Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
35161
Relationship Between the Results of the Landing Error Scoring System and Trunk Muscle Thickness
Published 2024-09-01“…It was hypothesized that athletes with poor activation of deep trunk muscle (transversus abdominis and internal oblique) would have lower LESS scores. # Study Design Cross-sectional study # Methods The trunk muscle thickness at rest and during the plank was measured using ultrasonography. …”
Get full text
Article -
35162
Exercise capacity after long-term physical activity on prescription provided by physiotherapists
Published 2025-01-01“…Further research should strive for an RCT study design.…”
Get full text
Article -
35163
BUDGET USE AND PERFORMANCE OF MANUFACTURING SMALL AND MEDIUM ENTERPRISES (SMEs) IN LAGOS STATE, NIGERIA
Published 2022-12-01“…The study employed cross-sectional research design to address empirical questions developed for the study. …”
Get full text
Article -
35164
Forest Pedagogy towards the Problem of Polish Educational Monoculture: Projective Pilot Studies
Published 2023-09-01“…A symbolic illustration of the last phenomenon are the findings of a qualitative pilot study in which two groups of students completing a Forest Pedagogy course were asked to design a forest kindergarten. As it turned out, the respondents most often drew ordered elements of the urban playground infrastructure: swings, slides and sandboxes, in the vicinity of the building of the local kindergarten, which dominated the drawing. …”
Get full text
Article -
35165
Integrating PCA and DEA techniques for strategic assessment of network security
Published 2023-03-01“…This paper introduces a novel approach to evaluating computer network security using Data Envelopment Analysis (DEA), a mathematical method designed to measure the performance of Decision-Making Units (DMUs) employing identical inputs to yield identical outputs. …”
Get full text
Article -
35166
Effectiveness of Perineal Massage in the Second Stage of Labor in Preventing Perineal Trauma
Published 2020-08-01“… OBJECTIVE: This study was aimed to investigate the effect of perineal massage in the second stage of labor in prevention perineal traumas during childbirth. STUDY DESIGN: This observational study was conducted with 171 nulliparous women delivered by vaginally between January 2017 and May 2019. …”
Get full text
Article -
35167
THE PROFESSIONAL THINKING FUTURE DIRECTED BY THEATRICAL PERFORMANCES AND HOLIDAYS: RESULTS OF EXPERIMENTAL WORK
Published 2015-10-01“…Specificity is also in the process of learning, dominated by special system of exercises to master acting skills; creativity and problem tasks aimed at addressing the research, design, communication and organizational tasks; role play, artistic and pedagogical situations that simulate the behavior of a director in the theater team. …”
Get full text
Article -
35168
Model analysis for an HIV infectious disease using elasticity and sensitivity techniques
Published 2024-07-01“…The findings offer valuable insights for designing effective control strategies and optimizing interventions aimed at curbing the spread of HIV.…”
Get full text
Article -
35169
Vibration mechanism study based on coupled dynamic model for TBM main drive system
Published 2025-01-01“…This study provides a basis for the system’s dynamic design and evaluation of the TBM performance in tunnel construction.…”
Get full text
Article -
35170
Numerical Study on Failure Mechanisms of Shaft Wall Consisting of Steel Plate and Concrete under the Effects of Explosion
Published 2021-01-01“…The research results can provide a certain theoretical basis and design guidance for solving the problem of water leakage of single-layer shaft wall structures.…”
Get full text
Article -
35171
Examining the determinants of resilience and mental stress in emergency department nurses
Published 2025-01-01“…Methods A cross-sectional, analytical design was employed to assess 316 emergency nurses in Kermanshah hospitals using a convenience sampling method. …”
Get full text
Article -
35172
Semi-quantitative risk assessment of peste des petits ruminants introduction with wild animals into Russian Federation
Published 2021-11-01“…Habitats of the wild susceptible animals were mapped for further examination of the interactions between different animal species using zoological research data; PPR outbreaks in wild animals were also designated in the map thus allowing for the detection of the potential routes of the infection spread in the population and introduction to the country. …”
Get full text
Article -
35173
Effect of oil palm bio-organic wastes on macro-propagation of some permanent crops’ seeds
Published 2023-12-01“…Purpose: Research investigated oil mill decanter cake (OPDC) and empty fruit bunch (EFB) from oil palm in varying forms as soil media for growth performances of cocoa (Theobroma cacao) and citrus (Citrus sp.) seeds during germination and growth.Method: Factorial design with 4 levels of bio-organic: oil palm decanter cake (OPDC) treated with hot water at 70 oC, OPDC treated with hot water at 80 oC, OPDC raw and EFB; 2 levels of crops: citrus and cocoa seedlings were investigated. …”
