Suggested Topics within your search.
Suggested Topics within your search.
- Research 58
- Methodology 29
- Social sciences 10
- Study and teaching 10
- Mass media 8
- Education 7
- English language 7
- Evaluation research (Social action programs) 7
- Moral and ethical aspects 7
- Psychological aspects 7
- Psychology 7
- Report writing 7
- methods 7
- research 7
- Dissertations, Academic 6
- History 6
- Sociology 6
- Consumers 5
- Evaluation 5
- Management 5
- Research--Methodology 5
- Sex role 5
- Social conditions 5
- Academic writing 4
- Conversation analysis 4
- Information technology 4
- Qualitative research 4
- Rhetoric 4
- Social aspects 4
- Technological innovations 4
-
123001
Evaluation of Status of Getting ill with SARS CoV-2 and the Knowledge of Using and Attitudes of Personal Protective Equipment at Pre-Hospital Emergency Care Services Employees
Published 2024-04-01“…The data were collected through a questionnaire developed by the researcher inquiring about the demographic data, whether they contracted (COVID-19), knowledge about COVID-19, and knowledge and attitudes regarding the use of PPE. …”
Get full text
Article -
123002
Efficient Anomaly Detection Algorithm for Heart Sound Signal
Published 2024-01-01“…Heart sound signals contain a wealth of information on cardiac function and health status. Researchers have recently utilized deep learning methods to detect abnormal features in heart sound signals, thereby facilitating disease diagnosis. …”
Get full text
Article -
123003
Descrição dos primeiros recém-nascidos monitorizados por meio de eletroencefalograma de amplitude integrada em uma maternidade privada do Nordeste do Brasil
Published 2024-12-01“…Maternal and clinical data of the NB were collected through a form designed by the researchers and subsequently subjected to descriptive statistical analysis using R Core Team 2022 software (Version 4.2.2). …”
Get full text
Article -
123004
Stakeholder Driven Sensor Deployments to Characterize Chronic Coastal Flooding in Key West Florida
Published 2024-07-01“…The accuracy and feasibility of the method was tested through four deployments performed by a team of local stakeholders and researchers between July 2019–November 2021 resulting in 22 sensors successfully recording data, with 15 of these sensors recording flooding. …”
Get full text
Article -
123005
<i>Agrobacterium rhizogenes</i>-Mediated Hairy Root Transformation in <i>Rosa</i>
Published 2025-01-01“…Refining the transformation protocol to work under aseptic and non-aseptic conditions will allow researchers to use this system efficiently and broadly.…”
Get full text
Article -
123006
APPLICATION OF SINMAP AND ANALYSIS OF MODEL SENSITIVITY – CASE STUDIES FROM GERMANY AND CHINA
Published 2016-07-01“…The results of sensitivity analysis can be expected to be helpful for other researchers for a more successful application of SINMAP to other study areas.…”
Get full text
Article -
123007
Determination of Biological Nitrogen Fixation Induced N2O Emission from Arable Soil by Using a Closed Chamber Technique
Published 2014-01-01“…A growing worldwide concern for these problems has motivated researchers, environmentalists, and policy makers to find alternatives to overcome such losses. …”
Get full text
Article -
123008
Analysis of the Discursive Logic of the Author-Narratorʼs Continuous Metatexts in the Shazdeh Hamam by Papoli Yazdi
Published 2023-05-01“…Part of this popularity in addition to the author-narratorʼs style prose, honesty, and frankness in revealing the facts, is related to its continuous metatexts; because the author, once in the role of narrator, recounts the events of his life and another time, in the role of a researcher, analyzes them. This issue turns the author-narrator an impartial narrator to an intervening narrator. …”
Get full text
Article -
123009
Peers To Professors: Exploring The Role Of Students And Faculty In Same-Level Reciprocal Peer Assisted Learning In Family Medicine Clerkship
Published 2025-01-01“…Coding of the transcripts was carried out by three researchers independently, with themes agreed upon mutually. …”
Get full text
Article -
123010
Knowledge, attitudes and practices on household food waste: Bases for formulation of a recycling system
Published 2020-07-01“…Data were collected through the use of researcher-made questionnaire with Cronbach’s Alpha at .82, and was supplemented by observations. …”
Get full text
Article -
123011
Evaluation of a user‐friendly CSDS cage apparatus for studying depressive‐like behaviors in rodents
Published 2025-01-01“…The consistent results from multiple behavioral tests also supported real‐world application of the apparatus, offering researchers a promising alternative to conventional rodent cages.…”
Get full text
Article -
123012
The Effect of Transobturator Tape Surgery on Female Sexual Functions: A Systematic Review
