Showing 181 - 200 results of 124,197 for search '"Research', query time: 0.16s Refine Results
  1. 181
  2. 182

    Research Funding for Pain in Canada by Mary E Lynch, Donald Schopflocher, Paul Taenzer, Caitlin Sinclair

    Published 2009-01-01
    “…Pain Research and Management…”
    Get full text
    Article
  3. 183

    Researching musical elements in novel by یحیی کاردگر, فاطمه باباشاهی

    Published 2012-06-01
    “…Using poetic language to describe a historical event, combining history and literature in the best way, reliving classic literary traditions, and using elements of classic literature toâ relive Farsi language as a national identification make this novel the greatest. Many researches had been done about structure, fictional elements and⦠in this novel. …”
    Get full text
    Article
  4. 184

    A Research on CEO Branding by Büşra Çetin, Neslihan Özmelek Taş, Emet Gürel, Azra Kardelen Nazlı

    Published 2023-10-01
    “…The methodology of this research is descriptive content analysis, which belongs to the qualitative research design. …”
    Get full text
    Article
  5. 185
  6. 186
  7. 187

    Survey on phishing detection research by Xi FU, Hui LI, Xingwen ZHAO

    Published 2020-10-01
    “…With the continuous development of the internet,the threat posed by phishing to people's daily lives is increasing.As a core security technology against phishing attacks,phishing detection technology can help people effectively avoid security threats caused by phishing attacks.Firstly,starting with the basic concepts of phishing,the current application scenarios of phishing identification were summarized.Then,the research status of phishing identification technology in detail were analyzed.Finally,possible future research directions were discussed.…”
    Get full text
    Article
  8. 188

    STUDENTS’ PARTICIPATION IN SCIENTIFIC RESEARCH by Dmitry V. Shmuratko

    Published 2022-05-01
    Subjects: “…agreement for scientific research…”
    Get full text
    Article
  9. 189
  10. 190
  11. 191

    The application of research in organisational communication by Gustav Puth

    Published 2022-11-01
    “…This paper proposes a number of basic research applications as possible solutions to these problems. …”
    Get full text
    Article
  12. 192
  13. 193

    Research on Java card security by Xue-lian ZHANG, Zhen WU, Zhi-bo DU, Min WANG, Chun-ling XIANG

    Published 2017-06-01
    “…To protect privacy and the safety of property,the security research of Java card was proposed.On the basis of systematically discussing the basic composition of Java card,the key of attacking methods were summarized,including logical attack,fault injection and combined attack.At the same time,some problems with the attack process were presented.Moreover,some corresponding countermeasures were put forward and their shortages were analyzed.Finally,the future research direction was prospected.…”
    Get full text
    Article
  14. 194

    Research on the Epic of Edigey in Türkiye by Kemaloğlu İ.

    Published 2024-12-01
    “…Objective: The aim of the research is to reveal the history of studies in Turkey on the Edigey Epic, one of the most important epics in the Turkish world, to introduce the published copies of the Edigey Epic, and to determine from which perspectives the epic was researched and what kind of conclusions were reached. …”
    Get full text
    Article
  15. 195

    Bullying as an object of statistical research by L. A. Davletshina, M. V. Karmanov

    Published 2024-06-01
    “…Consideration of bullying as an object of statistical research has determined that at present, bullying statistics are actually at an early stage of development, not allowing to assess such a specific object of research comprehensively, thoroughly and adequately. …”
    Get full text
    Article
  16. 196

    Research on hardware Trojan defense by Kan WANG, Hao CHEN, Xu-guang GUAN, Yong GU

    Published 2017-09-01
    “…The definition and features of hardware Trojan were described firstly.After that,recent researches of defense and detection techniques were categorized with complete comparison and analysis.Then,current researches limitations were discussed based on the concepts and the trends perspectives of hardware Trojan defense and detection were proposed.…”
    Get full text
    Article
  17. 197
  18. 198

    How to become a researcher by A. . Novikov

    Published 2022-09-01
    Subjects:
    Get full text
    Article
  19. 199
  20. 200

    Feminist Research into Gendered Violence by Elisabet Le Roux, Selina Palm

    Published 2025-01-01
    Subjects: “…participatory arts-based research…”
    Get full text
    Article