Showing 6,721 - 6,740 results of 8,063 for search '"academic"', query time: 0.08s Refine Results
  1. 6721
  2. 6722

    Early-stage investigators’ experiences with an National Institutes of Health Pilot Award Program by Cyleste C. Collins, Jacqueline Dolata, Elodie Nonguierma, Mona Shediac-Rizkallah, Ashwini R. Sehgal, J. Daryl Thornton

    Published 2025-01-01
    “… Abstract Background: Academic-community research partnerships focusing on addressing the social determinants of health and reducing health disparities have grown substantially in the last three decades. …”
    Get full text
    Article
  3. 6723

    Modification of Teaching/Learning Strategies of University Teaching Staff by O. A. Dyomina, I. A. Tepleneva

    Published 2020-07-01
    “…The student turns into a member of academic community while entering the environment of Content and Language Integrated Learning Project (CLILP). …”
    Get full text
    Article
  4. 6724

    Educating the future: Serbian healthcare students’ knowledge and attitudes toward urinary incontinence by Dragana Milutinović, Dragana Simin, Marijana Ostoić, Sonja Golubović, Dragana Živković

    Published 2025-01-01
    “…Methods The study was designed as an observational, analytical, and comparative cross-sectional with 378 healthcare students in Serbia during the winter semester of the 2023/2024 academic year. A general questionnaire for obtaining sociodemographic data, the Urinary Incontinence Knowledge Scale (UIKS) and the Urinary Incontinence Attitude Scale (UIAS) were used as students’ report measures. …”
    Get full text
    Article
  5. 6725

    Dropping out of school: A psychosocial approach by Hilal Meryem, Hicham Khabbache, Driss Ait Ali

    Published 2024-01-01
    “…It synthesizes findings from diverse sources, including academic journals, sociological studies, and educational psychology literature. …”
    Get full text
    Article
  6. 6726

    Hardcoded vulnerability detection approach for IoT device firmware by Chao MU, Xin WANG, Ming YANG, Heng ZHANG, Zhenya CHEN, Xiaoming WU

    Published 2022-10-01
    “…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
    Get full text
    Article
  7. 6727

    Time pressure in surgical teams, a help or a hindrance to patient safety? by Annet van Harten, Theo J.H. Niessen, Jur J. Koksma, Hein G. Gooszen, Tineke A. Abma

    Published 2025-01-01
    “…Methods: This naturalistic case study was conducted with a surgical team in a Dutch academic hospital using ethnographic methods including participant observation, interviews, and fieldnotes. …”
    Get full text
    Article
  8. 6728

    Narrative Review of the Morphofunctional Underpinnings and Comprehensive Rehabilitation Strategies for Smartphone-addicted University Students by Lucia Ana-Maria Anghelescu, Aurelian Anghelescu, Gelu Onose

    Published 2025-12-01
    “…An advanced search on PubMed based on primary keywords, clustered in syntactic associations looked for academic work focusing on: ((((smartphone addiction) and (problematic smartphone use)) and (students) and (Physical exercises)) and (Physical Activity). …”
    Get full text
    Article
  9. 6729

    Team Assembly Mechanisms and the Knowledge Produced in the Mexico’s National Institute of Geriatrics: A Network Analysis and Agent-Based Modeling Approach by Carmen García-Peña, Luis Miguel Gutiérrez-Robledo, Augusto Cabrera-Becerril, David Fajardo-Ortiz

    Published 2019-01-01
    “…Our results showed a weak connection between basic and clinical research and the emergence of a highly connected academic leadership. Importantly, basic and clinical-demographic researchers exhibited different team assembly strategies: basic researchers tended to form larger teams mainly with external collaborators, while clinical and demographic researchers formed smaller teams that very often incorporated internal (INGER) collaborators. …”
    Get full text
    Article
  10. 6730

    Social media in undergraduate teaching and learning: A scoping review protocol. by Richard Hayman, Erika E Smith

