanbari

    Published 2024-08-01
    “…Adolescents often experience emotional problems such as anxiety and stress that can negatively impact their psychological well-being and life satisfaction. To address this issue, a research study was conducted to train psychological well-being based on the PERMA model to 14-16-year-old girls with anxiety symptoms. …”
    Get full text
    Article
  11. 1791

    Boundary objects in longevity planning service: exploring personas and dualities through constructivist grounded theory by Sheng-Hung Lee, Maria Yang, Eric Klopfer, Joseph Coughlin

    Published 2025-01-01
    “…As we enter the era of longevity economics, the desire for longer life spans and health spans is increasingly prevalent. …”
    Get full text
    Article
  12. 1792

    Men in White: A Narrative Inquiry of Male Nurse Stereotype in Nursing by Chenn Martin L. Antiporda, Jhoechell P. Francisco, Generey G. Lagrama, Brent B. Maghirang, Jorge Dwight L. Malicad

    Published 2024-11-01
    “…The recorded interview was transcribed and coded. Categories were clustered; then, emerging themes were derived. …”
    Get full text
    Article
  13. 1793

    CodonTransformer: a multispecies codon optimizer using context-aware neural networks by Adibvafa Fallahpour, Vincent Gureghian, Guillaume J. Filion, Ariel B. Lindner, Amir Pandi

    Published 2025-04-01
    “…Abstract Degeneracy in the genetic code allows many possible DNA sequences to encode the same protein. …”
    Get full text
    Article
  14. 1794

    Solving the traffic signaling problem using the iterated local search metaheuristic by Elvir Misini, Uran Lajçi, Kadri Sylejmani, Atlantik Limani, Fjolla Gashi, Lavdim Kurtaj, Arben Ahmeti, Erzen Krasniqi

    Published 2025-07-01
    “…Empirical studies were conducted on 48 challenging instances, including five from the Google Hash Code competition and 43 additional cases for extensive testing. …”
    Get full text
    Article
  15. 1795

    Abortion beyond a medical issue; women's perception on the current Ethiopian abortion law among reproductive‐aged women by 2023, a community‐based cross‐sectional study by Besfat Berihun Erega, Addisu Molla, Hiwot Dejen, Wassie Yazie Ferede

    Published 2024-08-01
    “…To bring Ethiopia's legal system into compliance with the country's new constitution, a new criminal code was created in 2005. In the new penal code, after 2005, abortion was permitted under broad circumstances; in the case of rape, incest, or fetal impairment; if pregnancy continuation or birth would endanger the health or life of the woman or fetus; if the woman has physical or mental disabilities; and if the woman is a minor who is physically or mentally unprepared for childbirth. …”
    Get full text
    Article
  16. 1796

    A compositional model for effort‐aware Just‐In‐Time defect prediction on android apps by Kunsong Zhao, Zhou Xu, Meng Yan, Lei Xue, Wei Li, Gemma Catolino

    Published 2022-06-01
    “…Abstract Android apps have played important roles in daily life and work. To meet the new requirements from users, the apps encounter frequent updates, which involves a large quantity of code commits. …”
    Get full text
    Article
  17. 1797
  18. 1798

    Control Rod Modeling and Worth Calculation for a Typical 1100 MWe Nuclear Power Plant Using WIMS/D4 and CITATION by Izza Shahid, Nadeem Shaukat, Amjad Ali, Meer Bacha, Ammar Ahmad, Muhammad Tariq Siddique, Rustam Khan, Sajjad Tahir, Zeeshan Jamil

    Published 2022-01-01
    “…Neutronics analysis of fresh core is carried out at beginning of life (BOL) to determine the effect of grey and black control rod clusters on the core reactivity for startup and operating conditions. …”
    Get full text
    Article
  19. 1799

    Patients' experience of suffering a distal radius fracture with long-lasting impairment-a qualitative study. by Hanna Südow, Cecilia Mellstrand Navarro, Sari Ponzer, Caroline Olsson

    Published 2024-01-01
    “…All 17 interviews were recorded, transcribed, and coded. Codes were grouped and categories formed.<h4>Results</h4>Three main categories were inductively identified from the data. 1. …”
    Get full text
    Article
  20. 1800

    Threat ripple model: A model to characterize business-oriented attacks based on business dependencies by Ao Shiliang, Fang Binxing, Xiao Xinguang, Zhang Hongli

    Published 2025-01-01
    “…The most classic Cyber Kill Chain model expresses the attack process almost directly as a life cycle of malicious code execution, but in fact there are many ways can be utilized by adversary, such as the dependencies among businesses. …”
    Get full text
    Article