Suggested Topics within your search.
Suggested Topics within your search.
- methods 9
- Management 6
- Anesthesia 5
- Nursing 5
- Research 5
- Biochemistry 4
- Economic conditions 4
- Education 4
- Evaluation 4
- Nursing Assessment 4
- Nursing Care 4
- Obstetrics 4
- Psychology 4
- Surgical nursing 4
- Accounting 3
- Biology 3
- Critical Care 3
- Diseases 3
- Emergencies 3
- Human geography 3
- Information Science 3
- Internal medicine 3
- Juvenile literature 3
- Microbiology 3
- Politics and government 3
- therapy 3
- Anesthetics 2
- Arithmetic 2
- Authorship 2
- Banks and banking 2
-
1661
Layers upon layers: data sharing & reuse challenges in archaeological contexts
Published 2024-06-01“…Analysis was undertaken using an inductive, thematic approach informed by Kemmis et. al.’s (2014) practice architectures model. Results. …”
Get full text
Article -
1662
Desempeño operacional posterior a la oferta pública inicial de acciones de las empresas chilenas
Published 2009-01-01“…Pese a las pruebas internacionales, las empresas IPO chilenas no han mostrado un peor desempeño financiero (véase, por ejemplo, Aggarwal et al, 1993; Celis y Maturana, 1998). En cuanto al desempeño operacional, éste no ha sido estudiado para el caso chileno. …”
Get full text
Article -
1663
WSN key recovery attack based on symmetric matrix decomposition
Published 2018-10-01“…The key protocol is one of the crucial technologies to ensure the security for wireless sensor network(WSN).Parakh,et al.proposed a key agreement for WSN based on matrix decomposition.However,the study revealed that the protocol had security risks.A key recovery attack scheme against this protocol was proposed by using the properties of symmetric matrix and permutation matrix.Based on intercepting the row and column vector of the node,elementary transformation was performed to construct a linear algebraic attack algorithm and the equivalent key was obtained.The computational complexity is O(N<sup>6</sup>).Experimental results show that the method can recover the equivalent key of the above protocol within the polynomial computational complexity and the memory consumption is within an acceptable range.In addition,an improved scheme for key agreement was proposed to resist the linear algebraic attack by using a random disturbance matrix,and the correctness and security analysis were also carried out.…”
Get full text
Article -
1664
Fuzzy Based Design for Third-Party Pipeline Failures in the Niger Delta Region of Nigeria
Published 2015-07-01“…Twelve factors earlier identified by Ariavie et al (2010), were further grouped into four, viz : violence, desperation, misconduct and agricultural categories to allow for a less tedious rule base development. …”
Get full text
Article -
1665
Protocol for assessing the clogging of the mitochondrial translocase of the outer membrane by precursor proteins in human cells
Published 2025-03-01“…We then show how co-immunoprecipitation can be used to test the stalling of precursors inside TOM.For complete details on the use and execution of this protocol, please refer to Kim et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
Get full text
Article -
1666
Correlation Measures of Dual Hesitant Fuzzy Sets
Published 2013-01-01“…The dual hesitant fuzzy sets (DHFSs) were proposed by Zhu et al. (2012), which encompass fuzzy sets, intuitionistic fuzzy sets, hesitant fuzzy sets, and fuzzy multisets as special cases. …”
Get full text
Article -
1667
Images of a nation in crisis
Published 2022-10-01“…The ANC-led government under Jacob Zuma was perceived as corrupt and gravitating away from the ideals of a democratic state. Underpinned by Bal et al.’s (2009) model of caricature, this article seeks to examine, firstly, how the cartoon, as a medium of expression, pokes fun at its object of caricature, and secondly, how the broader socio-political context of Zuma’s presidency inspired Zapiro’s Lady Justice cartoons. …”
Get full text
Article -
1668
On the Domination Number of Cartesian Product of Two Directed Cycles
Published 2013-01-01“…Denote by γ(G) the domination number of a digraph G and Cm□Cn the Cartesian product of Cm and Cn, the directed cycles of length m,n≥2. In 2010, Liu et al. determined the exact values of γ(Cm□Cn) for m=2,3,4,5,6. …”
Get full text
Article -
1669
Modelo de negocio del turismo del baile en Sevilla y Buenos Aires: aspectos de la importancia del patrimonio cultural inmaterial en la gestión de destinos turísticos
Published 2014-12-01“…Como patrimonio cultural inmaterial de la humanidad, el flamenco y el tango adquirieron además una importancia notable para la imagen de ambas ciudades como destino turístico. El modelo de Gereffi et al. (2005) sobre “Governance of Global Value Chains” se aplica de forma adaptada al turismo del flamenco y del tango, para resaltar su importancia en la gestión de destinos turísticos.…”
