Suggested Topics within your search.
Suggested Topics within your search.
- Research 58
- Methodology 29
- Social sciences 10
- Study and teaching 10
- Mass media 8
- Education 7
- English language 7
- Evaluation research (Social action programs) 7
- Moral and ethical aspects 7
- Psychological aspects 7
- Psychology 7
- Report writing 7
- methods 7
- research 7
- Dissertations, Academic 6
- History 6
- Sociology 6
- Consumers 5
- Evaluation 5
- Management 5
- Research--Methodology 5
- Sex role 5
- Social conditions 5
- Academic writing 4
- Conversation analysis 4
- Information technology 4
- Qualitative research 4
- Rhetoric 4
- Social aspects 4
- Technological innovations 4
-
181
-
182
Research Funding for Pain in Canada
Published 2009-01-01“…Pain Research and Management…”
Get full text
Article -
183
Researching musical elements in novel
Published 2012-06-01“…Using poetic language to describe a historical event, combining history and literature in the best way, reliving classic literary traditions, and using elements of classic literature toâ relive Farsi language as a national identification make this novel the greatest. Many researches had been done about structure, fictional elements and⦠in this novel. …”
Get full text
Article -
184
A Research on CEO Branding
Published 2023-10-01“…The methodology of this research is descriptive content analysis, which belongs to the qualitative research design. …”
Get full text
Article -
185
-
186
-
187
Survey on phishing detection research
Published 2020-10-01“…With the continuous development of the internet,the threat posed by phishing to people's daily lives is increasing.As a core security technology against phishing attacks,phishing detection technology can help people effectively avoid security threats caused by phishing attacks.Firstly,starting with the basic concepts of phishing,the current application scenarios of phishing identification were summarized.Then,the research status of phishing identification technology in detail were analyzed.Finally,possible future research directions were discussed.…”
Get full text
Article -
188
STUDENTS’ PARTICIPATION IN SCIENTIFIC RESEARCH
Published 2022-05-01Subjects: “…agreement for scientific research…”
Get full text
Article -
189
-
190
-
191
The application of research in organisational communication
Published 2022-11-01“…This paper proposes a number of basic research applications as possible solutions to these problems. …”
Get full text
Article -
192
-
193
Research on Java card security
Published 2017-06-01“…To protect privacy and the safety of property,the security research of Java card was proposed.On the basis of systematically discussing the basic composition of Java card,the key of attacking methods were summarized,including logical attack,fault injection and combined attack.At the same time,some problems with the attack process were presented.Moreover,some corresponding countermeasures were put forward and their shortages were analyzed.Finally,the future research direction was prospected.…”
Get full text
Article -
194
Research on the Epic of Edigey in Türkiye
Published 2024-12-01“…Objective: The aim of the research is to reveal the history of studies in Turkey on the Edigey Epic, one of the most important epics in the Turkish world, to introduce the published copies of the Edigey Epic, and to determine from which perspectives the epic was researched and what kind of conclusions were reached. …”
Get full text
Article -
195
Bullying as an object of statistical research
Published 2024-06-01“…Consideration of bullying as an object of statistical research has determined that at present, bullying statistics are actually at an early stage of development, not allowing to assess such a specific object of research comprehensively, thoroughly and adequately. …”
Get full text
Article -
196
Research on hardware Trojan defense
Published 2017-09-01“…The definition and features of hardware Trojan were described firstly.After that,recent researches of defense and detection techniques were categorized with complete comparison and analysis.Then,current researches limitations were discussed based on the concepts and the trends perspectives of hardware Trojan defense and detection were proposed.…”
Get full text
Article -
197
-
198
-
199
-
200
Feminist Research into Gendered Violence
Published 2025-01-01Subjects: “…participatory arts-based research…”
Get full text
Article