Suggested Topics within your search.
Suggested Topics within your search.
-
701
My Life, My Story and Life Recovery among Veterans with Substance Use Problems
Published 2025-04-01“…<strong>Methods:</strong> The narratives were reviewed on 4 domains (past challenge, substance use, experience of a turning point or insight, life improvement) by two reviewers using a pre-specified code book. 31 narratives were reviewed. …”
Get full text
Article -
702
The Contemporary Career Theory as a Lens for Understanding the Internationalization of Business Schools Students
Published 2024-12-01“…We used the content analysis technique as the main method of data analysis, with the support of the systematic coding technique to define our categories of analysis. …”
Get full text
Article -
703
Identifying the Dimensions and Components of a Gamification Model in the Marketing Processes for Sharing Economy Transportation Businesses
Published 2025-06-01“…Subsequently, the interview texts were divided into meaningful elements, then, initial codes were extracted, and ultimately, 70 codes were confirmed and analyzed. …”
Get full text
Article -
704
Percepciones sobre frontera colombo venezolana en el informativo oriente noticias del Canal de Televisión Regional TRO
Published 2021-10-01“…The study's findings showed that a contradiction in the audiovisual journalistic discourse of the news reports of the Oriente Noticias news program appears: the images and graphic codes point toward a notion of linearity—the camera and infographics emphasize the bridges, checkpoints, and demarcations that divide the two countries—while the linguistic and sound codes point toward a notion of zonality—the journalist's voice and sound narrative reiterate the notion of brotherhood, mutuality, spaces, and customs shared between Colombia and Venezuela.…”
Get full text
Article -
705
The abstraction of labour from the factory to the platform: charting the visual language of automation
Published 2024-11-01“…My work focuses on the process diagram and its uses in low-code and no-code tools for robotic process automation (RPA), where it is instrumentalised as a form of labour abstraction for the automation of white-collar work. …”
Get full text
Article -
706
THE FUNCTIONS OF THE CHARACTER/S IN THE NOVEL 'THE PALACE OF DREAMS' BY ISMAIL KADARE
Published 2023-11-01“…The Palace of Dreams considering its anti-totalitarian meaning is a miracle of its own because it was published under the communist system of the time by virtue of the novel’s text’s coding in the best possible way. This feature, made the novel important, interesting and challenging to the scholars because it constitutes a literary model that can be studied from different points of view and still provides more new ones. …”
Get full text
Article -
707
A non-canonical initiation site is required for efficient translation of the dendritically localized Shank1 mRNA.
Published 2014-01-01“…Surprisingly, our analysis points to an additional uORF initiated at a non-canonical ACG start codon. …”
Get full text
Article -
708
Data of vegetation structure metrics retrieved from airborne laser scanning surveys for European demonstration sitesZenodo
Published 2025-06-01“…Additionally, seven metrics describe point density (one metric), eigenvalues (three metrics), and normal vectors (three metrics). …”
Get full text
Article -
709
Development of client applications on Blockchain
Published 2023-10-01“…In the course of the study, the analysis of MetaMask tools was carried out, the processes associated with the start of work were considered both from the point of view of the developer and from the point of view of the wallet user. …”
Get full text
Article -
710
Proposing a template for selecting the coordinates of laboratory standards for executive management of the country.
Published 2025-02-01“…To collect data, semi-structured interviews were conducted using thematic analysis method, and MAXqda 2020 software was used to carry out the analysis process after open and axial coding. The results indicated that a total of 95 basic codes, 15 organizing themes, and 5 overarching themes were identified and extracted. …”
Get full text
Article -
711
Presenting the agility model of the organization in order to improve the productivity of human resources
Published 2024-11-01“…Productivity of human resources Productivity means an intellectual point of view and the concept of working and acting intelligently. …”
Get full text
Article -
712
Presenting a model of ecotourism and sustainable tourism development with an emphasis on foreign exchange and economic development of Qeshm Island
Published 2024-12-01“…The results in the qualitative section showed that 207 interview codes, 68 subcategories, and 14 categories were extracted. …”
Get full text
Article -
713
Presenting the model of factors affecting the resilience of entrepreneurial behavior in Technical and Vocational University of Alborz province
Published 2024-08-01“…These obstacles cause disruption (Ghanbari et al, 2017) and ultimately accelerate entrepreneurial failure. This is a point that considers the individual resilience of the entrepreneur to be important in facing these factors (Vermziari & Imani, 2018). …”
Get full text
Article -
714
An Improved STC-Based Full Coverage Path Planning Algorithm for Cleaning Tasks in Large-Scale Unstructured Social Environments
Published 2024-12-01“…The proposed method innovatively introduces the concept of optimal backtracking points to sacrifice the spatial complexity of the algorithm to reduce its computational complexity. …”
Get full text
Article -
715
The Relationship between Corporate Social Responsibility Disclosure and Intellectual Capital Considering the Role of Block Holder Ownership Moderation
Published 2021-03-01“…The present study deals with the relationship between a corporate social responsibility disclosure and intellectual capital considering the role of block holder ownership moderation incorporates listed on Tehran Stock Exchange, and one of the points of the present study for which we are seeking an explanation is the social responsibility and intellectual capital status of corporates with block holder ownership. …”
Get full text
Article -
716
Perceptions of effectiveness and performance evaluation in Hungarian higher education in the Carpathian Basin
Published 2025-07-01“…There is a correlation in views on performance evaluation, but they are not exclusive. The points to consider in the context of performance evaluation can provide guidance for decision-makers in higher education. …”
Get full text
Article -
717
A role for BCL2L13 and autophagy in germline purifying selection of mtDNA.
Published 2023-01-01“…Our study reveals a statistically robust effect of knockout of Bcl2l13 on the selection process, and weaker evidence for the effect of Ulk1 and potentially Ulk2, while no statistically significant impact is seen for knockout of Parkin. This points at distinctive roles of these players in germline purifying selection. …”
Get full text
Article -
718
Evaluation of the Physical Education Literacy Plan in Elementary Schools: A Qualitative Research
Published 2024-05-01“…In addition, the weak points were the lack of proper follow-up, poor time and method of implementation, poor knowledge of the teachers, insufficient cooperation of the parents, and the lack of facilities. …”
Get full text
Article -
719
Research on Sentiment Analysis of Online Public Opinion Based on RoBERTa–BiLSTM–Attention Model
Published 2025-02-01“…Firstly, the microblogs and comment data related to the event were crawled with Python coding, and pre-processing operations such as cleaning, word splitting, and de-noising were carried out; then, the stage of public opinion was divided into phases based on the daily public opinion sound volume, Baidu index, and key time points of the event. …”
Get full text
Article -
720
Computationally secure steganography based on speech synthesis
Published 2022-06-01“…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
Get full text
Article