Showing 401 - 420 results of 10,400 for search '"personality"', query time: 0.09s Refine Results
  1. 401
  2. 402

    Family and Personal Adjustment of Economically Disadvantaged Chinese Adolescents in Hong Kong by Daniel T. L. Shek, Pik Fong Tsui

    Published 2012-01-01
    “…This study attempted to examine the relationship between poverty and adolescent developmental outcomes in the family and personal domains in 3,328 Chinese secondary school students in Hong Kong. …”
    Get full text
    Article
  3. 403

    Accessibility and Referential Choice: Personal Pronouns and D-pronouns in Written German by Yvonne Portele, Markus Bader

    Published 2016-09-01
    “…We present a corpus study and a production experiment that investigated the choice between two types of pronouns in written German – personal pronouns and so-called d-pronouns, which have properties of both personal and demonstrative pronouns. …”
    Get full text
    Article
  4. 404
  5. 405
  6. 406

    A Data Quality Control Program for Computer-Assisted Personal Interviews by Janet E. Squires, Alison M. Hutchinson, Anne-Marie Bostrom, Kelly Deis, Peter G. Norton, Greta G. Cummings, Carole A. Estabrooks

    Published 2012-01-01
    “…We utilize data collected annually for two years from computer-assisted personal interviews with 3004 healthcare aides. Data quality was assessed using both survey and process data. …”
    Get full text
    Article
  7. 407
  8. 408

    FORMATION OF THE NEW WORLD VIEW, NEW PERSON, NEW SOCIETY OF THE FUTURE by Valentina A. Voronkova

    Published 2013-09-01
    “…The meaning of the individual in society - to be useful to society and to the person, to be a master, to live in harmony with people and nature. …”
    Get full text
    Article
  9. 409

    One in a Million: A Case Report of Stiff Person Syndrome by Ruchi Yadav, Neeraj Abrol, Sima Terebelo

    Published 2022-01-01
    “…Stiff person syndrome (SPS) is a rare autoimmune disease caused by lack of inhibition to excitatory neurotransmitters in the central nervous system (CNS) leading to inappropriate motor unit firing. …”
    Get full text
    Article
  10. 410

    Equipo de Protección Personal para la Manipulación de Pesticidas by Frederick M. Fishel

    Published 2012-12-01
    “…PI243/PI243: Equipo de Protección Personal para la Manipulación de Pesticidas (ufl.edu) …”
    Get full text
    Article
  11. 411
  12. 412

    Stakeholders' perceptions of personal health data sharing: A scoping review. by Prima Alam, Ana Bolio, Leesa Lin, Heidi J Larson

    Published 2024-11-01
    “…The rapid advancement of digital health technologies has heightened demand for health data for secondary uses, highlighting the importance of understanding global perspectives on personal information sharing. This article examines stakeholder perceptions and attitudes toward the use of personal health data to improve personalized treatments, interventions, and research. …”
    Get full text
    Article
  13. 413
  14. 414
  15. 415
  16. 416

    Intelligent Tourism Personalized Recommendation Based on Multi-Fusion of Clustering Algorithms by HongYan Liang

    Published 2021-01-01
    “…Through experimental analysis, it can be known that the intelligent tourism personalized recommendation system based on big data technology proposed in this paper has a high practical effect.…”
    Get full text
    Article
  17. 417
  18. 418

    The usage of personalized scheme of fentanyl administration during coronary artery stenting by D.О. Dziuba

    Published 2020-12-01
    “…The aim – to develop a personalized scheme of fentanyl administrationfor coronary artery stenting. …”
    Get full text
    Article
  19. 419
  20. 420

    Unveiling personalized and gamification-based cybersecurity risks within financial institutions by Amna Shahzadi, Kashif Ishaq, Naeem A. Nawaz, Fadhilah Rosdi, Fawad Ali Khan

    Published 2025-02-01
    “…By conducting a systematic literature review of 48 academic articles published between 2015 and 2024, this study examines the use of personalized, gamification-based strategies to mitigate cyber threats in the financial domain. …”
    Get full text
    Article