Get full text
Article -
1670
“In the days of my life.” Elite activity and interactions in the Maya lowlands from Classic to Early Postclassic times (the long ninth century, AD 760-920)
Published 2017-12-01“…Certainly punctuated here and there by radical crises and ruptures, the temporal “transition” from the Classic to the Postclassic periods must be studied as a long and thick, or complex sequence that linked up different processes in different regions with a different time sequence (Demarest et al. 2004b). But it also activated generations of actors who came into play as they became conscious of, reacted, and adapted to those changes. …”
Get full text
Article -
1671
Protocol to study inter-tissue communication between the hypothalamus and white adipose tissue and lifespan using a chemogenetic approach in aged mice
Published 2025-03-01“…We then detail procedures for lifespan measurements following chemogenetic manipulation in aged mice.For complete details on the use and execution of this protocol, please refer to Tokizane et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
Get full text
Article -
1672
Mobilités quotidiennes et modes d’habiter dans le périurbain francilien
Published 2015-12-01“…In a research devoted to ways of periurban living (Aguilera et al, 2014), we have collected material to question 3 aspects : territory - technical networks (ICT, automotive) - daily mobility, based on statements of thirty-one households living in Paris suburb (Haute Vallée de Chevreuse, Brie Boisée, Carnelle Pays de France). …”
Get full text
Article -
1673
Protocols for translocation processes of flexible polymers through a pore using LAMMPS
Published 2025-03-01“…This protocol has potential applications in developing mathematical models for DNA sequencing, controlled drug delivery, and cellular transport processes.For complete details on the use and execution of this protocol, please refer to Garg et al.1 : Publisher’s note: Undertaking any experimental protocol requires adherence to local institutional guidelines for laboratory safety and ethics.…”
Get full text
Article -
1674
L’accord de proximité en genre : quelques considérations diachroniques
Published 2022-12-01“…According to Moreau (2019), masculine agreement was dominant in middle French, in case of mixed gender coordinated nouns. According to Abeillé et al. (2018), An and Abeillé (2021a), feminine agreement is dominant for determiners and prenominal adjectives in contemporary French when the first noun is feminine. …”
Get full text
Article -
1675
Type-dependent stochastic Ising model describing the dynamics of a non-symmetric feedback module
Published 2016-06-01“…We study an alternative approach to model the dynamical behaviors of biological feedback loop, that is, a type-dependent spin system, this class of stochastic models was introduced by Fernández et. al [13], and are useful since take account to inherent variability of gene expression.We analyze a non-symmetric feedback module being an extension for the repressilator, the first synthetic biological oscillator, invented by Elowitz and Leibler [7]. …”
Get full text
Article -
1676
Geometric Curvatures of Plane Symmetry Black Hole
Published 2013-01-01“…Considering the Legendre invariant proposed by Quevedo et al., we obtain a unified geometry metric, which contains the information of the second-order phase transition. …”
Get full text
Article -
1677
Effective metric descriptions of quantum black holes
Published 2024-12-01“…Abstract In a recent work (Del Piano et al. in Phys Rev D 109(2):024045, 2024), we have described spherically symmetric and static quantum black holes as deformations of the classical Schwarzschild metric that depend on the physical distance to the horizon. …”
Get full text
Article -
1678
An Evaluation of a Novel Mask in Four Patients with Obstructive Sleep Apnea and Overlap Syndromes
Published 2013-01-01“…We have previously reported the use of dual mask for ventilatory support of a patient postoperatively (Porhomayon et al., 2013). Here, we report an evaluation of the dual mask in four patients with overlap syndromes. …”
Get full text
Article -
1679
Oscillation of Second-Order Neutral Functional Differential Equations with Mixed Nonlinearities
Published 2011-01-01“…Oscillation results for the equation are established which improve the results obtained by Sun and Meng (2006), Xu and Meng (2006), Sun and Meng (2009), and Han et al. (2010).…”
Get full text
Article -
1680
High Balanced Biorthogonal Multiwavelets with Symmetry
Published 2014-01-01“…Balanced multiwavelet transform can process the vector-valued data sparsely while preserving a polynomial signal. Yang et al. (2006) constructed balanced multiwavelets from the existing nonbalanced ones. …”
Get full text
Article