Suggested Topics within your search.
Showing 701 - 720 results of 1,838 for search 'point coding', query time: 0.11s Refine Results
  1. 701

    My Life, My Story and Life Recovery among Veterans with Substance Use Problems by Grace Chang, Martha Duffy, Susan Nathan

    Published 2025-04-01
    “…<strong>Methods:</strong> The narratives were reviewed on 4 domains (past challenge, substance use, experience of a turning point or insight, life improvement) by two reviewers using a pre-specified code book. 31 narratives were reviewed. …”
    Get full text
    Article
  2. 702

    The Contemporary Career Theory as a Lens for Understanding the Internationalization of Business Schools Students by Marcello Romani-Dias, Seimor Walchhutter, Caio Sousa da Silva, Luis Henrique Rigato Vasconcellos

    Published 2024-12-01
    “…We used the content analysis technique as the main method of data analysis, with the support of the systematic coding technique to define our categories of analysis. …”
    Get full text
    Article
  3. 703

    Identifying the Dimensions and Components of a Gamification Model in the Marketing Processes for Sharing Economy Transportation Businesses by Somaye Moradi, Maysam Shafiee

    Published 2025-06-01
    “…Subsequently, the interview texts were divided into meaningful elements, then, initial codes were extracted, and ultimately, 70 codes were confirmed and analyzed. …”
    Get full text
    Article
  4. 704

    Percepciones sobre frontera colombo venezolana en el informativo oriente noticias del Canal de Televisión Regional TRO by Félix Joaquín Lozano-Cárdenas, Pedro Felipe Díaz-Arenas, Margarita Rosa Peñaloza-Durán

    Published 2021-10-01
    “…The study's findings showed that a contradiction in the audiovisual journalistic discourse of the news reports of the Oriente Noticias news program appears: the images and graphic codes point toward a notion of linearity—the camera and infographics emphasize the bridges, checkpoints, and demarcations that divide the two countries—while the linguistic and sound codes point toward a notion of zonality—the journalist's voice and sound narrative reiterate the notion of brotherhood, mutuality, spaces, and customs shared between Colombia and Venezuela.…”
    Get full text
    Article
  5. 705

    The abstraction of labour from the factory to the platform: charting the visual language of automation by Tsvetelina Hristova

    Published 2024-11-01
    “…My work focuses on the process diagram and its uses in low-code and no-code tools for robotic process automation (RPA), where it is instrumentalised as a form of labour abstraction for the automation of white-collar work. …”
    Get full text
    Article
  6. 706

    THE FUNCTIONS OF THE CHARACTER/S IN THE NOVEL 'THE PALACE OF DREAMS' BY ISMAIL KADARE by Marjela Progni, Muhamet Peci

    Published 2023-11-01
    “…The Palace of Dreams considering its anti-totalitarian meaning is a miracle of its own because it was published under the communist system of the time by virtue of the novel’s text’s coding in the best possible way. This feature, made the novel important, interesting and challenging to the scholars because it constitutes a literary model that can be studied from different points of view and still provides more new ones. …”
    Get full text
    Article
  7. 707
  8. 708

    Data of vegetation structure metrics retrieved from airborne laser scanning surveys for European demonstration sitesZenodo by W. Daniel Kissling, Wessel Mulder, Jinhu Wang, Yifang Shi

    Published 2025-06-01
    “…Additionally, seven metrics describe point density (one metric), eigenvalues (three metrics), and normal vectors (three metrics). …”
    Get full text
    Article
  9. 709

    Development of client applications on Blockchain by O. D. Okladnikova, A. V. Bukov, N. N. Zhukov

    Published 2023-10-01
    “…In the course of the study, the analysis of MetaMask tools was carried out, the processes associated with the start of work were considered both from the point of view of the developer and from the point of view of the wallet user. …”
    Get full text
    Article
  10. 710

    Proposing a template for selecting the coordinates of laboratory standards for executive management of the country. by mohammad hasan Izadparast, ali asghar pourezzat, Alireza Amirkabiri

    Published 2025-02-01
    “…To collect data, semi-structured interviews were conducted using thematic analysis method, and MAXqda 2020 software was used to carry out the analysis process after open and axial coding. The results indicated that a total of 95 basic codes, 15 organizing themes, and 5 overarching themes were identified and extracted. …”
    Get full text
    Article
  11. 711

