Suggested Topics within your search.
Suggested Topics within your search.
- Examinations 2
- Citizen participation 1
- Computer science 1
- Conservation of natural resources 1
- Cultural pluralism 1
- Economic conditions 1
- Economic policy 1
- Energy development 1
- Environmental policy 1
- Ethnic relations 1
- French language 1
- Geology 1
- Global environmental change 1
- Groundwater 1
- Historiography 1
- History 1
- Human ecology 1
- Human-computer interaction 1
- Lakes 1
- Mass media 1
- Mass media and technology 1
- Nationalism 1
- Philosophy 1
- Power resources 1
- Psychology 1
- Sex role 1
- Social conditions 1
- Social life and customs 1
- Social policy 1
- Study and teaching 1
-
3381
Activities of the Minister of Internal Affairs of the Ukrainian SSR Pavlo Yakovlevych Meshyk (1953)
Published 2024-03-01“…He was awarded the Order of Lenin (1949) for his active participation in the implementation of the nuclear programme, and later even received the Stalin Prize in Science and Technology (1951). …”
Get full text
Article -
3382
Prevalence of anabolic steroid users seeking support from physicians: a systematic review and meta-analysis
Published 2022-07-01“…Higher prevalence rates were observed in studies from Australia (67.27%; 95% CI 42.29% to 87.25%) and among clients of the needle and syringe exchange programme (54.13%; 95% CI 36.41% to 71.84%). The lowest prevalence was observed among adolescent AAS users (17.27%; 95% CI 4.80% to 29.74%).Conclusion Our findings suggest that about one-third of AAS users seek support from physicians, with remarkable differences between locations and subpopulations of AAS users. …”
Get full text
Article -
3383
Arriver à bon port : les canaux en contexte portuaire à l’époque romaine
Published 2020-12-01“…Currently, there is a growing interest in channels, and more particularly harbour channels, some of which –mainly concentrated around the Mediterranean Sea– are the subject of extensive research programmes. Excavations, coring or geophysical surveys provide information about the structure of the channels, the type of construction, and also about their environment. …”
Get full text
Article -
3384
Features of the formation of an effective mechanism of public administration of health care institutions in the context of medical care for military personnel
Published 2025-01-01“…It is necessary to develop effective mechanisms to ensure the efficient use of available resources, improve the system of monitoring and control over the implementation of benefits, and take into account the individual needs of veterans in the development and implementation of social programmes. It is concluded that the real implementation of the social rights and freedoms of servicemen and women contributes to maintaining and enhancing their combat readiness and combat capability. …”
Get full text
Article -
3385
-
3386
Promoting Internal Armed Conflict Resolution and Peacebuilding: The Case of the U.S.-Colombia Relations (Part II)
Published 2020-11-01“…The paper thoroughly examines the negotiations process, identifies the key disputed issues and the measures outlined for their resolution, including mechanisms of transitional justice, agrarian reform, programmes for demobilization and reintegration of the former combatants. …”
Get full text
Article -
3387
Assessment of knowledge, attitude and practice (KAP) on oral health among secondary-level students: a cross-sectional study in Kathmandu, Nepal
Published 2024-04-01“…Overall, regardless of adequate knowledge and attitudes, adolescents showcased unsatisfactory OH practices.Conclusions This study emphasises the significance of improving real-life OH habits and bridging the gap with targeted interventions like educational programmes, counselling and parental involvement. These efforts are crucial for turning knowledge and positive attitudes into consistent and effective oral care practices.…”
Get full text
Article -
3388
Remodeling the light-adapted electroretinogram using a bayesian statistical approach
Published 2025-01-01Get full text
Article -
3389
The Strong Protective Effect of Circumcision against Cancer of the Penis
Published 2011-01-01Get full text
Article -
3390
Understanding the unique role of community-based para-professionals delivering early childhood development in low-resource contexts: a Delphi study
Published 2025-01-01“…A key feature threaded across these three training components was strong emphasis on effective communication and relationship-building with families and communities, to ensure that early childhood development programmes are culturally-responsive and authentic. …”
Get full text
Article -
3391
Elucidation of Nature of Gene Action and Estimation of Combining Ability Effects for Fruit Yield Improvement and Yield Attributing Traits in Brinjal Landraces
Published 2022-01-01“…So, these lines might be employed as parents in hybridization programme in future to get suitable recombinants for higher fruit yield. …”
Get full text
Article -
3392
-
3393
Awareness of workplace hazards and preventive measures among sandstone mineworkers in Rajasthan, India: A cross-sectional study
Published 2017-03-01“…Policy makers should implement health and safety training programmes to promote use of PPEs among mine workers.…”
Get full text
Article -
3394
New taphonomic approach applied to the Late Pleistocene bone remains from Pikimachay Cave, Ayacucho Basin, Peru: possible implications for the debate on human colonisation of weste...