Get full text
Article -
35174
Solving Nonnative Combinatorial Optimization Problems Using Hybrid Quantum–Classical Algorithms
Published 2024-01-01“…This work presents “nonnative hybrid algorithms”: a framework to overcome these challenges by integrating quantum and classical resources with a hybrid approach. By designing nonnative quantum variational anosatzes that inherit some but not all problem structure, measurement outcomes from the quantum computer can act as a resource to be used by classical routines to indirectly compute optimal solutions, partially overcoming the challenges of contemporary quantum optimization approaches. …”
Get full text
Article -
35175
Neutralizing antibody landscape of the non-polio Enteroviruses and future strategy
Published 2025-01-01“…Therefore, an in-depth understanding of structures of enterovirus and mechanisms of antibody neutralization should be useful for future strategies in guiding the design of a rational antiviral agent against NPEVs infections.…”
Get full text
Article -
35176
EFFECT OF MATERNAL FOLIC ACID/IRON INTAKEON THE WEIGHT OF NEWBORNS IN OBSTETRIC WARD OFTERTIARY CARE HOSPITALS OF PUNJAB
Published 2024-10-01“… A cross-sectional study has been designed to determine the influence of maternal folic acid and iron intake during pregnancy on newborns birth weight. …”
Get full text
Article -
35177
“‘”: mixed-methods study exploring palliative care needs amongst refugees‘
Published 2025-02-01“…Objectives: This study explored limitations in providing palliative care to refugees who had either federal or provincial health insurance in two care settings in Ontario, Canada. Design: An explanatory sequential mixed-methods approach guided the review of local administrative data and interview data to understand palliative care delivery for refugees. …”
Get full text
Article -
35178
Optimizing Clinical Reasoning: Unpacking the Impact of Virtual Patient Educational Duration in Cancer Care and Nursing Students’ Experiences
Published 2025-01-01“…Materials and Methods: The present semi-experimental study was conducted with a pretest–post-test design and a control group. Through the census sampling method, 74 nursing students from Isfahan University of Medical Sciences, Iran, (in their 4th and 5th semester) who had taken the cancer course were selected (2019-2022) and, upon obtaining their consent, were enrolled in the study. …”
Get full text
Article -
35179
High-performance reconfigurable encryption scheme for distributed storage
Published 2023-10-01“…As the world embraces the digital economy and enters an information society, data has emerged as a critical production factor.The collection, processing, and storage of data have become increasingly prevalent.Distributed storage systems, known for their efficiency, are widely used in various data fields.However, as the scale of data storage continues to expand, distributed storage faces more significant security risks, such as information leakage and data destruction.These challenges drive the need for innovative advancements in big data distributed storage security technology and foster the integration of domestic cryptographic technology with computing storage technology.This work focused on addressing security issues, particularly information leakage, in distributed storage nodes.A dynamic and reconfigurable encryption storage solution was proposed, which considered the requirements for encryption performance and flexibility.A high-performance reconfigurable cryptographic module was designed based on the bio mapping framework.Based on this module, multiple storage pools equipped with different cryptographic algorithms were constructed to facilitate high-performance encryption and decryption operations on hard disk data.The scheme also enabled dynamic switching of cryptographic algorithms within the storage pools.A cryptographic protocol with remote online loading functions for cryptographic algorithms and keys was developed to meet the unified management and convenient security update requirements of reconfigurable cryptographic modules in various storage nodes.Furthermore, the scheme implemented fine-grained data encryption protection and logical security isolation functions based on cryptographic reconstruction technology.Experimental results demonstrate that the performance loss of this scheme for encryption protection and security isolation of stored data is approximately 10%.It provides a technical approach for distributed storage systems to meet the cryptographic application technology requirements outlined in GB/T 39786-2021 “Information Security Technology-Basic Requirements for Cryptography Applications” Level 3 and above in terms of device and computing security, application and data security.…”
Get full text
Article -
35180