Published 2020-08-01“…In total, 8 clinical studies employed female sexual function index whereas 8 clinical studies administered Prolapse/Urinary Incontinence Sexual Questionnaire -12. 4 of these studies tried to understand women’s sexual functions through questions determined by the researchers (N/A). 2 of the other studies used the Sexual Impact Questionnaire and a visual analogue scale, 1 study used Nine Questions on Sexual Functioning (NSF-9) and 1 study used International Consultation on Incontinence Questionnaire Vaginal Symptoms Module (ICIQ-VS). …”
Get full text
Article -
123013
Behavioral flexibility is manipulable and it improves flexibility and innovativeness in a new context
Published 2023-08-01“…Understanding how flexibility causally relates to other traits will allow researchers to develop robust theory about what flexibility is and when to invoke it as a primary driver in a given context, such as a rapid geographic range expansion. …”
Get full text
Article -
123014
A Review on Biosurfactant Applications in the Petroleum Industry
Published 2021-01-01“…This paper reviews relevant reports and results from various presented papers by researchers and companies on applications of microorganisms and biosurfactant technology with specific emphasis on EOR and MEOR processes, based on recently published articles since 2010 until now.…”
Get full text
Article -
123015
The Congress of Mongolologists-Philologists In Ulanbaatar (1959) in the Ideological Contexts of the Cold War
Published 2024-12-01“…The forum brought together researchers from a number of countries, including those having been separated by the Cold War Iron Curtain. …”
Get full text
Article -
123016
Distinguishing collaboration from related elements of crime
Published 2023-10-01“…Scientific articles by researchers who studied who have studied the objective and subjective features of collaboration have been analysed. …”
Get full text
Article -
123017
EN-Bypass: a security assessment method on e-mail user interface notification
Published 2023-06-01“…Email plays an important role in people’s daily communications, while also attracts the attention of hackers.Email is frequently used in phishing attacks, with email sender spoofing being a key step.To prevent sender-spoofing attacks, email vendors often deploy email security protocols such as SPF, DKIM, and DMARC to verify the sender’s identity.Moreover, some vendors add email UI notification mechanism on email clients to help users identify the real sender.However, there is no uniform standard in the implementation of the email UI notification mechanism, which varies among vendors.Whether the mechanism effectively prevents sender-spoofing attacks still needs verification.In this paper, the security evaluation of the email UI notification mechanism was studied to gain better understanding of its efficacy and to eventually protect users from sender-spoofing attacks.Ten world-famous email services were researched and evaluated, of which seven deployed the email UI notification mechanism.Consequently, a new type of sender-spoofing attack was proposed which was called EN-Bypass, aiming to bypass the email UI notification mechanism by forging the “From” and “Sender” fields in the email header.To verify the email UI notification mechanism’s security and reliability, EmailSenderChecker was implemented, which can automatically evaluate the existence of the EN-Bypass attack.The result shows that all seven email service vendors suffer from EN-Bypass attack.Attackers could bypass the email UI notification mechanism by constructing special email headers and spoofing the sender.Finally, to improve the mail service security, three suggestions about the email UI notification mechanism were proposed for the mail service vendors.…”
Get full text
Article -
123018
Quantifying Urban Sprawl and Its Driving Forces in China
Published 2019-01-01“…Against the background that urbanization has proceeded quickly in China over the last two decades, a limited number of empirical researches have been performed for analyzing the measurement and driving forces of urban sprawl at the national and regional level. …”
Get full text
Article -
123019
Robust ensemble of handcrafted and learned approaches for DNA-binding proteins
Published 2025-01-01“…These results can now be used for baseline comparisons by other researchers in the field.…”
Get full text
Article -
123020
Asking the classroom with technology: a systematic literature review
Published 2025-01-01“…Abstract Response technologies (RTs), also termed clickers or student response systems, have gained traction among researchers in classrooms in recent years. RTs encompass various interactive tools and technologies that are pivotal in modern educational settings. …”
Get full text
Article