    Presenting the agility model of the organization in order to improve the productivity of human resources by Asie Mohmedi, Rashid Zolfaghari, Mahsa Gholam hossein zadeh

    Published 2024-11-01
    “…Productivity of human resources Productivity means an intellectual point of view and the concept of working and acting intelligently. …”
    Get full text
    Article
  12. 712

    Presenting a model of ecotourism and sustainable tourism development with an emphasis on foreign exchange and economic development of Qeshm Island by Naser Rajabi, Vahid Reza Mirabi, Khosro Moradi Shahdadi

    Published 2024-12-01
    “…The results in the qualitative section showed that 207 interview codes, 68 subcategories, and 14 categories were extracted. …”
    Get full text
    Article
  13. 713

    Presenting the model of factors affecting the resilience of entrepreneurial behavior in Technical and Vocational University of Alborz province by Ali Abdi Jamayran, Manouchehr Niknam, Hasan Rangriz

    Published 2024-08-01
    “…These obstacles cause disruption (Ghanbari et al, 2017) and ultimately accelerate entrepreneurial failure. This is a point that considers the individual resilience of the entrepreneur to be important in facing these factors (Vermziari & Imani, 2018). …”
    Get full text
    Article
  14. 714

    An Improved STC-Based Full Coverage Path Planning Algorithm for Cleaning Tasks in Large-Scale Unstructured Social Environments by Chao Wang, Wei Dong, Renjie Li, Hui Dong, Huajian Liu, Yongzhuo Gao

    Published 2024-12-01
    “…The proposed method innovatively introduces the concept of optimal backtracking points to sacrifice the spatial complexity of the algorithm to reduce its computational complexity. …”
    Get full text
    Article
  15. 715

    The Relationship between Corporate Social Responsibility Disclosure and Intellectual Capital Considering the Role of Block Holder Ownership Moderation by Mohammad Sajjad Ghafourian Shagerdi, Amir Ghafourian Shagerdi, Reza Jahanshiri

    Published 2021-03-01
    “…The present study deals with the relationship between a corporate social responsibility disclosure and intellectual capital considering the role of block holder ownership moderation incorporates listed on Tehran Stock Exchange, and one of the points of the present study for which we are seeking an explanation is the social responsibility and intellectual capital status of corporates with block holder ownership. …”
    Get full text
    Article
  16. 716

    Perceptions of effectiveness and performance evaluation in Hungarian higher education in the Carpathian Basin by Katalin Pallay, Zsuzsanna Demeter-Karászi, Gabriella Pusztai

    Published 2025-07-01
    “…There is a correlation in views on performance evaluation, but they are not exclusive. The points to consider in the context of performance evaluation can provide guidance for decision-makers in higher education. …”
    Get full text
    Article
  17. 717

    A role for BCL2L13 and autophagy in germline purifying selection of mtDNA. by Laura S Kremer, Lyuba V Bozhilova, Diana Rubalcava-Gracia, Roberta Filograna, Mamta Upadhyay, Camilla Koolmeister, Patrick F Chinnery, Nils-Göran Larsson

    Published 2023-01-01
    “…Our study reveals a statistically robust effect of knockout of Bcl2l13 on the selection process, and weaker evidence for the effect of Ulk1 and potentially Ulk2, while no statistically significant impact is seen for knockout of Parkin. This points at distinctive roles of these players in germline purifying selection. …”
    Get full text
    Article
  18. 718

    Evaluation of the Physical Education Literacy Plan in Elementary Schools: A Qualitative Research by Maryam Kian, Saeideh Dehghani

    Published 2024-05-01
    “…In addition, the weak points were the lack of proper follow-up, poor time and method of implementation, poor knowledge of the teachers, insufficient cooperation of the parents, and the lack of facilities. …”
    Get full text
    Article
  19. 719

    Research on Sentiment Analysis of Online Public Opinion Based on RoBERTa–BiLSTM–Attention Model by Jiangao Deng, Yue Liu

    Published 2025-02-01
    “…Firstly, the microblogs and comment data related to the event were crawled with Python coding, and pre-processing operations such as cleaning, word splitting, and de-noising were carried out; then, the stage of public opinion was divided into phases based on the daily public opinion sound volume, Baidu index, and key time points of the event. …”
    Get full text
    Article
  20. 720

    Computationally secure steganography based on speech synthesis by Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU

    Published 2022-06-01
    “…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
    Get full text
    Article