    Published 2023-01-01
    “…<h4>Methods</h4>Systematic searching will be conducted in relevant subject and multidisciplinary databases: Education Database, Education Research Complete, ERIC, British Education Index, Australian Education Index, Academic Search Complete, and Scopus. Records will be deduplicated and screened using Covidence software, with each record independently reviewed by two researchers in both rounds, screening titles and abstracts in the first round, and full-text of articles in the second. …”
    Get full text
    Article
  11. 6731

    Examining the Impact of Domestic Violence on Students' Performance in Selected Secondary Schools of Buyanja Sub-County Rukungiri. by Kansiime, Mackline

    Published 2024
    “…The study results on the effects of domestic violence on children's welfare in Buyanja Sub-county Rukungiri. the highest number of respondents mentioned that domestic violence leads to absenteeism of students, the lowest number of respondents said of leads to depression and other respondents mentioned isolation from friends, and increased fear among the students, may lead to serious injury whereas and leads to poor academic performance. The study recommended that the government should intervene by strengthening the law on the issue of the age of marriage because young married couples are the most victims of domestic violence in today's families and school administrators should learn and know how to handle students from different families because these students face different challenges, therefore, should be handled with care to enable them to fit in others within the school.…”
    Get full text
    Thesis
  12. 6732

    Role of Social Workers in Enhancing Chronic Care: A Case Study of Kabale Regional Referral Hospital Kabale District. by Musiimenta, Moureen

    Published 2024
    “…Recommendations include addressing challenges in social work and social administration through enhanced social work education and professional practice, emphasizing the combined role of academic knowledge and fieldwork in fostering community development. …”
    Get full text
    Thesis
  13. 6733

    Affirmative Action on Women Education and Access of Employment Opportunities by Women in Northern Division Kabale Municipality. by Nasasira, Praise

    Published 2024
    “…The study results on the roles of affirmative action on women's education and access to employment opportunities, the highest number of respondents mentioned that affirmative action helps in ensuring a more balanced gender representation and promotes gender sensitivity among all students, and the least number of respondents mentioned that affirmative action initiatives help women to navigate academic challenges and prepare for professional success. …”
    Get full text
    Thesis
  14. 6734

    Effect of Single Parenting on Children’s Social Welfare in Chahi Sub-County Kisoro District. by Nyiraneza, Gloria

    Published 2024
    “…The economic strain leads to inadequate educational resources, poor housing conditions, and malnutrition, which in turn affect children’s academic performance and psychological well-being. …”
    Get full text
    Thesis
  15. 6735

    Financial Institutions and Agricultural development in Rwanda. A Case Study of Rwanda Development Bank. by Boniface, Kabahizi

    Published 2020
    “…From the research findings, it has been realized that the majority of the RDB employees are mature enough because RDB employees have got the experience and relative academic documents basically master and above. The research also revealed that RDB’s clients’ main activities include farming and livestock. …”
    Get full text
    Thesis
  16. 6736

    E-Book Mobile Application: A Case of Kabale University Mukombe Library, Uganda by Clare, Ninsiima, Patricia, Kyomugisha

    Published 2022
    “…Globally, many academic e-books are available in user-friendly forms like PDF and HTML that can be accessed on laptops, iPads, and smartphones, even though some e-books require a special e-book reader. …”
    Get full text
    Article
  17. 6737

    Distance Learning and the Quality of Teacher Education in Rwanda: A Case Study of Byumba Distance Learning by Anastase, Mvuyekure

    Published 2023
    “…The study was guided by three objectives: namely, to investigate the effect of distance learning on the teaching-learning process; to examine the academic relevance of resources used in the distance learning program in Rwanda; and to evaluate whether the graduates from the distance learning program had the skills, knowledge, and attitudes required for qualitative, effective, and efficient education. …”
    Get full text
    Other
  18. 6738
  19. 6739
  20. 6740