Published 2023-08-01“…As a part of a research programme aiming to re-assess the Late Pleistocene remains from this site, we made taphonomic observations on a sample of bones (n=40) from the lower strata (layers h to k) as follows: h (n=17), h1 (n=6), i (n=4), i1 (n=7), j (n=5), and k (n=1). …”
Get full text
Article -
3395
Overview of blockchain assets theft attacks and defense technology
Published 2023-02-01“…Since Satoshi Nakamoto’s introduction of Bitcoin as a peer-to-peer electronic cash system, blockchain technology has been developing rapidly especially in the fields of digital assets transferring and electronic currency payments.Ethereum introduced smart contract code, giving it the ability to synchronize and preserve the execution status of smart contract programs, automatically execute transaction conditions and eliminate the need for intermediaries.Web3.0 developers can use Ethereum’s general-purpose programmable blockchain platform to build more powerful decentralized applications.Ethereum’s characteristics, such as central-less control, public and transparent interaction data guaranteed by smart contracts, and user-controlled data, have attracted more attentions.With the popularization and application of blockchain technology, more and more users are storing their digital assets on the blockchain.Due to the lack of regulatory and governance authority, public chain systems such as Ethereum are gradually becoming a medium for hackers to steal digital assets.Generally, fraud and phishing attacks are committed using blockchain to steal digital assets held by blockchain users.This article aims to help readers develop the concept of blockchain asset security and prevent asset theft attacks implemented using blockchain at the source.The characteristics and implementation scenarios of various attacks were effectively studied by summarizing the asset theft attack schemes that hackers use in the blockchain environment and abstracting research methods for threat models.Through an in-depth analysis of typical attack methods, the advantages and disadvantages of different attacks were compared, and the fundamental reasons why attackers can successfully implement attacks were analyzed.In terms of defense technology, defense schemes were introduced such as targeted phishing detection, token authorization detection, token locking, decentralized token ownership arbitration, smart contract vulnerability detection, asset isolation, supply chain attack detection, and signature data legitimacy detection, which combine attack cases and implementation scenarios.The primary process and plans for implementation of each type of defense plan were also given.And then it is clear which protective measures can protect user assets in different attack scenarios.…”
Get full text
Article -
3396
CRISPR/Cas9, a universal tool for genomic engineering
Published 2016-09-01“…For instance, the CRISPR/Cas9 was recently used to control HIV infection and to repair genetic abnormalities, such as Duchenne muscular dystrophy or retinitis pigmentosa, both in cell cultures and rodent models. A programmable nature of CRISPR/Cas9 facilitates the creation of transgenic organisms through sitespecific gene mutations, knock-ins or large chromosomal rearrangements (deletions, inversions and duplications). …”
Get full text
Article -
3397
Effectiveness of Vestibular Rehabilitation in Children Post-Concussion: A Systematic Review
Published 2025-02-01“…Quality appraisal was conducted independently by two reviewers using the Joanna Briggs Institute checklist, the Critical Appraisal Skills Programme checklist and Cochrane risk of bias assessment tool. …”
Get full text
Article -
3398
Expected features of the course leader in the rehabilitation healthcare professionals' higher education: A qualitative study on students' perspectives.
Published 2024-01-01“…Students represent an essential source of information for understanding the expected characteristics and roles of course leaders in rehabilitation healthcare degree programmes. This study explored students' expected features of the course leaders in the rehabilitation healthcare professionals' higher education. …”
Get full text
Article -
3399
-
3400
How is cognitive behavioural therapy for insomnia delivered to adults with comorbid persistent musculoskeletal pain and disordered sleep? A scoping review.
Published 2024-01-01“…There was also considerable consistency in the frequency (weekly) and duration (5-9 weeks) of CBT-I programmes. Aspects inconsistently reported included who delivered the intervention; what modifications were made, if any; and the session content and duration. …”
Get full text
Article